Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

52results about How to "Prevent leaks" patented technology

Mobile intelligent terminal security browser and working method thereof

The invention relates to a mobile intelligent terminal security browser and a working method thereof. The mobile intelligent terminal security browser comprises a network data browse unit, a local file management unit, a data cache management unit, a security configuration management unit, a working mode management unit, a file encryption and decryption unit and a traceless security management unit. The working method of the mobile intelligent terminal security browser comprises the steps that 1, a user configures the working mode of the browser at the mobile intelligent terminal; 2, the user switches the working mode of the browser into a security mode when downloading and/or caching data; and 3, the user opens a local encryption file under the security mode. The working method has the advantages that the corresponding file can be decrypted only at the mobile intelligent terminal bound with the file, and personal information and enterprise information are mutually isolated, so that different levels of security protection means of individuals and enterprises are realized; and meanwhile, mobile phone virus and Trojan are effectively prevented from stealing data, and the risk caused by losing of mobile intelligent terminal equipment is also greatly reduced.
Owner:CHINA NAT SOFTWARE & SERVICE

Method for preventing sensitive data from betraying confidential matters and device thereof

The invention discloses a method for preventing sensitive data from betraying confidential matters and a device thereof, and relates to the field of network security, aiming at solving the problem that the existing technology for preventing sensitive data from betraying confidential matters can not effectively prevent the sensitive data from betraying confidential matters. The method comprises the steps that a firewall intercepts connecting request sent by an access source; sensitive data access policy matching is carried out on the connecting request by the firewall; if the matching result is allowed, the connecting request is transmitted, and target data is allowed to be accessed; and if the matching result is not allowed, the connecting request is blocked. The firewall comprises an intercepting unit used for intercepting the connecting request sent by an access source, a matching unit used for carrying out sensitive data access policy matching on the intercepted connecting request, a transmitting unit used for transmitting the connecting request and allowing the target data to be accessed when the matching result is allowed to be triggered, and a blocking unit used for blocking the connecting request when the matching result is not allowed to be triggered.
Owner:BLUEDON INFORMATION SECURITY TECH CO LTD

Wireless authentication secretive mobile storage apparatus and encryption authenticating method

The invention provides a wireless authentication secretive mobile storage apparatus. The wireless authentication secretive mobile storage apparatus comprises a data storage apparatus and an encryptionauthenticating apparatus; the data storage apparatus includes a data storage module, a first communication module, an encryption authenticating module and a data operation control module; the encryption authenticating apparatus includes a second communication module and an authentication code sending module; and when the first communication module is in a communication connection with the secondcommunication module, the authentication code sending module is used for sending an authentication code to the encryption authenticating module, the encryption authenticating module is used for performing authentication on the authentication code and sending authentication information to the data operation control module, and the data operation control module is used for controlling a read/write operation of the data storage module. The wireless authentication secretive mobile storage apparatus is provided with the special encryption authenticating apparatus, so only after being encrypted by the encryption authenticating apparatus, the data can be transmitted; and in this way, the security of the data in the mobile storage apparatus can be effectively guaranteed, the leakage is avoided, and the privacy of a user is protected better.
Owner:卢冠熊

Suppression method of offshore ground clutter and azimuth ambiguity thereof of SAR images

ActiveCN110261855ANo loss of azimuth resolutionPrevent leaksRadio wave reradiation/reflectionImage resolutionRadar
The invention relates to a suppression method of offshore ground clutter and azimuth ambiguity thereof of SAR images. The method comprises the following steps of: acquiring SAR images of the same scene region at different moments through radar to obtain n SAR images with different time dimensions, performing Fourier transform on the obtained n SAR images with different time dimensions along the time dimensions to obtain n SAR images in a space frequency domain, accumulating a stationary target and distance and azimuth ambiguity energy thereof in the n SAR images in the space frequency domain at a zero frequency position in the space frequency domain, removing the zero frequency position in the space frequency domain, and performing incoherent superposition on the rest SAR images along a space frequency domain axis to obtain a pure ocean SAR image from which the stationary ground clutter and the azimuth ambiguity thereof are removed. According to the method, the static ground clutter is filtered through the multi-temporal SAR images, the azimuth resolution is not lost while azimuth ambiguity is suppressed, the static ground clutter and azimuth ambiguity energy thereof are completely removed while ocean moving target information is not lost, and the phenomenon of alarm missing is prevented.
Owner:SHANGHAI RADIO EQUIP RES INST

Optical disc safety recording monitoring and alarming method

The invention discloses an optical disc safety recording monitoring and alarming method. The method comprises the following steps that: firstly, an applicant logs in an optical disk burning client, submits an optical disk burning application, and uploads a file to be burnt to an intranet server for approval; after examination and approval, the recording device carries out actual compact disc recording; after burning is completed, the optical discs are automatically stored in the optical disc safety cabinet; and when the applicant passes identity information authentication, the optical disc canbe taken away, and when a user uses the secret-related optical disc on other computer terminals, a special optical disc monitoring and browsing tool must be operated firstly to check whether the useenvironment is safe or not, prevent illegal use of the optical disc and insert the optical disc into an optical disc recycling box for recycling after the optical disc is used up. According to the invention, the behavior of burning the optical disc is better controlled, the security of secret-related files is ensured, the use of the optical disc is effectively supervised, the illegal use of the optical disc is prevented in time, and the secret leakage of the optical disc in the use process is prevented.
Owner:HANGZHOU DIANZI UNIV

