Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

30results about How to "Prevent illegal reading" patented technology

Multifunctional gateway used for vehicle and control method thereof

ActiveCN103873595AEnsure safetyIllegal control of ECU functionsNetwork connectionsTransceiverThe Internet
The invention relates to a multifunctional gateway used for a vehicle and a control method thereof. The multifunctional gateway comprises a main controller, transceivers, a 3G module and a WI-FI module, wherein the main controller is a processor of the multifunctional gateway and is in control connection with the transceivers, the 3G module and the WI-FI module, the transceivers are all in communication connection with the main controller and are used for receiving and transmitting network signals, the 3G module is used for providing 3G internet functions, and the WI-FI module is used for being used by a terminal electronic device with the gateway as a WI-FI hot spot. The multifunctional gateway is a gateway integrating an in-vehicle network, the Internet and an inter-vehicle network and extends and integrates firewall functions, remote diagnosis functions, 3G functions, WIFI functions, power supply security level management functions and the like; extension function hardware and software are designed in a modularized mode, meanwhile, the multifunctional gateway serves as a platform-type multifunctional gateway, the extension functions have transplantable performance, the multifunctional gateway is suitable for vehicle models with different configuration parameters and of different levels in a platform, and development cost and develop frequency can be effectively reduced.
Owner:CHERY AUTOMOBILE CO LTD

Anti-counterfeiting recognition device provided with self-destructive protection assembly and self-destructive protection method

The invention provides an anti-counterfeiting recognition device provided with a self-destructive protection assembly. The device comprises a top shell, a bottom shell, a battery fixed into the bottom shell and a circuit board connected with the battery, and further comprises at least one voltage detection device used for detecting voltage signals. The voltage detection device is connected with a main control module. The top shell is further provided with at least one convex column extending to the inside of the bottom shell, and the bottom of the convex column is in contact with the voltage detection device so as to generate the voltage signals. A method for using the device includes the steps that the main control module reads the voltage signals input by the voltage detection device in real time; when the main control module can not detect the voltage signals input by the voltage detection device in real time, the main control module starts a self-destructive program so as to delete data stored in a memory. When the device is detached illegally, the main control module can quickly delete all the data and programs in the memory at the moment that the top shell is separated from the bottom shell, so that the data and the programs in the memory are prevented from being read illegally.
Owner:LEADER TECH BEIJING DIGITAL TECH

Self-destroying protection method based on malicious invasion of file system and device thereof

The invention provides a self-destroying protection method based on a malicious invasion of a file system. The method comprises the steps that when the content of a specified file in a common disk is not matched with the content in a specific file, the number of times of the malicious invasion of a hidden disk is accumulated; when the number of times of the malicious invasion of the hidden disk reaches an upper limit, the file system of the hidden disk is deleted, and the content in the hidden disk cannot be read. A device executing the method comprises a file type detection module, a content comparison module, an accumulating module, a comparison module for the number of times and a file system deleting module. The file type detection module is used for detecting the type of the specified file stored in the common disk of equipment, the content comparison module is used for distinguishing whether the content of the specified file is matched with that of the specific file or not, the accumulating module is used for accumulating the number of times of the malicious invasion of the hidden disk, the comparison module for the number of times is used for comparing the accumulated number of times of the malicious invasion of the hidden disk and the upper limit value of the accumulated number of times, and the file system deleting module is used for deleting information in an FAT area of the hidden disk. According to the method and the device, the safety of data in the equipment can be improved, and the data are effectively prevented from being illegally copied.
Owner:LEADER TECH BEIJING DIGITAL TECH

Data authentication system and data authentication method

The invention provides a data authentication system, which comprises a management server, at least one mirror image server and an authentication server, wherein the management server is used for receiving a first communication connection request, and transmitting a first digital certificate and a second digital certificate in the first communication connection request to the authentication server; the at least one mirror image server is used for receiving a second communication connection request, and transmitting the second digital certificate and the first digital certificate in the second communication connection request to the authentication server; the authentication server is used for judging whether the management server and the at least one mirror image server pass authentication or not, and if the management server and the at least one mirror image server pass the authentication, a communication connection is allowed to be established between the management server and the at least one mirror image server. The invention also provides a data authentication method. According to the technical scheme provided by the invention, the safety of patient information in the management server and the at least one mirror image server can be ensured, and therefore, the patient information in the management server and the at least one mirror image server is prevented from being illegally read, and illegal information is prevented from being written in the management server or the at least one mirror image server.
Owner:PKU HEALTHCARE IT

