Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

56results about How to "Not to be stolen" patented technology

System and method for implementing security protection of PIN code

The invention discloses a system and a method used for protecting a PIN code. When the PIN code of the user requires verification, USB KEY hardware equipment generates random numbers and submits the numbers to completely-self-protected equipment, and then the completely-self-protected equipment sends the numbers into security equipment. The security equipment pops up a PIN code input prompt box into which the user inputs the PIN code by a keyboard. The security equipment guarantees the safety of data transmission between the user keyboard and the security equipment. After inputting the PIN code, the user clicks OK. The security equipment abstracts and processes the random numbers and the PIN code input by the user, and returns the outcome data after abstracting and processing to the completely-self-protected equipment. The completely-self-protected equipment sends the outcome data after abstracting and processing to the USB KEY hardware equipment for verification. The invention solves the potential safety hazards caused by a plaintext method adopted in the PIN code verification process of the existing USB KEY software equipment, thus realizing effective protection of the PIN code, and improving the safety of USB KEY further.
Owner:INDUSTRIAL AND COMMERCIAL BANK OF CHINA

Mobile payment security system for wireless data private network physical isolation internet

The invention provides a mobile payment security system for the wireless data private network physical isolation internet and aims to provide a mobile payment security system which has the advantages that interactivity is strong, internet invasion can be evaded, payment information is not prone to being stolen by a trojan, internal network data transmission is secure and reliable, internet access is not affected, an SIM card can be prevented from being copied. According to the technical scheme, application systems including a payment server and an authentication device are established in a mobile payment security data network which is isolated from the internet, the mobile payment security data network links with an APN or a VPDN, wherein the APN or the VPDN is isolated from the internet and connected with a GSN mobile gateway, the payment sever account establishment, mobile phone number, IMSI number and password four-in-one binding multiple authentication through a password authentication device and a mobile phone number authentication device; when the mobile payment security data network is networked, an internet access channel is automatically disconnected; after physical isolation of the internet succeeds, graphical verification code information interaction is performed between the mobile payment security system and the mobile payment server through a base station.
Owner:龙岩荣创信息科技有限公司

Method and system for driver identification and supervision

InactiveCN108162975AEnsure consistencyRealize the integrated audit of witnesses and witnessesBelt control systemsDigital data authenticationDriver/operatorSeat belt
The invention discloses a method and system for driver identification and supervision. The method comprises the following steps: (1) inputting driver information; (2) identifying a driver, quickly recognizing the face of the driver through a first camera device, transmitting face information to a security system host which determines whether the face information of the driver is consistent with prestored key information of the face of the driver, authenticating the identity of the driver and performing the step (3) if the face information of the driver is consistent with the prestored key information of the face of the driver, and not authenticating the identity of the driver and forbidding the driver to enter a vehicle if the face information of the driver is not consistent with the prestored key information of the face of the driver; (3) allowing the driver whose identity is authenticated to enter the vehicle and determining whether the driver wears a seat belt through a second camera device for recognizing a whole driving image. The method and system for driver identification and supervision disclosed by the invention can effectively check the consistency of the driver and a driver license and monitor in real time during the driving process so as to ensure driving safety.
Owner:XIAMEN LENZ COMM

Safety login method based on domestic cryptographic algorithm

ActiveCN105162808AImprove securityPrevent illegal attacksTransmissionClient-sideNetwork management
The invention discloses a safety login method based on a domestic cryptographic algorithm. Service-end login software and client-end login software are installed on an embedded device and a debugging computer respectively. The embedded device is connected with the debugging computer through a network interface. A client end remotely logs in a device through a network. The login software uses a secret key verification method. A user may log in the device just after a client-end secret key and a service-end secret key pass respective identity verification so as to perform encrypted session. The safety login software is installed on the client end. On the premise that an original function of the device is not changed, a new authentication mode is used and plaintext transmission is converted into cryptograph transmission. Thus, a risk bug in the conventional remote login software is solved, communication security between the network equipment and external environment is improved, and malicious attack to network management is effectively defended.
Owner:成都卫士通信息产业股份有限公司

