Patents
Literature

854results about How to "Integrity guaranteed" patented technology

Method and system for testing malicious Android application programs

The invention discloses a method and a system for testing malicious Android application programs, and belongs to the technical field of computer software. The method includes the steps of a. dividing the untested application programs into a plurality of types, matching each button of the untested application program with one or more types of behavior and obtaining an application program button-behavior model, b. collecting application program information when button if a hardware imitator is pressed, recognizing the button corresponding to the current operation, and obtaining the operation behavior of the button according to the application program button-behavior model, c. collecting a bottom application program interface (API) calling sequence of the hardware imitator triggered by the current button and obtaining operation behavior corresponding to the button according to the API sequence, and d. comparing the operation behaviors confirmed by step b and step c, and identifying the untested application program as a malicious program when the operation behaviors are different. The method for testing the malicious Android application programs simplifies complexity of analysis and improves efficiency and accuracy of the analysis test greatly.
Owner:INST OF SOFTWARE - CHINESE ACAD OF SCI

Terminal admission control method based on switch port management

The invention relates to the technical field of terminal admission control, and particularly discloses a terminal admission control method based on switch port management. The method includes the steps that after a new terminal gets access to a network, the new terminal is collected through a switch, the unique identification of the terminal is extracted, and the terminal is interrelated with a port of the switch; the unique identification is compared with MAC addresses of an admission database and judged; if the unique identification is inquired, the new terminal is a legal terminal, and no action is generated; if the unique identification is not inquired, the new terminal is an illegal terminal or an external terminal, the corresponding port of the switch is closed immediately, and close information is recorded in the admission database; when a new terminal gets access to the network again, the new terminal is joined after window period processing; the previous steps are executed again to start processing; if no new terminal gets access to the network, the closed port of the switch is automatically opened after appointed time. MAC address management is adopted for the terminals, a terminal user is forbidden to change an MAC address without authorization, a virtual machine is managed, HUB access is stopped, and terminal admission control is accurate and strict.
Owner:尹志超

Unmanned aerial vehicle cooperative ground covering system

The invention discloses an unmanned aerial vehicle cooperative ground covering system. The unmanned aerial vehicle cooperative ground covering system comprises a hardware system. The hardware system is composed of an unmanned aerial vehicle group, a ground station, a communication module and a GPS reference station. The ground station and the unmanned aerial vehicle group communicate through the communication module and the GPS reference station. The ground station comprises a ground control system. The ground control system is composed of a remote control subsystem, a remote measuring subsystem and a geographical information subsystem. The remote control subsystem is used for instruction collection and instruction uploading. The remote measuring subsystem is used for task distribution, course programming and data receiving. The geographical information subsystem is used for processing download image data, superposing remote measured data and providing basic space data. According to the invention, the ground control system is used for completing the unmanned aerial vehicle cooperative ground covering task, the efficiency, flexibility and reliability of remote sensing and shooting measuring of the unmanned aerial vehicle are substantially enhanced, and the system can further be applied to the fields of disaster emergency surveying and mapping, offshore searching and rescuing, cooperative agricultural machinery working and the like.
Owner:李翔宇

Fixed network access into IMS bidirectional authentication and key distribution method

The invention discloses a fixed internet access IMS mutual authentification and a key distribution method which solves the problem that a security mechanism standard structure of the fixed internet access IMS does not have a solution. The method comprises the following steps that: a user terminal originates an authentification request to an HSS through a CSCF and provides a user ID; the HSS returns the response of the authentification request to the CSCF and sends both a CK and an IK to a P-CSCF as well as passing a certificate of an XRES to an S-CSCF; the CSCF returns a login response message to a UE; the user terminal authenticates the integrality of the corresponding part of the returned response message through a shared key of Ku sharing with the HSS and realizes the authentification of the IMS on the internet side; after the certification, the use terminal calculates the certificate of an RES and originates the login request to the CSCF again; the CSCF authenticates the certificate of the RES on the user terminal and the certificate of the XRES of the HSS; after the certification, the CSCF sends a message of a successful user authentification to the HSS. The invention realizes the mutual authentification of the IMS network through a basic encryption and integrality protection arithmetic and completes the distribution of the key.
Owner:ZTE CORP

