Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

124results about How to "Not to be leaked" patented technology

Terminal data protecting method, system as well as mobile communication terminal

The invention relates to protection method and system and a mobile communication terminal for terminal data, and belongs to the wireless communication field. The method comprises the steps that the restarting code is verified if restarting occurs when the terminal is stolen, the terminal is recognized to be stolen and locked if the code is wrong; the user data stored at the stolen terminal is backed up; if restarting does not occur, operation instruction is remotely sent to the stolen terminal to back up the user data stored at the stolen terminal to a server. An identification authentication ID number issued simultaneously with the mobile communication terminal can be used for identifying the control right of the users to the mobile communication terminal and protect the control right; the users can perform anti-theft operation through logging in the server without setting the anti-theft function on the mobile communication terminal in advance; moreover, the adoption of the protection method and system and the mobile communication terminal can ensure the private data of the users to be protected and backed up immediately, thus protecting private data at the mobile communication terminal against leakage.
Owner:YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD

Self-lubricating harmonic reducer

The invention discloses a self-lubricating harmonic reducer. The self-lubricating harmonic reducer comprises a wave generator, a rigid gear and a flexible gear, wherein the rigid gear is meshed with the flexible gear; the wave generator is in contact with the inner wall of the flexible gear; an oil seal is arranged on an input shaft of the wave generator or an output end of the reducer in a sealing manner; a lubricant cavity is formed among the oil sea, the wave generator and the flexible gear; the oil seal comprises a ring-shaped base part; an elastic lip edge overhangs outwards from the outer side wall of the base part; the elastic lip edge is slantly arranged toward the wave generator; the overhanging tail end of the elastic lip edge tightly presses against the inner wall of the flexible gear. According to the reducer disclosed in the invention, the lubricant cavity, rather than the whole cavity in the flexible gear, is filled with the lubricant, so that the weight of the lubricant is decreased; the lubricating supply for the rigid gear and the flexible gear can be completed, and the flowing direction of the lubricant is not influenced by the mounting direction of the harmonic reducer, so that the favorable lubrication for the rigid gear and the flexible gear is ensured, the torn-up scrap iron of the rigid gear and the flexible gear is prevented from flowing back to the flexible bearing along with the lubricant, and the service life of the reducer is prolonged.
Owner:铂睿(山东)精密工业有限公司

Automatic destruction structure for information of electronic equipment

The invention provides an automatic destruction structure for information of electronic equipment. The automatic destruction structure comprises a chassis of the electronic equipment, a key destruction switch module arranged on the inner side of the wall of the chassis and a secrete key storage plate in the chassis. The secrete key storage plate comprises a key destruction switch plug, a storage chip and a battery, and an information erasing program is set in the storage chip. The key destruction switch module comprises a key destruction switch, the key destruction switch is provided with a switch head, and the key destruction switch module forms an information destruction circuit with the secrete key storage plate and the battery through the key destruction switch plug, wherein the information destruction circuit can be closed. A normal working state is determined for the switch head in advance, after the normal working state is changed, the information destruction circuit formed by the key destruction switch module, the battery and the storage chip is closed, the battery supplies power to the storage chip, an information erasing program is started, and secrete key information on the storage chip is destructed. The automatic destruction structure for the information of the electronic equipment has the advantages of having an automatic destruction function and a manual destruction function and being good in device concealing performance and high in device stability and reliability.
Owner:成都卫士通信息产业股份有限公司

Safety production information sharing method based on block chain technology

The invention discloses a safety production information sharing method based on a block chain technology, and belongs to the technical field of safety production information sharing. The safety production information sharing method is characterized in that an enterprise end is provided with information managing equipment and information publishing equipment; through the information managing equipment, the type and safety management information of an enterprise are input, and the information managing equipment uploads the safety management information to a block chain module; through an intelligent contract of the block chain, the uploaded safety management information is classified, the safety management information of the corresponding type is sent to the information publishing equipmentof the enterprise of the corresponding type, and the safety management information is publicized; the block chain module saves the safety management information uploaded through a distributed information account book. The problems are solved that in transmission sharing of existing production safety information, resource enterprise information easily leaks, and the transmission information has asymmetric lag; the enterprise can timely receive the safety management information in the field, and the leakage of the enterprise information in the information sharing process is reduced.
Owner:赛飞特工程技术集团有限公司

Embedded CPU anti-differential power consumption analysis device and method

The invention discloses an embedded CPU anti-differential power consumption analysis device and method. The device comprises an embedded CPU, a random interrupt generation module, a random instructiongeneration module and a true random number generator. The true random number generator is used for generating a true random number, the random interrupt generation module is used for generating a random interrupt signal according to the true random number, the random instruction generation module is used for generating a random instruction according to the true random number, and the embedded CPUexecutes the random instruction according to the random interrupt signal. According to the invention, the random instruction insertion mode is used, the power consumption generated when the embeddedCPU executes encryption and decryption operation is disturbed, and under the condition that an original embedded CPU is not modified, the encryption and decryption processes of DPA protection and CPUprotection are carried out on the embedded CPU, and therefore when a user uses the embedded CPU for encryption and decryption, an attacker can be prevented from cracking a secret key through DPA, andencrypted information is protected against leakage.
Owner:ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID CO LTD +2