Electronic equipment and its data encryption method and data deciphering method

The invention relates to an electronic device, comprising an interface module, an encrypting-decrypting module, a storing module, an encoding-decoding module and an accessing module. The storing module is used for storing pre-set data. The encrypting-decrypting module is respectively connected with the interface module, the storing module and the encoding-decoding module. The encrypting-decryptingmodule is used for encrypting the received user data from the interface module by using the pre-set data and transferring the encrypted data to the encoding-decoding module for encoding and then theencoded data are stored into a storing medium by the storing module. The encrypting-decrypting module is also used for decrypting the received user data from the encoding-decoding module by using thepre-set data and transferring the decrypted data to the interface module to be output. Taking the pre-set data in the electronic device as an encrypted code can effectively avoid the illegal reading of the user data because other electronic devices cannot obtain the corresponding encrypted code and then cannot read the encrypted user data even though the storing medium is lost. Moreover, the invention also provides a data encrypting method and a data decrypting method.
Owner:HANGZHOU HIKVISION DIGITAL TECH

Method for shielding unauthorized users from starting software

The invention provides a method for preventing an unauthorized user from starting software. The method includes the following steps that when a network card serial number stored in an external hardware device and a network card serial number of a current computer are the same, a specified software logging interface is popped up, and otherwise, the operation is logged out; when a user password stored in a remote server and a user password input at present are the same, it is shown that a current user is an authorized user, and the specified software can be started, and otherwise, the verification failure frequencies are counted; when the continuous verification failure frequency value is equal to a preset continuous verification failure frequency value, the network card serial number of the current computer is uploaded to a blacklist of the remote server. A system for implementing the method comprises the external hardware device and the remote server. According to the method for preventing the unauthorized user from starting the software and the system for implementing the method, after it is determined that the current computer has no binding relation with a USB KEY, the specified software cannot be started, and therefore the safety and the effectiveness of the software are guaranteed.
Owner:南京颂歌网络科技有限公司

Data authentication system and data authentication method

The invention provides a data authentication system, which comprises a management server, at least one mirror image server and an authentication server, wherein the management server is used for receiving a first communication connection request, and transmitting a first digital certificate and a second digital certificate in the first communication connection request to the authentication server; the at least one mirror image server is used for receiving a second communication connection request, and transmitting the second digital certificate and the first digital certificate in the second communication connection request to the authentication server; the authentication server is used for judging whether the management server and the at least one mirror image server pass authentication or not, and if the management server and the at least one mirror image server pass the authentication, a communication connection is allowed to be established between the management server and the at least one mirror image server. The invention also provides a data authentication method. According to the technical scheme provided by the invention, the safety of patient information in the management server and the at least one mirror image server can be ensured, and therefore, the patient information in the management server and the at least one mirror image server is prevented from being illegally read, and illegal information is prevented from being written in the management server or the at least one mirror image server.
Owner:PKU HEALTHCARE IT

Method and device for shielding unauthorized users from starting software

The invention provides a device used for preventing an unauthorized user from starting software. The device comprises a data interface, a storage and a main control chip. The data interface is used for transmitting obtained MAC addresses of a computer and input user passwords. The storage is used for storing system files, storing the MAC address and an account name which are obtained when the device is connected with the computer at the first time and storing the user password input at the first time. The main control chip is used for conducting verification on the obtained current MAC address of the computer and the original MAC address obtained at the first time and conducting verification on the current input user password and the original user password input at the first time and executes related operations according to verification results. A method with the device adopted comprises the steps that if the obtained current MAC address of the computer is the same as the original computer MAC address obtained at the first time, a user password input window is popped up; if the current input user password is the same as the original user password input at the first time, software is started. According to the method and device for preventing the unauthorized user from starting the software, after it is determined that the current computer is not bonded with a USERKEY, the specific software cannot be started so as to guarantee the safety and the effectiveness of the software.
Owner:贵州灵劲科技有限公司

Method and system for protecting permission of volatile memory bank

The invention discloses a method for protecting permission of a volatile memory bank. The method comprises the following steps: when receiving an operation request of an operation request user, an MPU analyzes the operation type in the operation request and the volatile memory bank corresponding to the operation type, and judges whether the operation request user has a permission to operate the volatile memory bank according to a permission protection mechanism; if so, the MPU transmits an authorization signal to a DMA controller; the DMA controller receives the authorization signal, and configures parameters corresponding to the operation type according to the operation request. Therefore, the DMA controller executes the corresponding operation only after the authorization of the MPU is successful, so that the data in the volatile memory bank are prevented from being illegally changed or read by other users, and the security is enhanced. As the protection mechanism for the volatile memory bank is added, the user can change the operation permission of the DMA on the volatile memory bank, and the operation flexibility is improved. In addition, the invention further discloses a system for protecting permission of the volatile memory bank, and the effects are as mentioned above.
Owner:苏州国芯科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products