Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

81results about How to "Protect information security" patented technology

Remote real-time monitoring method of big-bus operating status, fuel consumption and exhaust gas emission and monitoring system thereof

ActiveCN104601718AProtect information and system securityReduce network communication pressure and communication costsTransmissionData shippingForms Control
The invention discloses a remote real-time monitoring method of a big-bus operating status, fuel consumption and exhaust gas emission. The remote real-time monitoring method comprises the following steps: an online communication model is established between a server and a wireless communication module; user request information forms control instructions by the server, and the control instructions are transmitted to the wireless communication module through a router, an internet and a wireless network after being encrypted, and the encrypted control instructions are transmitted to a bus information acquisition unit through the wireless communication module; the encrypted control instructions are decrypted by the bus information acquisition unit, the big-bus operating status, and the fuel consumption and exhaust gas emission data are acquired from the CAN (Controller Area Network) bus of the big bus and processed, and the real-time data is encrypted and transmitted to the wireless communication module; the encrypted real-time data is transmitted to the server through the wireless communication module and decrypted through the server, the decrypted data is processed and accessed by the client of the user. The monitoring system comprises the server, the router, the wireless communication module installed on the big bus, the big-bus information acquisition unit and the power supply module.
Owner:XIHUA UNIV

Mobile payment encryption method based on near field communication (NFC)

The invention relates to a mobile payment encryption method based on near field communication (NFC). The method comprises the following steps that: a first NFC terminal and a second NFC terminal store real IDs of the first NFC terminal and the second NFC terminal in a trusted service manager respectively, and the trusted service manager stores anonymous identities of the two NFC terminals; during mobile payment, the first NFC terminal and the second NFC terminal make requests of using the anonymous identities of the first NFC terminal and the second NFC terminal to the trusted service manager respectively, calculate self-update public keys and key verification tags of the first NFC terminal and the second NFC terminal, and transmit the calculated self-update public keys and key verification tags to other parties for verification; and when the key verification tags of the first NFC terminal and the second NFC terminal pass verification of the other parties and the self-update public keys are the same, the first NFC terminal and the second NFC terminal use the same self-update public keys as shared public keys of the two parties in order to finish a payment process. According to the method, encryption is performed between two communication parties with continuously-updated public keys, and the identities of the two communication parties are hidden with the anonymous identities, so that the privacies and information security of two payment transaction parties are effectively protected.
Owner:NINGBO UNIV

An information physical modeling and control method for aggregating large-scale air conditioner loads

The invention relates to an information physical modeling and control method for aggregating large-scale air conditioner loads, and the method comprises the steps: the air conditioner loads is regarded as an information physical system (CPS) at a load layer, an air conditioner load probability control method based on a semi-Markov process is provided, and the locking time of an air conditioner canbe guaranteed and the diversity of a cluster state is kept; A hybrid system model is utilized to establish a coupling relation between the air conditioner load physical process and the control process, and autonomous control over the air conditioner load is achieved; In an aggregator layer, a coordination control method for aggregating air conditioner loads into virtual peak shaving units is provided based on a market balance mechanism, and the method can effectively protect user data privacy and remarkably reduce the communication cost. Meanwhile, the virtual peak regulation unit can providea quotation curve and regulation capacity similar to a conventional unit for scheduling, so that the virtual peak regulation unit participates in optimal scheduling of a power grid layer. Compared with the prior art, the method has the advantages of remarkably reducing the communication cost, facilitating optimal scheduling and the like.
Owner:SHANGHAI JIAO TONG UNIV

User ID authentication method and system based on quantum network

InactiveCN101854347AProtect information securityImprove transmission efficiency and transmission securityUser identity/authority verificationAuthentication systemUser authentication
The invention provides a user ID authentication method and system based on a quantum network, which comprises the following steps that: an authentication center issues an ID authentication card; a user sends an authentication request; a quantum communication protocol creates shared data; the user summates the shared data and calculates the bit error rate, and the authentication center selects part of the summated shared data as a polarization mode after determining that the bit error rate belongs to a preset threshold range; the authentication center sends a pseudo selection code and a correction code; the user calculates a selection code according to the pseudo selection code and the correction code so as to obtain an ID authentication code; the users mutually authenticate or the user authenticates with the authentication center; and the authentication center backups the authentication result. The user ID authentication method can effectively protect the private information of the user, and has the advantages of safety and reliability. The invention also provides a user ID authentication system based on the quantum network, which similarly can effectively protect the private information of the user, and has the advantages of safety and reliability.
Owner:朱律波

Service terminal equipment capable of authenticating identities

InactiveCN107609380AIdentity securityProtect property and information securityCharacter and pattern recognitionDigital data authenticationRadio frequencyUser needs
The invention discloses service terminal equipment capable of authenticating identities. The service terminal equipment comprises a main cabinet, wherein the main cabinet is internally provided with acontroller; a touch display screen and a radio frequency card reader are arranged at the front of the main cabinet; an insertion port is formed in the radio frequency card reader; the controller is connected with each of the touch display screen and the radio frequency card reader; and an identification acquisition device which is connected with the controller is arranged at the front of the maincabinet. Before a service is carried out by a self-help terminal, a user needs to acquire own unique identity information through the identity acquisition device to authenticate that the user controls and executes other operations through the controller. According to the service terminal equipment, the problem that self-help service terminal authentication manner in the prior art is simple and has potential safety hazards is solved; and through applying the service terminal equipment capable of authenticating identities, identity authentication is carried out before services are carried out by the self-help terminal, so that the loss, of personal property and information, caused by single authentication manner is avoided.
Owner:四川聚典新业科技有限公司

Audio conference safe secrecy system and method using echo cancellation function

The invention discloses an audio conference safe secrecy system and method using an echo cancellation function. The system is composed of a control system and a meeting place system. The control system is composed of a processor, a multi-path headset distributor, a conference system master controller and a multi-path audio power amplifier. The meeting place system is composed of a loudspeaker box, a headset and a microphone. The processor is provided with two sound cards and audio conference safe secrecy software, wherein the first sound card has the echo cancellation function. The software is composed of a noise playing module, an audio processing module and a pure voice output module. The method includes the steps that the audio conference safe secrecy software plays noise and collects and transmits voice with noises to the first sound card for echo cancellation and noise reduction, and the audio processing module removes residual noise of voice signals subjected to echo cancellation and noise reduction. The audio conference safe secrecy system and method resolve the problems that the anti-eavesdrop measure of anti-eavesdrop equipment is simplex, and the spreading range of sound waves is not controllable, and can effectively guarantee that the conference content is not eavesdropped and communication is not affected.
Owner:NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products