Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

69results about How to "Prevent snooping" patented technology

PDA password management tool

A mechanism is provided for storing user identifications and passwords in a mobile device, such as a personal digital assistant. A modified keyboard device driver may be installed on each platform the user accesses. When the user is prompted for a password from a functioning terminal, the user may select the appropriate account on the mobile device. The mobile device then may send the user identification and password for the account to the terminal. The modified keyboard device driver receives the user identification and password from the mobile device and converts it into keyed text. The accounts with user identifications and passwords may be protected by a password. Thus, the user must only remember the one mobile device password to access a plurality of resources and computer systems. Furthermore, the communications between the mobile device and terminal may be encrypted to prevent snooping.
Owner:LINKEDIN

Keyboard input encryption method and mobile terminal thereof

The invention discloses a keyboard input encryption method and terminal equipment thereof. The mobile terminal comprises an encryption setting module, a resetting encryption setting module, an encryption input module and a central processing unit. The method comprises the following steps of: (a) detecting whether a user presses a functional key, and if the user presses the functional key, executing the next step, otherwise, ending the detection; (b) judging a mode of the current user input keyboard by a system, if the mode is a common mode, directly outputting a typed functional key value through a keyboard, and if the mode is an encryption input mode, executing the next step; (c) judging whether the typed functional key value is exchanged with a key value of another functional key during encryption, if so, executing the next step, otherwise, directly outputting the functional key value; and (d) outputting the exchanged key value, and returning to the step (a). Aiming at a situation that a user uses mobile phone application to input sensitive information under a complicated environment, the encryption security of an input method is realized; a phenomenon that sensitive information acquired by the user is pried is avoided; fund loss of the user is prevented; and therefore, the user can securely execute relevant operation with a mobile phone, and the security of the mobile phone is also improved.
Owner:GUANGDONG OPPO MOBILE TELECOMM CORP LTD

Sensitive data anti-peeping processing method and device, equipment and storage medium

The invention relates to the technical field of artificial intelligence, and discloses a sensitive data anti-peeping processing method, which comprises the following steps: detecting whether sensitivedata is displayed in an APP interface displayed on current terminal equipment; if yes, calling a camera of the terminal device to collect a current environment image in real time; processing the grayscale image of the current environment image, and identifying whether a plurality of users exist in the current environment image or not; if a plurality of users exist in the current environment image, performing face recognition on the current environment image by judging the texture features of the face image so as to recognize whether illegal users exist or not; and if an illegal user exists and sensitive data is displayed in the current APP interface, performing anti-peeping processing on the sensitive data based on a sensitive data protection strategy. The invention further discloses a sensitive data anti-peeping processing device and equipment and a computer readable storage medium. An illegal user can be prevented from peeping sensitive information of others, and then the security of sensitive data display of the user is improved.
Owner:ONE CONNECT SMART TECH CO LTD SHENZHEN

Method for unlocking and locking mobile intelligent equipment and Bluetooth intelligent card

The application discloses a method for unlocking and locking mobile intelligent equipment by utilizing a Bluetooth intelligent card and a Bluetooth intelligent card. The method comprises the steps that: the Bluetooth intelligent card is close to the mobile intelligent equipment and determines whether a distance between the Bluetooth intelligent card and the mobile intelligent equipment is smallerthan a specified distance according to intensity of a received signal; if the distance between the Bluetooth intelligent card and the mobile intelligent equipment is smaller than the specified distance, the Bluetooth intelligent card generates an asymmetrical secret key in a safe environment and sends a public key to the mobile intelligent equipment; the Bluetooth intelligent card receives a random encrypted secret key which is transmitted by the mobile intelligent equipment and encrypted by the public key and the random encrypted secret key is used as a first session secret key; and the Bluetooth intelligent card decrypts the first session secret key by a private key, carries out encryption on unlocking information by the decrypted first session secret key, and transmits the decrypted unlocking information to the mobile intelligent equipment, so that the mobile intelligent equipment executes unlocking of a screen by utilizing the decrypted unlocking information. According to the application, as long as the mobile intelligent equipment is close to the Bluetooth intelligent card, unlocking and locking of the screen can be automatically implemented.
Owner:HENGBAO