Edge machine learning system and method based on container cloud platform

The invention discloses an edge machine learning system based on a container cloud platform. The edge machine learning system comprises an infrastructure subsystem, an edge routing subsystem, a storage subsystem, a machine learning computing equipment subsystem and a platform management subsystem. All the subsystems are containerized into edge container cloud platform service, resource scheduling,operation monitoring and the like are achieved in a service mode, and rapid deployment, operation and maintenance and release of the machine learning computing system based on the container cloud technology are achieved. According to the self-organizing cooperation method between the edge machine learning systems, distributed control and a multi-center network structure are achieved through interaction of the edge machine learning systems in a self-organizing communication mode, the identity correctness of the two communication parties is guaranteed through the access authentication technology, and it is guaranteed that important network propagation content is not stolen. The invention further provides a container inner volume collaborative migration method between the edge machine learning systems, data between the container cloud platforms can be migrated mutually through container inner volume collaborative migration, and service integrity and inertness are guaranteed.
Owner:上海雾宇科技有限公司

Terminal information security method and device

ActiveCN102271332ANot to be stolenSolve problems that are not conducive to protecting the privacy of usersSecurity arrangementSecuring communicationInformation confidentialityPassword
Disclosed is a method for concealing terminal information, comprising: creating a first password and one or more second passwords for terminal information, and setting authorized information and unauthorized information according to the terminal information; when a login user logs in with the second password, on the foreground of the terminal, according to an operation of the login user, displaying information of normal processing of the authorized information and / or unauthorized information, and on the background of the terminal, executing an operation of the login user on the authorized information, and intercepting an operation of the login user on the unauthorized information; when the login user logs in with the first password, on the foreground and the background of the terminal, according to an operation of the login user, displaying and executing normal processing of the authorized information and unauthorized information. Also disclosed is a device for concealing terminal information. The technical solution of the present invention can completely and unnoticeably protect private information in a user terminal from being stolen by others.
Owner:ZTE CORP

Intelligent track flaw detection combined vehicle and a control method

The invention belongs to the technical field of railway construction monitoring, and discloses an intelligent track flaw detection combined vehicle and a control method thereof. The intelligent trackflaw detection combined vehicle and the control method apply the internet of things technology and the modern control technology to realize self-walking, high precision, easy operation and remote control, assist to complete the railway fault detection of the large-scale flaw detection vehicle; Intelligent unmanned operation, self-walking, recording and real-time transmission of damage, mileage andline characteristics signals are realized; The flaw detection signals recorded by computer are processed to realize no take-off and landing or automatic take-off and landing. The invention is provided with two functional modules of manual detection and automatic detection, which can realize self-walking, high precision, easy operation and remote control by using the internet of things technologyand the modern control technology. At the same time, the industrial design elements are designed. It can not only help to complete the railway fault detection of large-scale flaw detection vehicle, but also completely replace the railway maintenance task of manual flaw detection equipment, which can better meet the requirements of track flaw detection.
Owner:SICHUAN UNIVERSITY OF SCIENCE AND ENGINEERING

Static data encryption protection method and system

The invention relates to a static data encryption protection method and system. The static data encryption protection method comprises the steps of: registering information of a server host where a client is located to a server; distributing a master key for a directory or a file of the server host at the server, generating an encryption control strategy and issuing the encryption control strategyto a corresponding client; allowing the client to acquire a corresponding master key from the server according to the encryption control strategy; when data is written into the encrypted directory orfile, randomly generating a data key, and encrypting the directory or file by using the data key so as to obtain an encrypted file; and encrypting the data key by using the master key so as to obtaina key ciphertext, and writing the key ciphertext into the head of the encrypted file so as to finish data writing. According to the invention, the client executes encryption and decryption operationof the file, and the server achieves server host management, secret key management, control strategy management and the like, so encrypted file transparent access and key and strategy unified management are achieved; file management and use permission are separated; and the safety of file protection is improved.
Owner:山东三未信安信息科技有限公司

Internet of Things security system based on cryptographic technology and communication method

The invention belongs to the technical field of passwords, and discloses an Internet of Things security system and communication method based on a password technology, and the method comprises the steps: registering equipment identifier and an application identifier, and generating a protection secret key, a sign-in secret key, a data secret key, an instruction secret key, a half secret key, a CPKsecret key and an SM9 secret key; encrypting all the generated secret keys and then safely storing the secret keys; sending a request carrying a terminal identifier to the cipher machine, and performing data encryption transmission after the request is authenticated and negotiated by the registration equipment and the cipher machine; and through data encryption transmission, enabling the cipher machine to decrypt the encrypted data after receiving the encrypted data. A symmetric algorithm or an identification cryptographic algorithm is used, a series of software and hardware products are combined, the safety of the Internet of Things is integrally achieved, and the functions of secure channel, secure storage, data encryption, identity authentication, digital signature and the like are rapidly achieved. According to the invention, the data in the Internet of Things is prevented from being stolen and tampered, the identity is credible, and the data can be transmitted secretly.
Owner:北京安御道合科技有限公司

