Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

72results about How to "Prevent Malicious Use" patented technology

Operation and maintenance safety auditing method and system

The invention discloses an operation and maintenance safety auditing method. The operation and maintenance safety auditing method comprises the following steps: receiving a login request sent by operation and maintenance personnel, and verifying the login request; if the verification is passed, obtaining and storing face image information of the operation and maintenance personnel in real time, and meanwhile recording an operation and maintenance operation on operation and maintenance target equipment in real time; verifying the identity of the operation and maintenance personnel in real time according to the face image information, and judging whether the operation and maintenance operation is an illegal operation; if the verification of the identity of the operation and maintenance personnel is wrong, and / or the operation and maintenance operation is the illegal operation, sending an alarm signal and / or interrupting the operation and maintenance operation; and carrying out correlation analysis on the face image information and the operation and maintenance operation, forming an operation and maintenance link, and carrying out audit according to the operation and maintenance link. Identity authentication can be carried out on the identity of the IT operation and maintenance personnel in an operation and maintenance personnel process, and the illegal operation and maintenance operation can be found in time. The invention further discloses an operation and maintenance safety auditing system.
Owner:STATE GRID CORP OF CHINA +2

Electric automobile battery sharing system

The invention relates to an electric automobile battery sharing system and a sharing method. The electric automobile battery sharing system comprises a mobile terminal, a vehicle-mounted terminal, a shared battery and a battery service platform. The battery service platform comprises a plurality of service mechanisms and a shared management cloud server. The shared battery comprises an electric quantity monitoring module. The electric quantity monitoring module is used for monitoring the electric quantity of a rechargeable battery pack located in an electric automobile and is in communicationwith the vehicle-mounted terminal. The vehicle-mounted terminal receives the residual electric quantity A of the battery. When the residual electric quantity A of the battery reaches a threshold valueA1, the vehicle-mounted terminal automatically searches pre-selected service mechanisms which can arrive before the electric quantity of the battery is exhausted. Meanwhile, a list of the selected pre-selected service mechanisms is formed and displayed by the vehicle-mounted terminal. When the number B of searched pre-selected service mechanisms is smaller than a preset threshold value B1, the vehicle-mounted terminal sends out the alarm information. According to the invention, by adopting the electric automobile battery sharing system and the sharing method thereof, the shared battery is monitored, and the driving state of a user is fully considered. Therefore, more reasonable selectable service mechanism recommendations can be provided for the user, and a better user experience is provided for the user.
Owner:北京安泰创业新能源科技有限公司

Privacy protection multi-mechanism data classification method based on homomorphic encryption

The invention discloses a privacy protection multi-mechanism data classification method based on homomorphic encryption. Firstly, a user generates a screening condition of training data and sends thescreening condition to a computing center; a computing center generates encryption parameters by using a homomorphic encryption algorithm and sends the encryption parameters to each data providing mechanism; each data providing mechanism screens the local data marked with the classification tags to obtain training data, generates respective public key and private key by utilizing a homomorphic encryption algorithm according to the encryption parameters, encrypts the training data through the public key and sends the training data to the computing center; a computing center and each data providing mechanism jointly execute logistic regression analysis under homomorphic encryption to obtain a data classification model and send the data classification model to a user; and a user inputs the to-be-classified data into the data classification model to obtain a classification result. Compared with the prior art, the method has higher safety in practical application, personal privacy is effectively protected, benefit loss possibly generated by a data providing mechanism is avoided, and development of multi-mechanism data analysis is promoted to a great extent.
Owner:ZHEJIANG LAB

User equipment repair method, server, system and medium capable of protecting privacy

ActiveCN109523040AProtect data privacyAvoid malicious use and tamperingDigital data protectionChain networkApplication server
The user equipment repair method capable of protecting privacy disclosed by the invention is applicable to a user terminal, and comprises the following steps that: a user application program server acquires repair request information sent by a repair user; Inquiring information of a faulty equipment service provider according to faulty equipment information in the repair request information to generate repair application information; Inquiring a symmetric key and a unique identifier of the symmetric key held by a faulty equipment service provider, encrypting the repair application informationby adopting the symmetric key to obtain an application ciphertext record, sending the application ciphertext record to a user block chain node, and performing information synchronization of each blockchain node by the block chain network through a consensus algorithm; And obtaining the accepted ciphertext record from the block chain network, decrypting the accepted ciphertext record by adopting the symmetric key, obtaining repair acceptance information, and finishing repair acceptance. The data of each party is encrypted through the encryption algorithm, the possibility that the data is maliciously utilized and tampered is avoided, the data privacy of each participant is protected, and the security is high.
Owner:南京荣链科技有限公司

A security network middleware for identity authentication, and a method and apparatus for implementing the same