Multifunctional touch display self-service terminal

The invention discloses a multifunctional touch display self-service terminal, relates to the technical field of self-service terminals, and aims to solve the problems that a chassis is mostly of an anti-slip fixed structure, so that the self-service terminal is very good in fixity, but the self-service terminal is difficult to carry, the self-service terminal cannot be flexibly carried as required, and the self-service terminal is inconvenient to carry. And the use effect of the self-service terminal is not good indirectly. The self-service terminal comprises a self-service terminal main body, a processing device is arranged in the self-service terminal main body, a touch display screen, a camera, a card slot and a USB interface are arranged on the self-service terminal main body, four moving wheels are arranged below the self-service terminal main body, and the four moving wheels are arranged at four corners of the self-service terminal main body. Buffering pieces are arranged between the four moving wheels and the self-service terminal body, the two ends of each buffering piece are connected with the corresponding moving wheel and the self-service terminal body to form an integrated structure, a fixing base is arranged outside the self-service terminal body, and electric telescopic rods are arranged on the two sides of the self-service terminal body.
Owner:深圳市中福信息科技有限公司

Dustproof display

The invention discloses a dustproof display in the field of computer accessories. The dustproof display comprises a display screen, a base, a support pillar and a back shell. The back shell is in a shape like a rectangular basket with one open side, a rectangular frame shaped front shell matched with the shape and the size of the back shell is fixed in an opening of the back shell, the display screen is fixed between the back shell and the front shell, and the back shell is fixed on the base through the support pillar. A vertical rotating shaft is arranged in the left side of the back shell, elastic reset pieces are respectively arranged on two ends of the rotating shaft, and dustcloth is twined on the rotating shaft. A kerf is arranged on a position which is opposite to the rotating shaft at the left side of the front shell, and a rectangular clamping groove is arranged in a position which is opposite to the kerf at the right side of the front shell. One end of the dustcloth, which is far away from the rotating shaft, penetrates through the kerf and is fixed with a clamping board, and the shape of the clamping board is matched with that of the clamping groove. According to the scheme, dust in the environment can be effectively prevented from falling on the display screen, the dust accumulated on the display screen is reduced, and furthermore, when the display is used, an image can be more clearly displayed, so that the degree of fatigue of eyes of a user is relieved.
Owner:CHONGQING CHENGSHUO TECH

Privacy protection MAX / MIN query method for WSNs leased environment

The invention discloses a privacy protection MAX / MIN query method for WSNs leased environment, including two steps of mask allocation and query processing. The mask allocation initializes the data query protocol by assigning a local mask to each sensor node to ensure data privacy during the querying process. The query processing includes query instruction broadcasting, multiple rounds of collaborative computation of the sensor nodes and the proxy nodes, and the query result obtainment and feeding back of the three processing procedures to the user by the proxy nodes. The protocol flow of the method is simple and easy to implement; the security is high and the privacy security of the perceived data is effectively ensured; and the communication cost is low during the execution of the query processing, which is favorable for improving the utilization ratio of network resources and prolonging the life cycle of the network.
Owner:NANJING UNIV OF POSTS & TELECOMM

Ground wireless spread spectrum communication system for railway

The embodiment of the invention relates to a ground wireless spread spectrum communication system for a railway. Each ground network node accesses a ground passive optical network through an ONU, andthen accesses a railway operation control center through an OLT and a railway dedicated communication network; a first ground network node group receives a first activation command issued by the railway operation control center through the railway dedicated communication network and the ground passive optical network, switches from a turn-off state to a monitoring state, and monitors the behaviorthat an onboard optical network communication node of a train transmits a first wireless spread spectrum communication signal; when the first wireless spread spectrum communication signal is monitored, a second wireless spread spectrum communication signal is transmitted; and the first wireless spread spectrum communication signal, authentication information of the ground network node group and azone code are transmitted to the railway operation control center to generate a second activation command, and the second activation command is issued to a second ground network node group that is arranged adjacent to the first ground network node group along the traveling direction of the train.
Owner:BEIJING PHOENIX HUITONG TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products