A full-text retrieval method based on encryption and decryption algorithm

The invention discloses a full-text retrieval method based on an encryption and decryption algorithm, which is used for realizing the encryption processing of the full-text retrieval index file and improving the security of the full-text retrieval. The invention provides a full-text retrieval method based on an encryption and decryption algorithm. The method comprises the following steps: the index result of a plaintext document data source is encrypted by using a preset index encryption algorithm and stored in a ciphertext index database; a preset document encryption algorithm is used to encrypt all the plaintext documents in the plaintext document data source and store the plaintext documents in a ciphertext document library; the index encryption algorithm is used for encrypting the retrieval request of a user to obtain ciphertext keywords; and the index encryption algorithm is used for encrypting the retrieval request of the user to obtain ciphertext keywords, the ciphertext index library is searched according to the ciphertext keyword, the ciphertext document library is searched according to the searching result, and the ciphertext document corresponding to the searching request is output; a preset document decryption algorithm is used to decrypt the ciphertext document to obtain a plaintext document retrieved for the user.
Owner:福建南威软件有限公司

Heat dissipation anti-theft mobile phone housing

The invention discloses a heat dissipation anti-theft mobile phone housing. The heat dissipation anti-theft mobile phone housing mainly comprises a baseboard, an anti-theft hole, a headset hole and a peripheral edge. The baseboard and the peripheral edge form an installation case of a mobile phone. The mobile phone is embedded in the peripheral edge. The baseboard comprises heat dissipation grooves, ventilation grooves and connecting boards. The ventilation grooves are of groove structures. Connecting boards are formed between ventilation grooves. The connecting boards on the baseboard are contacted with the back of the mobile phone. The ventilation grooves are provided with the heat dissipation grooves. The anti-theft hole and the headset hole are on the same short side of the periphery edge. The headset hole on the peripheral edge is corresponding to a headset hole of the mobile phone. A headset wire of the mobile phone passes through the anti-theft hole and is inserted into a headset jack of the mobile phone through the headset hole. According to the heat dissipation anti-theft mobile phone housing, heated air in the ventilation grooves is discharged from the heat dissipation grooves, the air convects due to local negative pressure, so that the heat of the mobile phone is taken away rapidly and the temperature of the mobile phone is lowered. The anti-theft hole can prevent the headset wire from be separated from the mobile phone housing or delay separation of the headset and the mobile phone, so as to warn people to protect the mobile phone from being stolen.
Owner:王昊仑 +1

ETC payment clearing method, device and apparatus based on alliance chain

The invention discloses an ETC payment and settlement method, device and apparatus based on an alliance chain which can achieve the payment and settlement of ETC more quickly and accurately based on the pre-built alliance chain. The method comprises the steps of firstly obtaining payment transaction information in a to-be-cleared ETC channel, and then uploading the payment transaction information according to a pre-constructed alliance chain; wherein the alliance chain comprises a ministry networking settlement management center, a provincial and municipal networking settlement management center, a clearing bank and a client, and then processing payment transaction information on the chain according to an intelligent contract in the alliance chain to obtain an ETC payment clearing result.
Owner:AGRICULTURAL BANK OF CHINA

Exhibit protection system

The invention relates to the field of electronic monitoring equipment, in particular to an exhibit protection system. The invention puts forward the exhibit protection system. The system comprises a vibration sensor, electronic fence monitoring devices and an alarm, wherein the vibration sensor is installed on a display case; the electronic fence monitoring devices are arranged around the displaycase; the triggering end of the alarm is connected with the output end of the vibration sensor and the output ends of the electronic fence monitoring devices; and in addition, the alarm is connected with a wireless communication module. By use of the system, the electronic fence and the vibration sensor serve as dual protection, the alarm can be triggered to emit an alarm signal no matter when theelectronic fence monitoring system monitors exceptions or the vibration sensor detects exceptions, meanwhile, the alarm signal is transmitted to a mobile terminal held by an on-duty monitoring room or security personnel through a network, and relevant personnel are notified in time to process. By use of the system, the exhibits can effectively prevent from being damaged or stolen, and in addition, the system has the advantages of simple structure, convenience in debugging and low cost.
Owner:大连智识科技发展有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products