Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

12899results about How to "Protection security" patented technology

Information security management and control method under cloud manufacturing environment

The invention discloses an information security management and control method under a cloud manufacturing environment. On the basis of a network security protocol, a password technology and a public key infrastructure (PKI), comprehensive security guarantee is supplied to information interaction among cloud internal networks, between one cloud and another cloud, and between a user and each cloud by using implementation technologies and methods, such as a virtual private network (VPN) based on multiple layers of protocols, a digital envelope and a password algorithm; Intranet, Extranet and Internet of a cloud manufacturing system are covered; comprehensive management and control technical information files are stored and transmitted to each used loop; a session key (SK) which is randomly produced by using a key production protocol is used for symmetrically encrypting the technical information files; and a receiver public key obtained according to a PKI digital certificate asymmetrically encrypts the SK to form the digital envelope for protecting the technical information files and the SK. The information security management and control method has the characteristics of being high in confidentiality, high inefficiency, flexible in arrangement and the like and can be widely applied to the cloud manufacturing system and other network manufacturing systems.
Owner:CHONGQING UNIV

Multifunctional intelligent rehabilitation robot for assisting stand and walk

The invention discloses a multifunctional intelligent rehabilitation robot for assisting stand and walk. The whole robot comprises three parts basically: a mechanical stand assisting device, a chassis moving device and a monitoring control device, wherein the mechanical stand assisting device comprises a support base, a swing arm, an electric push rod and a handrail device; the chassis moving device comprises a base, a motor fixing frame, four Mecanum wheels, a braking ratchet wheel, a braking sheet, and the like; the monitoring control device comprises a force sensor array, a vision sensor, a distance-measuring sensor, and the like; and in addition, the robot also comprises a power source storage battery, and the like. The robot can realize the auxiliary stand and walk assistance to a user, can lift the user up safely and comfortably under the condition of sitting posture, judge the motion intention of the user in the walking process and carry out all-sided collaborative motion; meanwhile, the robot can also detect the moving tread of the user so as to judge the stability of the user and do corresponding assistance to the user at the real time; and the robot can safely and effectively assist patients with lower limbs being injured to carry out rehabilitation training and assist the daily activities of weak old people.
Owner:HUAZHONG UNIV OF SCI & TECH

Integrated digital transfusion apparatus and transfusion monitoring and management method thereof

The invention discloses an integrated digital transfusion apparatus and a transfusion monitoring and management method thereof. The integrated digital transfusion apparatus is mainly structurally characterized in that a shell of devices including a control system, a display and the like and a transfusion tube clip and device shell are respectively fixed onto an integrated transfusion support and device shell. A touch display, a microprocessor, a microphone/speaker, a scanner, a wireless network connection device, a miniprinter, a transfusion tube, a Murphy dripper clamping groove, a finger peristaltic pump, a photoelectric droplet detection device, a pressure detector and an ultrasonic bubble detector are mounted on the integrated digital transfusion apparatus. Data acquired by different parts in the transfusion apparatus are used for mutual comparison of transfusion parameters. Software computation and simulation techniques are used during transfusion, and nurses can well know detailed transfusion conditions of each patient in transfusion by directly observing simulated transfusion bottles/bags and tubes and simulated transfusion apparatuses on software of the transfusion apparatuses and software on external computers, setting operation of various transfusion parameters, setting alarm thresholds of the various transfusion parameters and the like.
Owner:葛锋

Access control method and system based on block chain technology

ActiveCN108123936AResistance to failureResist being attackedFinancePayment protocolsAuthorization ModeData privacy protection
The invention provides an access control method and system based on block chain technology. The block chain technology is combined with attribute-based access control in the method, and the method comprises the following steps: adding an object in a chain, binding a judgment process of attribute and strategy on all block chain nodes with reference to the strategy. The access authorization is converted from a centralized manner into a distributed manner, the consistency check of the judgment results in the whole network is achieved by using a consensus mechanism of the block chain, and the authorized operations for accessing the recorded transactions are permanently recorded on the block chain. The method has the advantages of anti-single point failure, flexible authorization mode, accurateaccess boundary, and record auditability. The access control method and system provided by the invention are applicable to operating environments such as enterprises and governments that have the need of data privacy protection and realize multi-branch cooperation work based on a block chain platform, the access permissions of users in the system can be dynamically and scalably managed, fine-grained permission management is achieved for the strategy and the attribute, and the access control method and system are of important practical significance for protecting the security of information systems in a distributed network environment.
Owner:UNIV OF SCI & TECH BEIJING