Method, client side and system for broadcasting media fragmentations in turn

InactiveCN103685264AIntegrity guaranteedWaste of processing resourcesTransmissionClient-sideBroadcast address
The invention discloses a method, a client side and a system for broadcasting media fragmentations in turn. The method includes the steps of obtaining a continuously-updated index list of a server; obtaining the updated index list and discarding the former index list, recording serial numbers of media fragmentations to be downloaded at preset when the former index list is discarded, and recognizing serial numbers of media fragmentations ranked at first broadcasting positions in the updated index list; adding a serial number missing between every two serial numbers when it is judged that the two serial numbers are not the same or continuous, generating corresponding supplementary broadcast addresses of the media fragmentations according to the added serial numbers and recorded serial numbers, combining the supplementary broadcasting addresses and broadcasting addresses in the updated index list in sequence according to corresponding serial numbers to obtain a current index list, and downloading corresponding media fragmentations from the server sequentially according to the broadcasting addresses in the current index list and broadcasting the media fragmentations. According to the method, lagging media fragmentations not requested by the client side can be automatically supplemented, and therefore broadcasting integrality is guaranteed.
Owner:LE SHI ZHI XIN ELECTRONICS TECH TIANJIN

Method for safely and flexibly upgrading firmware

The invention relates to a method for safely and flexibly upgrading a firmware. The method comprises the following steps of a used triggers to enter an upgrading process, starts an upgrading program named p1; the p1 downloads a firmness head according to a firmness address provided by a user, judges whether the firmness data provided by the user is correct or not, kills all processes but self if the firmness data is correct, and downloads the entire firmness to an internal memory; the p1 sets and stores the synchronous information through p1 after the entire firmness is downloaded, zones an upgrading subprogram, deciphers and uncompresses, and extracts the upgrading subprogram named as p2; the p1 calls p2 to complete the upgrading action, and waits for the completion of the upgrading; the p2 detects whether the firmness is legal or not, stops the upgrading if the firmness is illegal and notifies the p1, and carries out specific upgrading action on equipment if the firmness is legal; the p2 deciphers and uncompresses the zoned data, and then carries out the equipment upgrading; and the p1 is notifies after the p2 completes the decipher and uncompressing, and the equipment is restarted to complete the upgrading. Due to the adoption of the method, the upgrading security is improved, and the completeness of the firmness is guaranteed.
Owner:XIAMEN YEALINK NETWORK TECH

Storage device with power-off protection function, power-off protection method and computing system

The invention provides a storage device and a power-off protection method therefor. The storage device comprises a host interface, a main control chip, an MRAM (Magnetic Random Access Memory) and one or more NAND chips, wherein the MRAM comprises a write cache or a read-write cache and a cache page table. The MRAM further comprises a write-back cache page table used for recording cache pages about to be written back to the NAND chips; if the operation of writing back the cache pages to the NAND chips is finished, a corresponding record of the write-back cache page table is deleted; and if the power is off in the process of writing back the cache pages to the NAND chips, the cache pages are rewritten back to the NAND chips when the power is on. According to the storage device and the power-off protection method provided by the invention, the cache pages about to be written back to the NAND chips are recorded in the MRAM, and if the power is off in the process of writing back the cache pages to the NAND chips, the cache pages are rewritten back to the NAND chips when the power is on, so that the data completeness can be ensured; and blocks about to be erased are further recorded in the MRAM, and if the power is off in the erasure process, the blocks are re-erased when the power is on, so that the data completeness is further ensured. The invention furthermore provides a computing system with a power-off protection function.
Owner:SHANGHAI CIYU INFORMATION TECH

Operating and maintenance system and parameter configuration method of network element device

The invention discloses a parameter configuration method and an operating and maintenance (O&M) system of a network element device. The system comprises an initial value configuration file, a dynamic configuration processing module and a parameter configuration module. The method comprises the following steps: the initial value of a configuration parameter is preserved in the initial value configuration file and is configured to the network element device when the network element device is started; the corrected configuration parameter and the modified value thereof during the running process of the network element device are preserved in a dynamic configuration file; and when the network element device is restarted, the initial value in the initial value configuration file is configured to the network element device firstly, and then the modified value in the dynamic configuration filed is used for replacing the initial value which corresponds to the configuration parameter and is configured to the network element device. By using the invention, the configuration parameter can be still completely preserved under various conditions of restart, power-failure and software/hardware upgrade of the network element device, the processing time of the network element device in the read/written configuration information is shorter, and the processing efficiency is high, therefore, the great convenience is provided for the running of the entire network.
Owner:DATANG MOBILE COMM EQUIP CO LTD

Method and device for converting data format of electronic book and portable electronic book reader

