Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

52results about How to "Prevent illegal intrusion" patented technology

Safety authentication method and system for wireless network

The invention discloses a safety authentication method and a safety authentication system for a wireless network. The system comprises a signal fingerprint monitoring and processing module and a wireless network access authentication module at an access point. The method comprises the following steps that: at a network access point, the signal fingerprint monitoring and processing module performsdown-conversion and digitized sampling on a detected steady-state communication signal and extracts the conventional signal characteristic and the spurious signal characteristic of the steady-state signal by a communication signal processing method; after a higher-dimension spurious signal characteristic is reduced and optimized, the conventional signal characteristic and the spurious characteristic are fused into a steady-state signal fingerprint; and a signal fingerprint matching and safety authentication module matches the monitored steady-state fingerprint of unknown communication equipment and provides a corresponding safety strategy service according to a recognition result by a network authentication protocol. The method and the system are used for performing safety authentication on wireless communication equipment and enhancing the safety of a wireless communication network in combination with a software authentication system and have the characteristics of high concealment, high stability and safe management.
Owner:HUAZHONG UNIV OF SCI & TECH

Connection method and connection device for intelligent housing system

The invention discloses a connection method and connection device for an intelligent housing system. The method includes the steps of obtaining a connection request instruction, wherein the connection request instruction includes verification data; extracting the verification data from the connection request instruction; judging whether the verification data are matched with pre-stored data or not, showing that the request succeeds and sending the connection request instruction to the intelligent housing system if the verification data are matched with the pre-stored data; showing that the request fails if the verification data are not matched with the pre-stored data. In this way, before a control terminal is connected with the intelligent housing system, whether the control terminal is a legal control terminal or not needs to be judged at first; in other words, after the control terminal sends the connection request instruction, the connection device obtains the verification data from the connection request instruction, whether the verification data are matched with the pre-stored data or not is then judged, and whether the request succeeds or not is decided. By means of the technical scheme, the safety of the connection of the intelligent housing system is improved, and the situation of the illegal intrusion is effectively avoided.
Owner:GREE ELECTRIC APPLIANCES INC OF ZHUHAI

Remote safe meter reading method

The invention discloses a remote safe meter reading system, comprising a background management center, a collection module and front-end equipment. A remote safe meter reading method comprises the following processes: 1) sending a meter reading command by the collection module; 2) reporting the command to the background management center; 3) validating the identity of a gatherer; 4) extracting an identity (ID) of the collected front-end equipment; 5) generating a new session key; 6) encrypting the extracted ID information and metering reading command; 7) transmitting information to the front-end equipment, and transmitting the session key to the collection module and the front-end equipment; 8) decrypting and confirming information by the front-end equipment; 9) reading data by the remote meter reading module; 10), packaging and encrypting the ID information, collected data and MAC check code and then transmitting to the collection module; 11) receiving the ID information and data; 12) uploading the data to a safety server; and 13) storing and updating information by the safety server. The functions of identity authentication and data encryption are achieved in the remote meter reading process, and the security level is greatly improved.
Owner:山东微分电子科技有限公司

Remote vehicle door control system

The invention discloses a remote vehicle door control system. The remote vehicle door control system comprises a remote control module used for sending a vehicle door unlocking instruction and receiving a vehicle door unlocking state, an Internet of Vehicles platform used for sending the vehicle door unlocking instruction with verification and authentication information and feeding back a receivedvehicle door unlocking state to the remote control module, a vehicle-mounted terminal module used for carrying out safety verification after receiving the vehicle door unlocking instruction and sending the vehicle door unlocking instruction with verification and authentication information to a vehicle body control module after the verification succeeds, and the vehicle body control module used for carrying out safety verification after receiving the vehicle door unlocking instruction, controlling a vehicle door to be unlocked after the verification is successful, and feeding back the vehicledoor unlocking state to the vehicle-mounted terminal module. Safety verification is carried out during vehicle door unlocking information communication, local illegal invasion door opening is effectively avoided, and the safety of vehicle door control is greatly improved.
Owner:DONGFENG COMML VEHICLE CO LTD

Device search and location method and intelligent linkage management method

InactiveCN108052660ASolve the problem of large security risks in operation and maintenanceRealize 3D visualization displayData processing applicationsGeographical information databasesDevice failureComputer science
The invention relates to a device search and location method and an intelligent linkage management method. The method includes the following steps that machine-room parameter information of each machine room is obtained, according to the machine-room parameter information, internal parameter information of each machine room is obtained, and according to the internal parameter information of each machine room, a 3D visualized environment is built; attribute information of equipment in machine rooms is obtained, and according to the attribute information of equipment, an equipment database is built; retrieval content is obtained, according to the retrieval content, data in the equipment database is called to be compared with the retrieval content, and the content of successful comparison isdisplayed. The problems that failure of the equipment in a traditional machine room can not be quickly searched, maintenance can not be timely conducted and thus operation and maintenance of the machine room has many potential safety hazards are solved, 3D visualization display of an equipment cabinet in the machine room is achieved, dynamic calling and equipment inspection can be achieved, the service life of the equipment is prolonged and management work of the equipment are enhanced.
Owner:王开富