Active defense method based on cloud platform

The invention discloses an active defense method based on a cloud platform. The active defense method comprises the following steps of: intercepting progress establishment by a client to acquire a program file route of a progress; calculating a characteristic value of a program file according to the program file route; judging whether the characteristic value of the program file exists in a local database; if the characteristic value of the program file does not exist in the local database, sending the characteristic value of the program file to a cloud end; judging whether the characteristic value of the program file exists in a database of the cloud end; if the characteristic value of the program file does not exist in the database of the cloud end, judging whether cloud end analysis is required to be performed on the program file; if the cloud end analysis is required to be performed on the program file, sending the program file to the cloud end; executing a command in the program file by the cloud end; judging whether the residual commands in the program file do not comprise commands related to a user environment; if the residual commands in the program file do not comprise commands related to the user environment, executing the residual commands; and detecting the security of the program file according to a behavior record of the program file, and returning a detection result back to the client.
Owner:HUAZHONG UNIV OF SCI & TECH

Method and system for optimal scheduling on joint flood control for cascade reservoir groups

The invention discloses a method and a system for optimal scheduling on joint flood control for cascade reservoir groups. The method includes the steps of firstly, determining flood type according to real-time reservoir level and the process of forecasting runoff in case of flood; secondly, deciding a primary protection object according to the flood type and downstream control-point flood control standards; thirdly, automatically selecting flood control optimization objectives and corresponding optimization scheduling models in a system model base; and fourthly, solving and optimizing the optimization scheduling model by modified genetic algorithm. The method and the system dynamically judge the level of flood and finish hierarchical scheduling based on the level of flood. In addition, projection of downstream protection objects, dam safety and flood recycling are achieved by selecting proper optimization scheduling objectives according to comprehensive information of the reservoirs, such as regulation performance, scheduling period and reliability in forecast flood during hierarchical scheduling, efficiency in decisions for the reservoir groups is improved, and mass data statistics show that the decision efficiency is improved by about 30% by the method and the system.
Owner:GUIZHOU WUJIANG HYDROPOWER DEV

Method, device and system for adjusting driving modes and vehicle

The invention discloses a method, a device and a system for adjusting driving modes and a vehicle. The method includes receiving a voice instruction; querying feature databases; determining parameter information of the driving modes on the basis of to-be-confirmed voiceprint features; acquiring the voice instruction and acquiring the parameter information of the driving modes in driving procedures. The method, the device, the system and the vehicle have the advantages that the vehicle can be adjusted to be in the most familiar and habitual driving modes by the aid of the single voice instruction, and accordingly users can be positioned in habitual driving environments without manually adjusting the parameter information of the driving modes; the parameter information of the driving modes of the users can be automatically acquired in the vehicle driving procedures of the users without being manually set by the users, the tedious properties of user operation can be prevented, specific physical buttons can be omitted, and influence on the aesthetics of internal environments of the vehicle can be prevented; the quantity of the parameter information of the driving modes of the users is unlimited for the same vehicle, and the personalized driving modes of the various users can be implemented.
Owner:ZHICHEAUTO TECH BEIJING

Device with culture relics exhibiting and protecting function

The invention provides a device which can exhibit and protect cultural relics. The device is characterized in that the device comprises a base; a base plate is arranged at the top of the base; the bottom of a glass cover is fixed on the base plate through a safety lock reed, and a safety alarm is arranged on the safety lock reed; a gland bush is arranged at the butt joint of the glass cover and the base plate; a rotating bushing is arranged at the middle part of the base plate and a gland bush is arranged on the rotating bushing; rotating shafts are arranged inside the rotating bushing and the base; showcase stands are arranged at the top parts of the rotating shafts, and step motors are arranged at the tail ends of the rotating shafts; a temperature sensor, a pressure sensor, a humidity sensor and a gas composition sensor are arranged at two sides of the base plate; and a cavity refrigerating / heating device is arranged at the bottom of the base plate. The device has the advantages that the device can well exhibit the cultural relics and can create a manual protecting environment without damages. The device prevents oxidation, photodegradation, overheating volatilization, mould development and microorganisms and has the function of protecting the cultural relics and the precious article inside the cavity.
Owner:DONGHUA UNIV

Application installation control method, related system and related device

The invention discloses an application installation control method, a related system and a related device, which are used to achieve safety management of applications on a mobile terminal. The application installation control method includes the following steps: an enterprise management client on the mobile terminal receives an installation request for an application listed in a list of applications for free installation; in case the enterprise management client is for sure configured with an application blacklist, whether the application to be installed is in the application blacklist is judged, the installation of the application is prohibited if the application to be installed is in the application blacklist, and the installation of the application proceeds if the application to be installed is not in the application blacklist; in case the enterprise management client is for sure configured with an application whitelist, whether the application to be installed is in the application whitelist is judged, the installation of the application proceeds if the application to be installed is in the application whitelist, and the installation of the application is prohibited if the application to be installed is not in the application whitelist. The invention adopting the technical scheme can effectively protect the information security of enterprises.
Owner:BEIJING QIHOO TECH CO LTD +1

