Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

67results about How to "Make up for loopholes" patented technology

URL (Uniform Resource Locator) filtering method and URL (Uniform Resource Locator) filtering system aiming at HTTP (Hyper Text Transport Protocol) segment request

InactiveCN102868693ARich filter conditionsMake up for loopholesTransmissionDomain nameFilename extension
The invention provides a URL (Uniform Resource Locator) filtering method and a URL filtering system aiming at an HTTP (Hyper Text Transport Protocol) segment request, wherein the method comprises the following steps of: S1, obtaining an HTTP request message; S2, resolving the HTTP request message, and obtaining the HTTP request method, a URI (Uniform Resource Identifier), a domain name and a filename extension information; and S3, according to the obtained HTTP request method, URI, domain name and filename extension information, comparing the request method, the URI, the domain name and the filename extension with a set URL filtering condition one by one, and if one of the request method, the URI, the domain name and the filename extension is matched with the set URL filtering condition, resetting a TCP (Transmission Control Protocol) connection. The URL filtering method and the URL filtering system provided by the invention realize filtering on the segmented HTTP request, make up the vulnerability in the prior art, additionally, the method and the system filter the HTTP request in a manner of gathering multiple information such as the request method, the URI, the domain name and the filename extension, so that the URL filtering conditions are enriched.
Owner:苏州迈科网络安全技术股份有限公司

Online smart supervision system of fire protection control room of social unit

PendingCN110689689ASolving Regulatory DifficultiesAddress regulatory needsTelevision system detailsRegistering/indicating time of eventsAlarm messageFire protection
The invention relates to an online smart supervision system of a fire protection control room of a social unit. The online smart supervision system comprises an online supervision and alarm terminal device of the fire protection control room, a transmission network and an online smart supervision platform; the online supervision and alarm terminal device of the fire protection control room comprises an online supervision system alarm host of the fire protection control room, and a personnel on-duty smart detector, a high-definition network camera, a multifunctional certificated employment verification terminal, a multifunctional network intercom terminal and a voice audible and visual alarm, which are connected with the online supervision system alarm host of the fire protection control room; and the online supervision system alarm host of the fire protection control room can transmit supervision/monitoring data and alarm information to the online smart monitoring platform through thetransmission network. The online smart supervision system provided by the invention effectively solves the supervision difficulties of urban fire protection supervision organizations on insufficient staffing, unattended, undocumented employment, fire alarm violation handling, fire protection linkage violation setting and the like of fire protection control rooms of the social units, and realizes refined, normalized an long-lasting online smart supervision of the fire protection control rooms of the social units.
Owner:山东宏成安防科技有限公司

OTA upgrading method, OTA upgrading device and computer equipment

The invention discloses an OTA upgrading method, an OTA upgrading equipment and computer equipment, and belongs to the technical field of networks. The method comprises the steps of obtaining an OTA upgrade package corresponding to bound intelligent equipment by electronic equipment, sending the OTA upgrade package to intelligent equipment through communication connection with the intelligent equipment, and carrying out upgrading operation by the intelligent equipment upon receiving the OTA upgrade package. According to the invention, the OTA upgrade package is downloaded through the electronic equipment and the OTA upgrade package does not need to be actively downloaded by intelligent equipment. Therefore, the intelligent equipment cannot be connected to the wide area network. The OTA upgrading can still be carried out. The advantages of upgrading the system without loss, repairing system bugs and optimizing system functions of OTA upgrading are ensured; and moreover. The OTA upgrading problem when the intelligent equipment is abnormal and cannot access the network is solved. The defect that an existing upgrading mode is very inconvenient for after-sales service personnel and users far away from the location is overcome, and the upgrading efficiency is ensured.
Owner:TENCENT TECH (SHENZHEN) CO LTD

Image encryption system, image decryption system, image encryption method and image decryption method

The invention provides an image encryption system, an image decryption system, an image encryption method and an image decryption method. The image encryption system comprises a cellular automaton, a first encryption module connected with the cellular automation, a scrambling mapping table generation module connected with the cellular automation, and a second encryption module connected with the first encryption module and the scrambling mapping table generation table. Reversible information mixing is carried out at paintext of pseudorandom chaos sequences and image data, thereby, after a numerical value of the image data is encrypted, the data encrypted at the first time is divided into a plurality of data blocks, and the data blocks are recombined according to a scrambling mapping table so as to scramble positions of the data encrypted at the first time, thus, intensity of information chaord is greater, and ciphertext digital sequences are more irregular; that attackers cannot calculate the pseudorandom sequences for the first time encryption through public algorithm details is ensured, technical bugs of the existing algorithm technology are remedied, and long-term information protection for users used to encrypting multiple sets of data with the same key is realized.
Owner:SHANGHAI IRAY TECH

Terminal upgrading method and device, terminal and storage medium

The invention discloses a terminal upgrading method and device, a terminal and a storage medium. The method comprises: obtaining an upgrading task of a target upgrading terminal, version information of each to-be-upgraded device in the target upgrading terminal, an upgrading demand of each to-be-upgraded device and an original software package corresponding to each to-be-upgraded device; making atarget upgrading terminal upgrading package according to the version information of each to-be-upgraded device and the original software package corresponding to the to-be-upgraded device; determiningan upgrading strategy of the target upgrading terminal according to the upgrading requirement of each to-be-upgraded device and the upgrading task of the target upgrading terminal; and when the upgrading strategy of the target upgrading terminal meets a first preset condition, pushing the target upgrade terminal upgrade package to the target upgrade terminal based on the upgrade strategy of the target upgrade terminal, so that the target upgrade terminal upgrades each to-be-upgraded device in the target upgrade terminal according to the upgrade strategy and the upgrade package, and the security risk and vulnerability of the target upgrade device information can be quickly solved from the far end.
Owner:ZHEJIANG GEELY NEW ENERGY COMML VEHICLES CO LTD +3

