Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

50results about How to "Prevent illegal modification" patented technology

School intelligent information management system and method

The invention relates to the technical field of educational management and particularly discloses a school intelligent information management system and a school intelligent information management method. The school intelligent information management system comprises a client interaction module, an international synchronization module, a centralized management module and a history recording module, wherein the client interaction module is used for carrying out information interaction between the school intelligent information management system and a client and receiving a request of the client; the request comprises selection on language and application modes; the international synchronization module is used for carrying out language processing of languages; the centralized management module is used for carrying out sorting processing on different information in the request; and the history recording module is used for recording the different information subjected to sorting processing and storing the record. According to the invention, synchronization of student and teacher information management and synchronization of attendance management data are implemented, a time management function is added, and institutionalization, systematization, standardization and automation of a work flow of the school intelligent information management system are implemented.
Owner:新疆卡尔罗媒体科技有限公司

Execution environment virtualization method and apparatus, and virtual execution environment access method and apparatus

The invention discloses an execution environment virtualization method. The method is applied to a mobile terminal. The mobile terminal has a general execution environment provided by hardware. The method comprises the steps of establishing a general virtual machine and a trusted virtual machine for a user in the general execution environment, wherein the general virtual machine is used for executing a general application of the user, and the trusted virtual machine is used for executing a secure application of the user; performing memory allocation for the general virtual machine and the trusted virtual machine, and establishing a mapping relationship between a general memory of the general virtual machine and a physical memory to obtain a first memory mapping table; and establishing a mapping relationship between a virtual physical memory of the trusted virtual machine and the physical memory to obtain a second memory mapping table. According to the method, the two virtual machines are used to simulate the general execution environment and the trusted execution environment for the user, so that the general application and the secure application can run in the independent execution environments, the execution environments of the secure application and the general application are isolated, and the user data security is ensured.
Owner:HUAWEI TECH CO LTD

Method and system for preventing vehicle mileage tampering

The invention provides a method and a system for preventing vehicle mileage tampering. The method comprises the following steps of: obtaining mileage record data of a vehicle; performing data checking calculation on the obtained mileage record data and then obtaining a checking value; performing coding processing on the mileage record data and the checking value obtained after the calculation to form mileage record data backup and storing the mileage record data backup, wherein the storage position of the mileage record data backup is different from a conventional storage position of the mileage record data; during vehicle ignition starting, comparing the mileage corresponding to the mileage record data backup with the mileage obtained from the conventional storage position, and comparing the checking value obtained after the calculation with the checking value corresponding to the mileage obtained from the conventional storage position; if the mileages are consistent and the checking values are consistent, normally displaying the mileage obtained from the conventional storage position by a vehicle instrument; and if at least one item is inconsistent, displaying error prompt through the vehicle instrument. Therefore whether the vehicle running mileage is artificially modified or not can be known, so that the vehicle running mileage is prevented from being illegally tempered.
Owner:CONTINENTAL AUTOMOTIVE WUHU

Digital evidence obtaining system based on Linux environment

The invention discloses a digital evidence obtaining system based on a Linux environment. The system is composed of a host operation trace investigation module, a network operation trace investigation module, a log information investigation module, a memory information investigation module and an evidence fixing module. The host operation trace investigation module comprises a basic operation investigation function and an application information investigation function. The network operation trace investigation module comprises the basic operation investigation function, a network cache investigation function and a network application state investigation function. The log information investigation module comprises a log file analysis and storage function and a keyword search module. The memory information investigation module dumps a memory through adoption of an fmem tool and realizes memory information investigation through combination of a system tool. The evidence fixing module carries out hash processing on an original evidence file and a processed database file. According to the system, workloads of an evidence obtaining investigator are effectively reduced, concepts of evidence obtaining tool engineering and evidence fixing are introduced, and an evidence obtainer is prevented from illegally modifying an evidence file.
Owner:NANJING UNIV OF POSTS & TELECOMM

Cloud platform configuration file management method and management system

The invention discloses a cloud platform configuration file management method and management system. Configuration programs of all components are placed under a specified file path in a plug-in mode;each plug-in comprises two parts of content, wherein the first part comprises personalized configuration item definitions needing to be modified, and the second part comprises a structure of a complete configuration file of the component and names and values of all configuration items; in a cloud platform deployment stage, personalized configuration item definitions of all the components are opened to a user input value, and the names and values of the personalized configuration item definitions input by the user are stored in a specific storage area; and an accessory plug-in program is executed to generate a configuration template file of each component, a file defined by the personalized configuration item of the specific storage area and the configuration template file are called to generate a configuration file of the component, and the configuration file of the component is placed in a configuration folder of the component. According to the configuration method and the configuration system provided by the invention, effective and safe management of multiple types of complex configuration files of the cloud platform can be realized.
Owner:FENGHUO COMM SCI & TECH CO LTD

