Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

48results about How to "Reduce security breaches" patented technology

Spin memory and calculation integrated chip

The invention discloses a spin memory and calculation integrated chip, which comprises a spin array module and a peripheral circuit, the spin array module comprises a plurality of spin memories distributed in an array and is used for storing and calculating data; and the spin memory includes a first memory cell composed of a magnetic random access memory (MRAM) array including a magnetic tunnel junction (MTJ) structure for storing data required to be stored for a long time. The peripheral circuit is connected with the spin array module and is used for assisting the spin array module in data storage and calculation. According to the invention, the MRAM is built in the computing core to form the spin memory computing core with storage and computing functions at the same time, the spin memorycomputing chip is formed through the interconnection of the independent spin memory computing cores, and the processing terminal is further formed through the interconnection of the chips. Accordingto the present invention, the problems of a storage wall and a power consumption wall existing in data transmission and processing under a traditional computing framework are effectively solved, and the computing energy efficiency of the system is improved.
Owner:致真存储(北京)科技有限公司

Handheld smart device data security protection method

The invention relates to a handheld smart device data security protection method, comprising steps that: whether a password input by a user through human-computer interaction is correct is judged and if so, a setting of a privacy protection status is changed, and if not, the setting of the privacy protection status remains unchanged; and according to a true record of the privacy protection status, device file management software and protected software are hidden, and otherwise, the device file management software and the protected software are shown and used normally. The method of the invention further comprises steps that: 1101) connection between the handheld smart device and a computer via a USB port is detected and judged; 1102) whether the device is in the privacy protection status is judged and if so, a user interface entrance which has a U disc using function is hidden and a logic code of opening the U disc is not performed; and otherwise, normal operation is carried out; 1201) installation or unloading of application software is detected and judged; and 1202) whether the device is in the privacy protection status is judged, and if so, a user operation instruction or a logic code for the installation or unloading is not performed; and otherwise, normal installation or unloading is performed.
Owner:GUANGDONG OPPO MOBILE TELECOMM CORP LTD

Wireless narrow-band video system for special vehicle of internet of things

The invention relates to a wireless narrow-band video system for a special vehicle of an internet of things. The wireless narrow-band video system comprises a wireless intelligent terminal, a vehicle mounted display screen, a sensor module, mobile handheld equipment, a server and a management platform module, wherein the wireless intelligent terminal is respectively connected with a vehicle mounted camera and a voice module through lines; the wireless intelligent terminal is also connected with a GPS (Global Positioning System) positioning module and a wireless communication module through lines; the vehicle mounted display screen is connected with the wireless intelligent terminal through a line; the sensor module is connected with the wireless intelligent terminal through a line; the mobile handheld equipment is connected with the wireless intelligent terminal by a wireless operator network; the server is connected with the wireless intelligent terminal by a wireless operator network; and the management platform module is connected with the server through a line. The wireless narrow-band video system provided by the invention has the advantages that problems of finishing transmission and recording of field video information during the working of police vehicles, financial cash transport vehicles, prisoner escorting vehicles, fire-fighting vehicles, duty guard vehicles, cruisers and other vehicles are solved and functions of narrow band video transmission, voice call, vehicle positioning and the like are obtained.
Owner:BEIJING BOYA YINGJIE TECH

Health information collection device and intelligent monitoring system thereof

The invention discloses a portable device with a health information collection function, and an intelligent monitoring system of the portable device. The health information collection device comprises a portable information collection module and a monitoring module located at a station. The intelligent monitoring system is based on an information acquisition module, a monitoring module and a database, wherein the monitoring module and the database are located at a station, and dangerous regional information, starting time of danger, a safety interval of set temperature, an information extraction module and an information comparison module are stored in the database. According to the health information collection device, body temperature information and travel information of a user are monitored in an automatic monitoring mode, so that contact between managers and a detected person is avoided, and control over adverse factors is facilitated; and through identification of the identity information and the face information, the health information collection device is ensured to belong to the user, so that the verification accuracy is improved, security holes are reduced, comprehensive monitoring is ensured, and the health safety in the area is ensured.
Owner:深圳市瑞安医疗服务有限公司

Security evaluation method and device of elliptic curve algorithm

The invention provides a security evaluation method and device of an elliptic curve algorithm. The method comprises the steps that an energy consumption curve of a chip based on the elliptic curve algorithm in performing a point multiplication operation is determined, wherein the energy consumption curve characterizes the relationship between energy and time consumed by the chip; based on a pre-established energy consumption characteristic database, a first energy consumption sub-curve corresponding to the point multiplication operation and a second energy consumption sub-curve corresponding to a point addition operation are located from the energy consumption curve; based on the energy consumption curve, the type of the point multiplication operation is determined; the security of the elliptic curve algorithm is evaluated according to the types of the point multiplication operation, the first energy consumption sub-curve and the second energy consumption sub-curve. The security evaluation method and device of the elliptic curve algorithm can evaluate the security of the point multiplication operation of the elliptic curve algorithm before the elliptic curve cipher products leave the factory, and the situation that the elliptic curve cipher products have security loopholes after leaving the factory is avoided.
Owner:北京智慧云测科技有限公司 +1

Trusted measurement control method based on the state and behavior of Internet-of-Things sensing layer

The invention discloses a trusted measurement control method based on the state and behavior of an Internet-of-Things sensing layer, and the method comprises the steps: integrating a plurality of measurement elements, such as state trusted measurement and behavior trusted measurement, on the basis of a trusted network connection model of the Internet-of-Things sensing layer, and researching a trusted measurement mechanism of the Internet-of-Things sensing layer combining active measurement and passive measurement; and on the basis of trusted measurement, developing and writting a trusted operation control software code into the TPM chip, and embedding the TPM chip into the Internet-of-Things sensing layer, so that safe operation of the Internet-of-Things sensing layer is controllable. Aiming at a typical application scene of the Internet of Things, starting from a hardware bottom layer of a sensing layer, taking a trusted computing technology as a basis and taking access control as a core, the security of core service is ensured, a strict security protection environment is formed, malicious behaviors such as code tampering are resisted, and the research and development cost and equipment cost of sensing layer equipment of the Internet of Things are reduced; and internet-of-Things security holes can be reduced, national economic losses can be reduced, and national public properties can be protected.
Owner:江西畅然科技发展有限公司 +1

Electronic net for transportation safety and weaving method of electronic net

The invention provides an electronic network for transportation safety. A net body of the electronic net is formed by weaving a braided line with a wire, or a plurality of sub-net bodies are arranged,a wire among the sub-net bodies is also formed by series connection; two ends of the wire of the net body are connected to an electronic lock; if the net body is damaged, the wire in the braided lineis broken, the electronic lock can quickly monitor a fault; even if the broken wire is reconnected, the fault record of the electronic lock cannot be eliminated; and therefore, after safety inspection of goods is completed through X-rays, the electronic net is used for covering the goods, the electronic net and a bottom plate are locked through fixing belts, and rope belts are additionally adopted, and marked, then the goods can be transferred; after the goods can be transferred, only personnel need to be arranged to check whether the electronic lock has a fault signal or not and observe whether the identifiers of the rope belts is consistent with the record or not and whether the rope belts are damaged or not, and therefore, whether transfer has a safety problem or not can be checked; anoperation process is simple, and safety loopholes caused by personnel negligence can be greatly reduced.
Owner:AUTOTOLL INT LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products