The invention discloses a security network middleware for identity authentication, a method and apparatus for implementing the same. The middleware comprises an interface layer, a function layer and an engine layer. The interface layer is located on top of the function layer and is used for providing a channel for the client to call the middleware. The function layer is located on top of the engine layer, and is used for providing service interface to the interface layer, and is responsible for service realization of the middleware. The service includes signature, check mark, encryption and decryption. The engine layer comprises a national secret algorithm engine, an OpenSSL algorithm engine and a hardware algorithm engine. The middleware of the application is a front terminal of the authentication platform for collecting user information, which provides protection for safely collecting user identity information and avoids malicious use of the user identity information after the third-party network application collects the user identity information. At the same time, the user identity information is avoided to be stolen in the transmission process from the client to the authentication platform and from the authentication platform to the third-party network application.
Owner:北京庚金科技有限公司

Collection system based on three-dimensional bar codes

The invention discloses a collection system based on three-dimensional bar codes. The system comprises the following information collection processes that 1), a plurality of three-dimensional bar codes are generated, wherein the three-dimensional bar codes at least comprise reporting three-dimensional bar codes, and copy-prevention areas are set on the reporting three-dimensional bar codes; 2), users scan the reporting three-dimensional bar codes through terminals, the users verify the authenticity of the reporting three-dimensional bar codes through matching of preset rules and the copy-prevention areas, and if the reporting three-dimensional bar codes are verified successfully, the users send reporting requests; 3), after the system receives the reporting requests, the system carries outunique numbering on the users and displays preset declaration information web pages on the terminals of the users; and 4), the users fill out the declaration information web pages and submit the declaration information web pages, and the system receives form item information of the declaration information web pages filled out by the users, carries out preliminary verification on the form item information according to preset rules and uploads the form item information and unique serial numbers to a cloud platform after the preliminary verification is successful.
Owner:CN3WM XIAMEN NETWORK TECH CO LTD

Exclusive vehicle-mounted GNSS (Global Navigation Satellite System) signal compensation device and positioning system and method

The invention discloses an exclusive vehicle-mounted GNSS (Global Navigation Satellite System) signal compensation device and an exclusive vehicle-mounted GNSS signal blind compensation positioning system and method. The exclusive vehicle-mounted GNSS signal compensation device solves the position information of a vehicle through a self-built positioning system and simulates a corresponding GNSS simulation signal. The exclusive vehicle-mounted GNSS signal compensation device comprises an encryption module, wherein the encryption module is used for encrypting one or more of time information forrecording the transmission and / or reception of a positioning signal, position information of the vehicle, the GNSS simulation signal and a GNSS satellite signal, and then radiating the encrypted information to a navigation terminal in the vehicle. According to the scheme disclosed by the invention, the information is encrypted, and only the specified application program can realize decryption processing through pre-stored decryption information, so that malicious use of an unauthorized terminal or application program is avoided, and the practical benefits of positioning system manufacturers and cooperative application program merchants are further guaranteed.
Owner:KUNCHEN TECH CO LTD

Security verification method and system for Beidou short message terminal

The invention discloses a safety verification method for a Beidou short message terminal. The method comprises the following steps: acquiring an encrypted message sent by an application end; decrypting the encrypted information; judging whether decryption is successful or not: if yes, passing safety verification, determining that the application end is successfully connected with the Beidou short message terminal, sending a piece of encryption information to the application end to respond to successful connection, and storing the ID information, obtained through decryption, of the application end in the Beidou short message terminal; if not, not passing safety verification, determining that the connection between the application end and the Beidou short message terminal fails, so the Beidou terminal equipment can be prevented from being maliciously used by a third party, and verifying, binding and perfecting the security of a Beidou communication link through the terminal equipment end. The invention further discloses a safety verification system of the Beidou short message terminal. According to the invention, the Beidou terminal equipment can be prevented from being maliciously used by a third party, and the security of a Beidou communication link is improved through verification and binding of the terminal equipment end.
Owner:广东海聊科技有限公司

Method for preventing system short message service from being stolen

The invention relates to a method for preventing a system short message service from being stolen. The method comprises the steps as follows: a client initiates a verification request to a server; after receiving the request, the server generates a secret key, encrypts the secret key into a first ciphertext via a first encryption algorithm, and sends the first ciphertext to the client; after decoding the first ciphertext, the client encrypts the decoded ciphertext into a second ciphertext via a second encryption algorithm; the client uses the second ciphertext and user information as parameters, and sends the parameters to the server; the server encrypts the secret key via the second encryption algorithm to generate a third ciphertext; and when the second ciphertext is matched with the third ciphertext, the server generates a new password, and sends the new password to the client. According to the method provided by the invention, the secret key generated by the server after being encrypted by the client is matched with that after being encrypted by the server, for ensuing that a short message is sent by a user himself; and matching times and matching time are set, so that the system short message service is prevented from being used maliciously.
Owner:BEIJING KUWO TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products