Data network security protection method and device, computer equipment and storage medium

ActiveCN110933054AImplement environmental security checksImplement boundary security checksTransmissionDatabaseData Web
The invention relates to a data network security protection method and a device, computer equipment and a storage medium, and the method comprises the steps: carrying out the control check of a data network, and obtaining a control check result; wherein the control check comprises check of a control operation performed on the data network by the logged-in user account; performing program inspection on the data network to obtain a program inspection result; wherein the program inspection comprises inspection of an application program installed in the data network; performing data check on the data network to obtain a data check result; wherein the data inspection comprises inspection of data information entering and exiting the data network; performing connection check on the data network to obtain a connection check result; wherein the connection check comprises check of an internal and external connection relationship of the data network; and performing security management and controlon the data network according to the check result. Internal and external comprehensive protection of the railway signal safety data network is realized, the closure and independence of the railway signal safety data network are ensured, and the railway signal safety data network has high-grade safety protection capability.
Owner:BEIJING SWJTU RICHSUN TECH

Automatic intelligent anti-theft door device

The invention discloses an automatic intelligent anti-theft door device. The automatic intelligent anti-theft door device comprises an intelligent terminal, a first level switch chip, a second level switch chip, a fingerprint sensing circuit, a voice circuit, a driving circuit, a clock chip, a camera, a locating system, an input device and a displayer, wherein the first level switch chip, the second level switch chip, the fingerprint sensing circuit, the voice circuit, the driving circuit, the clock chip, the camera, the locating system, the input device and the displayer are connected with the intelligent terminal. The first level switch chip is connected with a door magnetism sensing circuit, the second level switch chip is connected with a vibration sensing circuit, the fingerprint sensing circuit is installed on the outer surfaces of keys of the input device, the driving circuit is connected with a control circuit, and the locating system is connected with a remote receiving device. As the fingerprint sensing circuit is installed on the outer surfaces of the keys of the input device, a fingerprint recognition circuit can be concealed, and the safety of the automatic intelligent anti-theft door device is greatly improved; as a password lock is combined with fingerprint recognition, only when passwords and fingerprints are correct, can a door be opened, and illegal invasion is effectively prevented.
Owner:CHENGDU LEWEISI TECH

External terminal protection equipment and protection system comprising identity information verification

The invention discloses external terminal protection equipment and a protection system comprising identity information verification. The external terminal protection equipment comprises: a plurality of external interfaces used for being connected with one or more external equipment and a piece of protected equipment respectively; the identity information acquisition module that is used for acquiring identity information of a user in real time; the file monitoring module that is connected with the identity information acquisition module, is used for verifying the identity information, and is also used for controlling the security authentication of external equipment accessed to the external interface; and the file transmission module that is connected with the file monitoring module and isused for transmitting the file data imported by the external equipment to the protected equipment under the control of the file monitoring module. According to the invention, the purpose of performingsafety protection on the protected equipment without installing safety protection software on the protected equipment can be achieved, and the safety risk of the system is greatly reduced by verifying and determining the identity and the use permission of the current operator.
Owner:北京中科麒麟信息工程有限责任公司

Power quality intelligent comprehensive optimization device with field vibration wireless alarming function

The invention provides a power quality intelligent comprehensive optimization device with a field vibration wireless alarming function. A DVR (Dynamic Voltage Restorer) converter, a first DC capacitor and an APF (Active Power Filter) converter are in parallel connection to form a first compensation loop for voltage compensation; a DVR converter, a second DC capacitor and a second APF converter are in parallel connection to form a second compensation loop for harmonic processing and reactive power compensation; a load compensator is used for recording parameters such as starting, operation and removing of a specific load; a DC voltage fluctuation suppressor is used for suppressing DC voltage of the first DC capacitor and the second DC capacitor; and a network controller is used for controlling voltage compensation of the first compensation loop, controlling harmonic processing and reactive power compensation of the second compensation loop and providing a corresponding compensation algorithm according to a parameter change rule in the load compensator. Thus, voltage drop is compensated in the case of power grid voltage drop, harmonic processing and reactive power compensation are carried out in the case of no drop, the voltage fluctuation can be suppressed to acquire a high-quality output waveform, and the power consumption quality compensation speed is improved for the user.
Owner:WENZHOU POLYTECHNIC