Adjustable swing check valve

The invention relates to the technical field of one-way valves and aims at providing a swing check valve. The swing check valve comprises a valve body, a valve cover, a rotating shaft and a valve clack, wherein the rotating shaft is sleeved with a torsion spring capable of relatively twisting and generating a torsion force; one extending end of the torsion spring is a rotating end, and the other extending end is a working end; the working end is fixedly connected with the valve clack; the rotating end is fixedly connected with the rotating shaft; and the rotating end can rotate in the rotatingdirection of the valve clack so that the working end can twist to generate the torsion force; one end of the rotating shaft is provided with a spline shaft extending in the axial direction; a flower-type groove matched with the valve body is formed in the valve body; and the rotating shaft can move in the shaft axis direction of the rotating shaft, and the movable distance is greater than the length of the spline shaft. The swing check valve solves the problem that when the swing check valve is installed in a non horizontal pipeline and mediums flow from top to bottom, the valve clack cannotcompletely seal a medium outlet due to the influence of self weight, so that the check valve loses the function of preventing the medium backflow.
Owner:ZHONGCHI VALVE IND GRP CO LTD

Tamper-proof encryption implementation method and device in batch data uploading process

The invention discloses a tamper-proof encryption implementation method and device in the batch data uploading process. The implementation method comprises the following steps of: generating a key pair by using a 3DES algorithm; by a sending terminal, extracting a first digital digest for to-be-sent original data by using a SHA256 algorithm, and then carrying out RSA algorithm encryption on the first digital digest by using a private key to generate first encrypted data; by the sending terminal, uploading the original data and the first encrypted data, so that the original data and the first encrypted data are received by a receiving terminal; by the receiving terminal, extracting a second digital digest for the original data by using the SHA256 algorithm, and then carrying out RSA algorithm encryption on the second digital digest by using a public key to generate second encrypted data; by the receiving terminal, carrying out consistency verification on the second encrypted data and the first encrypted data; and if the consistency verification is passed, determining authenticity and integrity of the data received by the receiving terminal. According to the invention, authenticity and non-repudiation of the data are ensured, and benefits of both data transmission parties are effectively ensured.
Owner:GUANGDONG QIMING TECHNOLOGY DEVELOPMENT CO LTD

Power grid monitoring abnormal information processing method and system

The invention provides a power grid monitoring abnormal information processing method and system. The power grid monitoring abnormal information processing method comprises the following steps: constructing an abnormal information database to store power grid monitoring abnormal information; converting the power grid monitoring abnormity information into corresponding alarm information and sendingthe alarm information to a first alarm execution mechanism; judging whether corresponding alarm confirmation feedback information is received or not at an interval of a first preset time period by taking the moment of sending the alarm information to the first alarm execution mechanism as the starting time, and if so, removing the corresponding power grid monitoring abnormality information from the abnormality information database; otherwise, sending corresponding alarm information to a second alarm execution mechanism; judging whether corresponding alarm confirmation feedback information isreceived or not at an interval of a second preset time period by taking the moment of sending the alarm information to the second alarm execution mechanism as the starting time, and if so, removing the power grid monitoring abnormality information from the abnormality information database; otherwise, forming and sending an alarm information confirmation timeout short message to the mobile terminal associated with the monitoring personnel.
Owner:JINING POWER SUPPLY CO OF STATE GRID SHANDONG ELECTRIC POWER CO +1

Outdoor fire hydrant capable of preventing water leakage

The invention relates to the field of fire fighting equipment, and discloses an outdoor fire hydrant capable of preventing water leakage. The outdoor fire hydrant comprises a leakage preventing pipeline, the leakage preventing pipeline is fixedly connected to an underground water conveying pipeline, a leakage preventing cavity is formed between the end faces of the two sides of the leakage preventing pipeline in a communicating mode, a leakage preventing valve element is arranged at the upper end of the leakage preventing cavity, and when the leakage preventing valve element moves upwards, the leakage preventing cavity can be closed. According to the outdoor fire hydrant, the leakage preventing pipeline is installed between the underground water conveying pipeline and a fire hydrant main body, leakage of high-pressure water flow inside the underground water conveying pipeline is effectively blocked through the leakage preventing valve element inside the leakage preventing pipeline, when the ground surface fire hydrant is damaged, the water flow leakage condition is prevented in time, normal operation of traffic is conveniently maintained, meanwhile, the maintenance and installation of the fire hydrant is conducted conveniently, the state of a drainage hole can be controlled according to the opening and closing conditions of a rubber valve element, accumulated water inside the fire hydrant can be drained in time, and the service life of the fire hydrant can be prolonged conveniently.
Owner:杭州衣拾感商贸有限公司

Transmission for a motor vehicle

The invention relates to a transmission, in particular multi-stage transmission, for a motor vehicle, comprising a housing, a drive input shaft, a drive output shaft, at least four planetary gear sets and multiple shift elements in the form of at least three clutches and at least three brakes, the planetary gear sets each comprising a sun gear, at least one planet gear, a planet gear carrier and an internal gear, wherein the drive input shaft can be connected by means of the second clutch to the planet gear carrier of the first planetary gear set, and the planet gear carrier of the first planetary gear set is connected to the second brake, and the internal gear of the first planetary gear set is connected to the planet gear carrier of the fourth planetary gear set, and the planet gear carrier of the fourth planetary gear set is connected to the sun gear of the third planetary gear set, and the sun gear of the fourth planetary gear set is connected to the third brake, and the planet gear carrier of the third planetary gear set is connected to the drive output shaft, and the internal gear of the third planetary gear set is connected to the internal gear of the fourth planetary gear set, and the third clutch is connected to the first brake, and the third clutch is connected to the sun gear of the first planetary gear set.
Owner:ZF FRIEDRICHSHAFEN AG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products