Method and device for decryption with website certificate private key of target website

The invention aims at providing a method and a device for decryption with a website certificate private key of a target website. Concretely, a decryption network device sends a query request about anencrypted website certificate private key to a corresponding CA distribution management network device, receives the encrypted website certificate private key sent by the CA distribution management network device in response to the query request, performs decryption processing for the encrypted website certificate private key based on a private key generated by a corresponding hardware RSA decryption card so as to obtain a plaintext of the website certificate private key. Compared with the prior art, the method and the device provided by the invention realize the following beneficial effects:during a distribution process of the website certificate private key, the website certificate private key is encrypted, and asymmetric encryption is used, thus, safety of an encrypted secret key is guarantee further; and neither the hardware RSA decryption card nor the decryption network device where the hardware RSA decryption card is located stores the plaintext or a ciphertext of the website certificate private key permanently, so that the risk of being stolen of the website certificate private key is reduced further.
Owner:BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD

Secure isolation system applied to PROFINET industrial Ethernet

The invention discloses a secure isolation system applied to a PROFINET industrial Ethernet. Taking the PROFINET real-time Ethernet with wide application prospect as a research object, a PROFINET-based dedicated industrial information security device is developed by combining a PROFINET communication protocol depth detection function with a general industrial firewall function. Besides the functions of blocking network attack and defending viruses, preventing unauthorized access of a control network and field equipment and protecting general information security of data encryption, identity authentication and the like, the system also deeply analyzes the communication characteristic of the PROFINET network, and effectively recognizes abnormal communication situations on the network by predicting network communication behaviors according to configuration information and monitoring a communication relation, a real-time throughput and a non-real-time bandwidth at the initial networking stage, as well as deeply detecting data packets of a PROFINET application layer and the like. When a security threat appears, the contact between the PROFINET network and the external network is timely ''isolated'', and a hazard identification processing and alarm log is sent, so that security download can be performed on an out-of-control or fault main station.
Owner:INSTR TECH & ECONOMY INST P R CHINA

Communication method and device based on team instant messaging application and storage medium

The invention provides a communication method and device based on a team instant messaging application and a storage medium, which are used for reducing communication obstacles among users and improving the working efficiency on the premise of protecting private information of the users. The method comprises the steps of in response to a call request for carrying out a call by using a public fee telephone, determining a calling subscriber identity label and a called subscriber identity label carried in the call request, wherein the call request is obtained by triggering a dialing entrance corresponding to a telephone number hiding mode in a personal information display page of the team instant messaging application client; and sending a communication request carrying the calling user identity identifier and the called user identity identifier to a server, so that the server sends a callback request to the calling user terminal and the called user terminal to establish a call. Accordingto the team instant messaging application, on the premise of ensuring that the telephone number is not leaked, the requirement of communication between users through the telephone number is met, communication obstacles between the users are reduced, and the working efficiency is improved.
Owner:TENCENT TECH (SHENZHEN) CO LTD

Application authority control method and device, and mobile terminal

The invention provides an application authority control method and device in an Android system, and a mobile terminal. The method comprises steps that when predetermined privacy trigger operation is detected, the application installation list information is acquired; based on the acquired application installation list information, the installation packet information of each application is acquired; based on the acquired installation packet information of each application, whether each application has predetermined danger application authorities is determined; when any application is determined to have any item of the predetermined danger application authorities, a state of the predetermined danger application authority of the application is modified to be a prohibition state. The method is advantaged in that all the applications installed on the mobile terminal are automatically prohibited from acquiring the danger application authorities, the privacy information and the property information of the user are guaranteed to not be acquired by malicious applications or not be leaked by other applications; privacy safety and property safety of the user are guaranteed, and Android system safety is further improved.
Owner:BEIJING YUANXIN SCI & TECH

Customized position data privacy protection system and method for mobile terminal application

The invention belongs to the technical field of information security, and discloses a customized position data privacy protection system and method for a mobile terminal application, and the method comprises the steps: searching an application on an intelligent terminal, and listing applications participating in a position information-based service for the user; obtaining position information of the user according to the parameter k provided by the user, dividing a map and generating two false positions and corresponding false position paths according to the parameter t provided by the user; and monitoring and hijacking all applications participating in the location information-based service on the intelligent terminal, and providing location information or two false locations and corresponding false location path locations of the intelligent terminal. The position privacy data of the mobile terminal user is protected, and the position data of the user is prevented from being leaked; the flexible deployment of the intelligent terminal user position privacy data protection system is realized; the location data privacy of the intelligent terminal user can be protected on the premiseof normally providing location information-based service.
Owner:XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products