Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

35results about How to "Not stolen" patented technology

Security management method and system for vehicular mobile Internet

The invention discloses a security management method and a system for the vehicular mobile Internet. When an application program accesses a vehicular terminal, the vehicular terminal judges the authorization of the application program. When the authorization of the application program is the runtime authorization of a local access, the application program directly accesses the vehicular terminal information. When the authorization of the application program is the remote authorization of a remote access, the vehicular terminal authenticates the access authority of the application program through a server side. If the authorization is passed, the application program accesses the vehicular terminal information. The server side provides register, application, safe key management and application audit service for application developers of a third party, and the application access authority of the third party is saved in the server side. Through the interaction of the vehicular terminal and the server side and the own management of the vehicular terminal, the method and the system adopt a high-efficiency authentication mechanism and an encryption communication mechanism, so that the safety management of vehicular application is easily realized, and the critical data of the vehicular terminal cannot be embezzled by illegal application. Thus, a car accesses the mobile Internet to share the convenience and fast of the network, and while the privacy data of users cannot be stolen.
Owner:SOUTH CHINA UNIV OF TECH

Anti-counterfeiting source tracing system based on block chain

The invention discloses an anti-counterfeiting source tracing system based on a block chain. The system comprises the following functional modules: (1) a verification code generation module which is used for generating the unique verification code of the product; (2) a verification information storage module which stores verification information in the block chain; (3) a verification code readingmodule which reads external anti-counterfeiting information and identifies the corresponding verification code; (4) a verification code verification module which decodes and identifies the verification code; and (5) a commodity information output module which reads product information out of a database after successful matching. The unified and secure anti-counterfeiting verification mode is provided through the block chain technology and can be additive to the existing external anti-counterfeiting means so that the multistep anti-counterfeiting verification process can be simplified and the cost for anti-counterfeiting verification can be saved. New technical support is adopted so that more product information can be provided on the basis of the original anti-counterfeiting information, and the buyer of the commodity is enabled to participate in the source tracing process of the commodity and get more recognition from the commodity buying process.
Owner:HANGZHOU QULIAN TECH CO LTD

A traceability system based on a block chain

The invention discloses a traceability system based on a block chain, and relates to the technical field of blockchain and information traceability. The system comprises an alliance chain management module, a block chain browser module, a traceability code generation module, an information storage module, an information reading module, a caching module, a commodity information reading module and an SDK module, and the alliance chain management module can manage and maintain block chain nodes and newly add consensus nodes for key link manufacturers on a supply chain in the block chain. According to the traceability system based on a block chain, the information security Tamper-resistant properties of the block chain are utilized;, the information can be protected from being stolen and tampered; the product information can be kept transparent and public in front of consumers; the credibility of the traditional traceability system is improved, the anti-counterfeiting traceability system can adapt to the existing external traceability means on the market, the anti-counterfeiting traceability work of the original product is supplemented and updated, and multiple anti-counterfeiting processes adopted by manufacturers are simplified, so that the labor and financial cost of the work is reduced.
Owner:链极智能科技(上海)有限公司

Embedded system

The present invention discloses an embedded system. The embedded system comprises a flash memory controller, a CPU and a flash memory chip. The flash memory controller is respectively connected with the CPU and the flash memory chip, and the flash memory controller comprises a flash memory system bus interface; a main control unit, which is connected with the flash memory system bus interface; and a flash memory control unit, which is respectively connected with the flash memory system bus interface, the main control unit and the flash memory chip, is used for encrypting program data corresponding to a data write instruction to obtain the program data ciphertext and writing the program data ciphertext to the flash memory chip according to the received data write instruction and the corresponding address, and is further used for, according to the received data write instruction and the corresponding address, reading the program data ciphertext stored in the flash memory chip, decrypting the program data ciphertext to obtain the corresponding program data, and providing the program data for the CPU to execute. According to the technical scheme of the present invention, the program data can be effectively protected from being stolen, so that safe storage of the program data can be realized fundamentally.
Owner:GIGADEVICE SEMICON (BEIJING) INC

Network storage device for multi-terminal synchronization

The invention relates to the technical field of Internet, in particular to a network storage device for multi-terminal synchronization. Comprising a network memory; the network memory comprises a cylindrical shell, a PCB mainboard and a plurality of hard disks; a connecting plug is detachably arranged on one side of each hard disk; a front panel is fixedly arranged on one side of the cylindrical shell; a through hole is formed in one side of the front panel; a U-shaped sliding frame is slidably connected to the inner side of the through hole. A guide limiting device is arranged on one side of the U-shaped sliding frame; and a push-pull plate is fixedly arranged on one side of the U-shaped sliding frame. Through the arrangement of the U-shaped sliding frame, the push-pull plate positioning bottom frame, the pressing frame, the fixing box, the bevel edge clamping head, the U-shaped connecting frame, the T-shaped connecting frame, the tension spring, the storage battery, the CPU module, the power failure prompting module and the charging module, the invention can have the functions of rapid installation, rapid disassembly, poor contact prevention, backup, power failure prevention, power failure prompting and the like, and have high reliability.
Owner:深圳市图美电子技术有限公司

Data security safekeeping equipment and method

The invention discloses a data safekeeping device which comprises a terminal connection device that is provided with an interface connected with an external processing terminal; a data storage device that is used for the user to access to read and write the data; a read-write control device that controls the reading and writing of the data storage device; an equipment shielding device that shields the storage device in the external processing terminal connected with the terminal connection device; and a system management device that is provided with an operating system, a driver program and an application program, and the operating system is guided and operated after the external processing terminal is connected with the terminal connection device. The invention further discloses a data safekeeping method. A self-operating system is used when the data safekeeping device is operated, and shields the original storage device of the external processing terminal, thus avoiding data interaction with the external and achieving high data security requirements. The data safekeeping device can be loaded various identification algorithms and data self-destruction mechanisms, and the data security protection is further enhanced by loading the algorithms such as fingerprint, iris identification and the like.
Owner:SHENZHEN GRADUATE SCHOOL TSINGHUA UNIV

A security management method and system for vehicle-mounted mobile interconnection

The invention discloses a security management method and a system for the vehicular mobile Internet. When an application program accesses a vehicular terminal, the vehicular terminal judges the authorization of the application program. When the authorization of the application program is the runtime authorization of a local access, the application program directly accesses the vehicular terminal information. When the authorization of the application program is the remote authorization of a remote access, the vehicular terminal authenticates the access authority of the application program through a server side. If the authorization is passed, the application program accesses the vehicular terminal information. The server side provides register, application, safe key management and application audit service for application developers of a third party, and the application access authority of the third party is saved in the server side. Through the interaction of the vehicular terminal and the server side and the own management of the vehicular terminal, the method and the system adopt a high-efficiency authentication mechanism and an encryption communication mechanism, so that the safety management of vehicular application is easily realized, and the critical data of the vehicular terminal cannot be embezzled by illegal application. Thus, a car accesses the mobile Internet to share the convenience and fast of the network, and while the privacy data of users cannot be stolen.
Owner:SOUTH CHINA UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products