Revocable key external package decryption method based on content attributes

The invention relates to a revocable key external package decryption method based on content attributes. For a trusted authority, 1, initialization is carried out, and system parameters are output; 2, a random number generation algorithm operates; 3, a collision-resistant Hash function is selected, and the Hash value is calculated; 4, a public key and a main key are calculated; 5, the random number is selected, and exponentiation calculation and multiplication are carried out; 6, the collision-resistant Hash function operates, the exponentiation operation is carried out, and a decryption key is obtained. For a data holder, 7, AES data encryption is carried out; 8, an access control matrix is generated; 9, a random number is selected, and an inner product is calculated; 10, multiplication, exponentiation and exclusive-or operation is operated, and ciphertexts are obtained. For a decryption operator, 11, a decryption request and a transformation key are sent. For a mobile storage serve provider, 12, CT2 is sent to an external package decryption agency. For the external package decryption agency, 13, the transformation key is utilized, and the transformation ciphertext is calculated. For the decryption operator, 14, a conversation key is obtained through calculation; 15, AES data decryption is carried out.
Owner:HANGZHOU INNOVATION RES INST OF BEIJING UNIV OF AERONAUTICS & ASTRONAUTICS

Motor function rehabilitation monitoring system based on wireless body area network

The invention discloses a motor function rehabilitation monitoring system based on a wireless body area network. The system comprises a sensor terminal node, a wireless gathering node, a wireless body area network gateway, a personal terminal, a remote medical terminal and an information feedback system, wherein the sensor terminal node comprises a medical sensor, a signal conditioning circuit, a microprocessor unit and a wireless transceiver unit which are sequentially connected, the medical sensor sends collected data into the signal conditioning circuit for preprocessing, and the wireless transceiver unit is controlled to perform wireless transmission after the data is processed by the microprocessor unit; the data collected by the sensor terminal node sequentially passes through the wireless gathering node and the wireless body area network gateway and is respectively transmitted into the personal terminal and the remote medical terminal, and the data is transmitted into the information feedback system after being processed by the remote medical terminal, and is displayed by a 3D model built through the information feedback system. The monitoring system can be used for monitoring the exercise rehabilitation situation of a patient in real time, providing reasonable guidance and advices for subsequent rehabilitation training and improving the rehabilitation training effect.
Owner:NANJING UNIV OF POSTS & TELECOMM

Ultra-high pressure circuit monitoring system for solar power generation

The invention relates to a solar-powered ultra-high voltage line monitoring system, comprising a high-voltage side solar power supply, a high voltage line monitoring device, a low-voltage side solar power supply, a line monitoring host computer and a remote wireless intelligent monitoring system. The high-voltage side solar power supply and the low-voltage side solar power supply comprise solar batteries, rechargeable batteries and power management units; the high voltage line monitoring device and the line monitoring host computer comprise sensing units as well as data acquisition and recording units for detecting and processing field parameters of various lines; and the remote wireless intelligent monitoring system comprises a wireless communication unit and a monitoring system master station. The high-voltage side solar power supply, the high voltage line monitoring device, the low-voltage side solar power supply, the line monitoring host computer and the remote wireless intelligent monitoring system compose a field device which collects and records the running status and fault information of high-voltage lines through solar power and transmits the running status and fault information to the monitoring system master station through the remote wireless communication unit so as to provide real-time information for power line monitoring.
Owner:SOUTHEAST UNIV +2

Shell adding and removing method for Android platform application program protection

The invention discloses a shell adding and removing method for Android platform application program protection. The method includes the shell adding step and the shell removing step for an original executive file of an Android platform application program. The shell adding step refers to the step that the file format structure of the original executive file is analyzed through an externally-arranged shell adding tool, and a source program is encrypted to form data with a shell. The shell removing step refers to the step that before the application program operates, a shell removing program is preferentially loaded and operates in a memory of a mobile terminal, source program decrypting is carried out on the data with the shell, and then the original executive file is loaded to the memory and normally operates. Due to the adoption of the technical scheme of shell adding and removing, innovative thinking and feasible technical solving ways are provided for application shell adding and removing under an Android platform, and the shell adding and removing method can be used for protecting the executive file of the mobile platform, prevent the program from being attacked by hacker means like decompilation, guarantee confidentiality of commercial software and protect user application safety.
Owner:JIANGSU PAYEGIS INFORMATION SECURITY TECH CO LTD

Network safety isolating and information exchanging system and method based on proxy mapping

The invention relates to network security isolation based on agent mapping and information exchanging system and its method. It uses in information exchanging field and network data exchanging field. The in-out net processing units are each connected to the inner net and the outer net in the system. Isolation exchanging unit includes isolation switching controller and isolation storage. The in-out net processing units are connected to the isolation switching controller through high speed data transmission line. The isolation switching controller is connected to the isolation storage. Only one of the in-out net processing units can assess the isolation storage. The in-out net processing units exchange the information through the isolation exchanging unit. The inner net processing unit includes an agent stub and the outer net processing unit includes an agent engine. The method of the invention is that the inner defined transmission interface is called by the agent stub and the agent engine, and the date is exchanged between the in-out net processing units by isolation exchanging unit. So this can construct an information exchanging channel between the inner net client end and the outer net server in the form of agent mapping.
Owner:SHANGHAI JIAO TONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products