Improved train control system security data interaction method

The invention discloses an improved train control system secure data interaction method, which comprises the following steps of: expanding the shared key of a data transceiver and the length of a random number generated and shared by the transceiver, and calculating a session key with an increased key length by matching with a corresponding SM4 algorithm; dividing the security data X of the train control system into blocks according to N bits, using a data block and a full text of a session key as input in each round, performing iterative computation by using a corresponding SM4 algorithm, and generating an N-bit operation result Hi corresponding to the corresponding data block; regarding the operation result Hi as encrypted data of the corresponding data block, and covering the corresponding data block, so that the security encryption of the security data X of the train control system is realized; and selecting a corresponding lossless compression algorithm according to the type of the train control system security data, performing data lossless compression on the full-text encrypted train control system security data X, and sending the compressed data X to a receiver. According to the method, the data security is greatly improved, and meanwhile, the occupancy rate of wireless resources is reduced.
Owner:CHINA RAILWAYS CORPORATION +2

Implementation method of business process automatic supervision aid decision making

InactiveCN105631579AImprove audit qualityStrengthen early warning information managementResourcesBusiness dataSafe system
The invention discloses an implementation method of business process automatic supervision aid decision making. According to the method, based on mass information comparison, a data model is established; a comprehensive real-time decision role which acts as an aid decision making system and a data security system is provided; the method can go deep into a business system; the business process of the business system is analyzed; the loopholes of the business system are filled; the operation logs of the business system are recorded in a whole process; data identification is carried out with a absolutely neutral standing point; logic judgment is clear; feedback results are sent to a user terminal according to needs; illegal operation in the business system can be avoided; supervision standards are unified; audit quality after business handling can be improved; the early warning information management of the business data of the business system is strengthened; as for some systems, with an aid function well provided, the quality of services can be improved, and people's satisfaction can be improved; the image of the user can be enhanced; through system classified statistic modeling, decision-making data can be provided for the promotion of the healthy development of work; and business handling quality and efficiency can be further improved, and the business handling efficiency can be increased by more than 50%.
Owner:尚德软件股份有限公司

Voice recognition character string processing comparison method based on Pinyin

The invention relates to a voice recognition character string processing comparison method based on Pinyin. For application of an existing voice recognition technology to certain special occasions ofperson name recognition, equipment name recognition and the like, errors are generated easily due to incorrect comparison. The method is "secondary processing" based on a general Chinese character recognition algorithm; and recognized Chinese character strings are converted into Pinyin strings, and then the Pinyin strings are compared with target Pinyin strings. The method comprises the followingsteps of 1, performing Pinyin coding: performing coding on all Chinese character Pinyin, wherein the coding is similar to coding of unicode; and enumerating all Chinese character Pinyin combinations;2, performing code conversion: converting the character strings, with coding modes of GBK, Unicode, UTF-8 and the like, for expressing Chinese characters converted into the Pinyin strings; and 3, performing polyphone processing: enumerating polyphones of all family names; performing special processing; and distributing the same Pinyin codes. According to the method, accurate recognition can be rapidly realized, so that misjudgment is avoided.
Owner:深圳市艾塔文化科技有限公司

AOP annotation-based call chain tracking and service analysis method

PendingCN113986669AOptimizerTo achieve the purpose of buryingCode refactoringHardware monitoringMicro servicesEngineering
The invention discloses an AOP annotation-based call chain tracking and service analysis method, which comprises the following steps of: adding an annotation during development, and initiating call chain tracking; recording the calling chain information by using a log, and connecting the micro-service and the calling relationship in series by using the TraceID; adding StepID between micro-service calling chains, and identifying the nested relation of service calling in the calling chains; performing bidirectional association, establishing a relationship between the call chain and the business, and recording the relationship between the call chain TraceID and the business ID by using a log; judging whether the system is abnormal or not, and if not, judging whether tracking is ended or not; if so, positioning and marking abnormal information by using a log, and judging whether tracking is ended or not; and finally, enabling a developer to query logs and exception information from different dimensions to optimize codes to solve exceptions. According to the method, the micro-service calling chain and service analysis function is achieved by recording the relation between the calling chain and the service, when the program is abnormal, checking is conducted from the two aspects of the calling chain and the service, and developers are helped to rapidly position the abnormity and repair vulnerabilities.
Owner:北京航天云路有限公司

Intelligent building with intelligent community property management device

InactiveCN112037385AKeep your identity safeFunction increaseIndividual entry/exit registersCyber crimeNetwork on
The invention discloses an intelligent building with an intelligent community property management device, which comprises an identification system, a database comparison system, a network crime system, a security system and an information management system, and is characterized in that the identification system is used for performing safety identification on personnel entering the intelligent building; wherein the database comparison system is used for comparing identities of identification personnel with background data, the network crime system is used for comparing identity information of the identification personnel with crime information published on a network, the security system is used for field check, and the information management system is used for carrying out corresponding management operation on existing personnel information in a database. The identification system comprises an access control mechanism. The corresponding mechanism is additionally arranged in a property access control system, so that the functions of the access control system are increased, the access control system is safer and more reliable to use, free access of illegal criminals is avoided, the loophole of property management is made up, and therefore, the safety of an intelligent building can be ensured.
Owner:嘉兴新博信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products