The invention provides a method and a device for converting the data format of an electronic book and a portable electronic book reader, wherein the method for converting the data format of the electronic book comprises the steps of: acquiring a source file which the portable electronic book reader cannot analyze; converting the source file into a target format file which the portable electronic book reader can analyze; and transmitting the target format file to the portable electronic book reader. The conversion of the source file into the target format file specially comprises the steps of: calling a decoder corresponding to the file format of the source file, decoding the source file into an intermediate file; and coding the intermediate file to the target format file which the portable electronic book reader can analyze. On the basis of not increasing the storage space and the production cost of the portable electronic book reader, the method for converting the data format of the electronic book effectively solves the problem of analyzing complex format files, guarantees that the contents of the complex format files can be displayed completely and the user experience resulting from the portable electronic book reader is strengthened.
Owner:YINGHUADA (SHANGHAI) ELECTRONIC CO LTD

Chrysanthemum tea cleaning and drying equipment

InactiveCN107296131AAvoid destructionIntegrity guaranteedTea substituesTea dryingMotor shaftCentral compartment
The invention discloses a cleaning and drying equipment for chrysanthemum tea, which comprises a cleaning box, a drying cylinder and a heating box. A screen is arranged in the middle of the inner cavity of the cleaning box, and the inner cavity of the cleaning box is divided into a cleaning cavity and a cleaning cavity by the separating screen. Stirring chamber, the bottom wall of the stirring chamber is equipped with a first motor, the motor shaft of the first motor is fixedly connected to the stirring rod, the bottom of the cleaning box is fixedly connected to the drying cylinder, and the right side of the inner cavity of the drying cylinder is equipped with an air distribution plate , the air distribution plate divides the inner chamber of the drying cylinder into a drying chamber and a heating chamber, a rotating shaft is arranged in the drying chamber, and the part of the rotating shaft in the drying chamber is provided with rolling and pushing leaves; the present invention uses a motor It drives the stirring blade to rotate at a high speed, thereby stirring the water flow, forming a vortex in the inner cavity of the cleaning tank, thereby stirring the chrysanthemums in the cleaning chamber, and cleaning the chrysanthemums, thereby removing the sediment and impurities on the chrysanthemums. Cleaning the chrysanthemums can effectively prevent the chrysanthemums from being damaged and ensure the integrity of the chrysanthemums.
Owner:袁润栋

Goods distribution method and system of distributor, and terminal

InactiveCN107067218AIntegrity guaranteedImprove accuracyForecastingLogisticsOrder managementTransportation capacity
The application discloses a goods distribution method and system of a distributor, and a terminal. The distributor terminal receives store order information sent by an order management server so that to-be-distributed cargo information is determined. Distribution equipment information sent by affiliation distribution equipment terminals through a communication network is received. A to-be-selected equipment set is generated according to plan idle transportation capacity information of next time units of affiliation distribution equipment. The to-be-distributed cargo information and the distribution equipment in the to-be-selected equipment set are matched, the distribution equipment generating the maximum matching degree is determined as target distribution equipment, and a to-be-distributed cargo is distributed by using the target distribution equipment. Accuracy when the target distribution equipment is screened can be improved through transportation capacity matching. Distribution is performed by using the target distribution equipment, a plan idle transportation capacity of the next time unit of the target distribution equipment can be used completely or maximumly, and waste of plan idle transportation capacities of the distribution equipment cannot be resulted in, so a logistics resource cannot be wasted, and the logistics resource are used to a maximum extent.
Owner:北京惠赢天下网络技术有限公司

Construction method for large-volume concrete structure of bridge loading platform

The invention relates to a construction method for a large-volume concrete structure of a bridge loading platform. Layering pouring is adopted and each layer of concrete is constructed according to the construction method which comprises the following steps: erecting a template; simultaneously pouring the large-volume concrete with high crack resistance and rushing resistance on an edge part and the large-volume concrete with low temperature rise and crack resistance in the interior according to a predesigned slope inclined angle theta, designed thickness t of the large-volume concrete on the edge part and pouring thickness m of the layer; and removing a mould after reaching mould-removing time. According to the construction method provided by the invention, the temperature difference between interior and exterior of the large-volume concrete structure can be controlled within 25 DEG C, without arranging a cooling water pipe in the large-volume concrete structure, such as the bridge loading platform, so as to reduce the risk of temperature cracking. Compared with the process of arranging the cooling water pipe, the construction method provided by the invention is simpler; the incompact plugging caused by later-stage slurry plugging after the cooling water pipe is arranged is avoided; the risk of potential defect of the concrete structure caused by the breaking of the water pipe is reduced; and the washing damage to the concrete structure caused by the water flow carrying sand is resisted.
Owner:WUHAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products