Starting cartridge

The invention discloses a starting cartridge which comprises a cartridge case, a priming composition layer, a smoke agent layer and a sealed paper pad layer, wherein an opening end thereof is closed in a star shape, and the length of the cartridge case is 8-10 mm; the priming composition layer is paved on an inner cavity bottom of the cartridge case; the smoke agent layer is paved on the priming composition layer; and the sealed paper pad layer is arranged on the smoke agent layer, wherein the sealed paper pad layer is adhered on the cartridge case. Since an opening part is closed in the star shape by substituting the original round shape, the inner diameter of the opening part can be 2 mm less than that of the common starting cartridge so as to effectively prevent the reforming of the starting cartridge caused by loadings such as steel balls and the like. The length of the cartridge case is designed as 8-10 mm, which is only 2 / 3 of the normal starting cartridge; the cartridge case is short so that the volume of the powder chamber is small and the loading dosage of the smoke agent is limited. On the one hand, the illegally changed starting cartridge against society can be prevented; on the other hand, the closed opening is in favor of the full combustion of the smoke agent after the starting cartridge is fired, so that the sound and smog can achieve a regulated index requirement when the volume of the powder chamber is small and the loading dosage of the powder is limited.
Owner:重庆长江电工工业集团有限公司

High-speed photographic apparatus system with identity authentication, data encryption and tamper protection functions

The invention discloses a high-speed photographic apparatus system with identity authentication, data encryption and tamper protection functions. The system at least comprises a high-speed photographic apparatus application terminal, a high-speed photographic apparatus control and interface module, a multimedia information acquisition module, a safety chip module supporting a public key system anda tamper protection module, wherein the high-speed photographic apparatus application terminal and the high-speed photographic apparatus control and interface module are connected by a communicationinterface; the high-speed photographic apparatus control and interface module communicates with the multimedia information acquisition module; the safety chip module supporting the public key system is connected with the high-speed photographic apparatus control and interface module to complete operations of encryption, decryption, signature, signature verification, key exchange and the like; thetamper protection module carries out safety integrity protection of equipment on the high-speed photographic apparatus control and interface module, the multimedia information acquisition module and the safety chip module supporting the public key system.
Owner:SHENZHEN JULINGSHEN TECH CO LTD

Control device and method for leasing air conditioner and air conditioner

The invention provides a control device and method for leasing an air conditioner and the air conditioner. The control device for leasing the air conditioner comprises an Internet of Things leasing module, an air conditioner indoor unit main control module and an air conditioner outdoor unit main control module, wherein the Internet of Things leasing module is in wireless communication connectionwith a server and a user through a base station; and the air conditioner indoor unit main control module is electrically connected with the Internet of things leasing module and the air conditioner outdoor unit main control module. According to the control device and method, the Internet of things leasing module is additionally arranged on the air conditioner, and interacts with the server and theuser through the base station, so that the functions of locking, unlocking, leasing and returning the air conditioner on line are achieved; meanwhile, a leasing air conditioner operator can achieve the administrator function on the background through the server, and the current regional air conditioner operation condition is monitored and controlled in real time; and moreover, an air conditioneroutdoor unit carries out anti-cracking verification by receiving two paths of verification signals of the Internet of Things leasing module and an air conditioner indoor unit, the air conditioner is locked when two continuous verification fails, and the user is prevented from carrying out illegal modification.
Owner:GREE ELECTRIC APPLIANCES INC

Virtualization of execution environment, method and device for accessing virtual execution environment

The invention discloses a virtualization method of an execution environment, the method is applied to a mobile terminal, and the mobile terminal has a common execution environment provided by hardware; a common virtual machine and a trusted virtual machine are established for users in the common execution environment , the ordinary virtual machine is used to execute the user's ordinary application, and the trusted virtual machine is used to execute the user's security application; performing memory allocation for the ordinary virtual machine and the trusted virtual machine, and Establishing a mapping relationship between common memory and physical memory of the common virtual machine to obtain a first memory mapping table; establishing a mapping relationship between virtual physical memory and physical memory of the trusted virtual machine to obtain a second memory mapping table. The present invention utilizes two virtual machines to simulate a common execution environment and a trusted execution environment for users, so that common applications and safe applications run in independent execution environments, so that the execution environments of safe applications and common applications are isolated, and user data security is ensured.
Owner:HUAWEI TECH CO LTD

Terminal equipment network access method and device of block chain, server and storage medium

The invention provides a terminal equipment network access method and device of a block chain, a server and a storage medium, and relates to the technical field of information security. The method comprises the steps that a service node receives a network access verification request of a target terminal node sent by the target terminal node to be accessed to the network, the network access verification request comprises a current feature code of the target terminal node, and the feature code is generated according to a feature parameter of the target terminal node; the service node determineswhether to allow the target terminal node to access the network or not according to the current feature code of the target terminal node and a target feature code of each terminal node pre-stored in the blockchain system, and the target feature code is generated based on factory data of the target terminal node; and if the target terminal node is allowed to access the network, the target terminalnode is accessed to the blockchain system. According to the method, the target terminal node can be effectively prevented from being illegally modified or illegally used, and the authority of verification is improved, so that the security and reliability of the blockchain system can be effectively guaranteed.
Owner:秦丽霞
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products