Blockchain data transmission platform convenient for region accuracy

The invention discloses a blockchain data transmission platform convenient for region accuracy, and specifically relates to the technical field of blockchains. The blockchain data transmission platform comprises a block chain platform, the connection end of the block chain platform is provided with a plurality of uniformly distributed clients, the clients are electrically connected with the blockchain platform through a wireless transmission module, the connection end of the block chain platform is provided with a firewall, and the block chain platform is internally provided with an event processing system and an event checking system. According to the invention, the coding module, the encryption module and the block chain self-checking module are matched to organize the events into timelines, and the timelines are encrypted and stored; information processing vulnerabilities can be avoided, and the accuracy of transaction records is improved; the event retrieval module retrieves the reference compressed file according to the input keyword and obtains the event viewing qualification according to the verification code, and the event record reading module extracts the event encryptedfile, decodes and interprets the event encrypted file and sends the event encrypted file to the client, so that quick search of blockchain data is facilitated, and the accuracy of transaction information reference is improved.
Owner:力当高(上海)智能科技有限公司

Three-phase unbalanced governance device with on-site vibration alarm function and realization method thereof

The invention provides a three-phase unbalanced governance device with an on-site vibration alarm function and a realization method thereof. A data acquisition unit is used to acquire the current characteristic data of a power grid. A voltage dip knowledge base forming unit extracts data with the same characteristic type with the characteristic data from historical data, classifies the extracted data to form a sample set according to a preset class attribute, and further screens out data which meet a predetermined condition from the sample set to form a voltage dip strong association rule knowledge base. According to the current characteristic data of the power grid, a recognition unit determines the current voltage dip reason of the power grid in the voltage dip strong association rule knowledge base. A governance unit determines a power grid power quality governance compensation scheme according to the current voltage dip reason, and compensates the user side voltage according to the power grid power quality governance compensation scheme. According to the invention, the dependence on waveform is avoided; and based on the analysis of the historical data, a strong association rule in historical voltage dip is excavated to realize the prediction and governance of the possibility of future voltage dip.
Owner:WENZHOU POLYTECHNIC

Sliding window principle-based optical fiber segmented hydrophone system

The invention discloses a sliding window principle-based optical fiber segmented hydrophone system. The system mainly comprises an optical fiber, a laser, an erbium-doped fiber amplifier (EDFA), an APD, an ADC, a DSP, and an upper computer. The optical fiber is arranged in an underwater protective region. The laser is used for emitting light waves. The erbium-doped fiber amplifier (EDFA) is used for amplifying optical pulses. The APD is used for converting photoelectric signals. The ADC is used for converting electric signals into digital signals. The DSP is used for processing digital signals. The upper computer is used for further processing identification signals and displaying the alarm. Due to the fact that the underwater environment is complex and the detection distance is long, thesegmented detection is carried out on the change of the Ryleigh scattering waveform by adopting the sliding window principle. Therefore, the influence of the complex environment on system detection accuracy is eliminated to the maximum extent. The detection principle of the system is provided and carried out based on the processing of ordered samples in a reference sliding window. The processing flow is as follows: determining the length of an optimal sliding window according to an experiment, sorting samples through a front-edge sliding window and a rear-edge sliding window, figuring out an intermediate value as a reference sliding window value, adopting a difference value between a current point and the reference sliding window value as a vibration value, and determining the invasion type, the invasion position and other information through analyzing the vibration value.
Owner:光子瑞利科技(北京)有限公司

Equipment control authority acquisition method, device and system and storage medium

The invention relates to an equipment control authority acquisition method, device and system and a storage medium. The acquisition method comprises the following steps: obtaining an operation controlinstruction sent to household equipment; judging whether the operation control instruction is consistent with the operation verification condition or not; if the operation control instruction is consistent with the operation verification condition, opening the operation authority of the remote equipment to the home equipment; and if the operation control instruction is not consistent with the operation verification condition, limiting the operation authority of the remote equipment to the household equipment. According to the scheme, when the remote device obtains the control right, the operation control instruction sent to the household equipment is obtained, the operation control instruction is compared with the preset operation verification condition, and the operation authority of theremote device to the household equipment is controlled according to the comparison result of the operation control instruction and the preset operation verification condition. The remote control authority of the household equipment is obtained by operating on the household equipment, so that the household equipment is prevented from being illegally invaded, and the safety of the smart home is improved.
Owner:GREE ELECTRIC APPLIANCES INC +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products