Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

176results about How to "Reduce security threats" patented technology

SGX-based secret key protection method and device for blockchain user

The invention discloses an SGX-based secret key protection device for a blockchain user. The device comprises an SGX encryption module, a transaction common recognition module and a transaction construction module; the SGX encryption module generates a trustable space on the basis of a software protection expanded instruction, and generates an access secret key for verifying the access authority of the trustable space; the trustable space is used to store a user secret key and a secret key operation function of a blockchain network; the transaction common recognition module receives a transaction from the blockchain network, accesses the SGX encryption module via the access secret key, calls the secret key operation function, and realizes verification common-recognition of the transaction;and the transaction construction module initiates the transaction according to intention of the user, accesses the SGX encryption module via the access secret key, calls the secret key operation function, realizes filling and legalization of transaction information, and broadcasts the transaction to the blockchain network. The invention also discloses an SGX-based secret key protection method fora blockchain user. The method can be used to prevent malicious software from sniffing and cracking the local secret key of the user, and blockchain assets of the user are protected against intrusion.
Owner:ZHEJIANG UNIV

Vehicle anti-collision early warning system based on laser radar ranging

The invention discloses a vehicle anti-collision early warning system based on laser radar ranging. The vehicle anti-collision early warning system comprises 2n laser radar emitters and 2n optical lenses, wherein n is a natural number. Each laser radar emitter is paired with one optical lens to form a signal receiving and transmitting group. Each signal receiving and transmitting group is arranged along the central axis of a vehicle. An acute angle is formed between each optical lens and the vertical direction of the corresponding laser radar emitter. The laser radar emitters on one side of the central axis emit laser signals, and the laser signals are scattered after contacting with objects in places ahead and are received by the optical lenses at corresponding positions on the other side of the central axis. The vehicle anti-collision early warning system has the advantages that through intelligent anti-collision active early warning based on accurate laser radar ranging, users can get better experience effects; double-lens design is adopted, the lenses are treated specially in terms of optical design, and high-accuracy optical imaging and detecting and lens structure design applicable to complex in-vehicle environments can be guaranteed.
Owner:南京瞳乐信息科技有限公司

Mimicry switch judgment system and method based on trusted measurement

The invention belongs to the technical field of network security, and discloses a mimicry switch decision system based on trusted measurement, and the system comprises a forwarding plane, a managementinterface agent, an intermediate adaptation module, a forwarding plane agent, a plurality of heterogeneous actuators, a trusted measurement-based mimicry decision module and a situation awareness andnegative feedback scheduling module. The invention further discloses a mimicry switch judgment method based on trusted measurement. The mimicry switch judgment method comprises the steps: setting mimicry switch judgment elements; distributing input information; collecting output information; carrying out mimicry decision based on credibility measurement; issuing a judgment result, sensing the threat situation of the switch, and scheduling an executor; the mimicry decision based on credibility measurement comprises the following steps: establishing an executive credible index tree; collectingand updating the credible index data of the executive body; calculating the credible weight of the output result of each executive body; and calculating the credibility of each output result. The method can effectively reduce the influence of unknown loopholes and potential backdoors, and improves the safety protection level of a local area network.
Owner:PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU +1

Fingerprint lock control system and method based on blockchain technology

The invention discloses a fingerprint lock control system and method based on blockchain technology, and the fingerprint lock control system comprises an identity recognition module, a fingerprint lock management module and a household owner terminal, wherein the identity recognition module comprises a password recognition unit, a fingerprint recognition unit, a dynamic code identifying unit and averifying unit, and the password identifying unit, the fingerprint identifying unit and the dynamic code identifying unit are electrically connected to the verifying unit, respectively. The fingerprint lock control system provided by the invention is reasonable in module design and simple in operation. By combining the blockchain and the fingerprint lock technology, the fingerprint lock control system and method provided by the invention not only effectively realize the control and management of the fingerprint lock, but also ensure the safety of the house of the household owner, and at the same time greatly reduce the threat of the house. In the technical solution, presets and corresponding module settings are made for various situations that may occur in the house, so that the householdowner can understand and carry out effective treatment in the first time in the case of house theft to reduce the property loss, thereby having high practicability.
Owner:江苏橙贝科技有限公司

Firewall based on multiprocessor architecture

A firewall based on a multiprocessor architecture comprises a main processor for processing a management flow of the firewall and a coprocessor which is used for carrying out parallel processing on the service flow of the firewall, and the main processor and the coprocessor are independent of each other and communicate with each other through a communication interface. The firewall provided by theinvention adopts a double-processor architecture, the two processors are independent of each other and are in limited communication through the communication interface, and when the main processor isattacked by a network or the main processor cannot work normally, the service processing unit of the coprocessor can still process the service flow normally. Compared with other industrial control firewalls, the firewall disclosed by the invention has the advantages that the reduced processing time reaches several orders of magnitudes, and the 100% throughput is achieved under the conditions of gigabit rate linear speed and 64-byte Ethernet message through the modules such as message deep analysis, basic strategy matching, industrial control protocol function code matching, industrial controlprotocol parameter matching, alarm information uploading and the like.
Owner:浙江国利网安科技有限公司

Multifunction wing tip turbine engine having fore-lying impellers

The invention relates to completely-new wing auxiliary equipment or a novel wing. According to the present invention, the front part of a wing tip is provided with a circle or a plurality of circles of impellers, a fairing is arranged on the front and the rear of a shaft disc of the impeller and extends to the whole wing tip, variable pitch blades are arranged in front of the wing tip through a wheel hub, a gear and a rotation shaft, and drive an electricity generation device arranged on the wing tip position or other transmission devices, the impeller is driven to rotate through facing airflow, the blade can rotate in a direction against an upward turning eddy flow of the wing tip under pushing of the incoming flow with an installation angle ( as shown in Figure 1) of the blade, such that right wing tip counterclockwise rotation wing tip eddy flow generated in the normal wing profile is previously decreased, rotation airflows generated by the impellers on both edges upward impact the wings from the bottom of the wings so as to further increase lifting force, and substantial lifting increase and resistance reduction are achieved with the benign effects. The multifunction wing tip turbine engine even can replace an electromotor driven by the aircraft motor part or generate auxiliary power, such that safety threat on the back flying aircraft by the wing tip wake of the front flying aircraft can be decreased, and aviation industry safety can be improved.
Owner:刘婉婷 +2

Identity authentication method and device of equipment and computer storage medium

The invention discloses an identity authentication method and device of equipment and a computer storage medium. The method comprises that in response to an inquiry instruction sent by a management platform, the device calculates a first hash value according to the device identity information and a received random number, and sends the first hash value to the management platform; the device sendsthe first hash value to the management platform according to the first hash value; the random number is generated by the management platform after the device joins the network; in response to a queryresponse instruction sent by the device, the management platform calculates the received first hash value, obtains a second hash value and sends it to the server; the server performs legitimacy authentication on the device according to the first hash value, obtains authentication information corresponding to the device and returns the authentication information to the management platform, so thatthe management platform calculates a third hash value according to the authentication information; according to the received third hash value, the device authenticates the validity of the management platform, which can effectively improve the efficiency and security of identity authentication, and effectively improve the efficiency and security and reliability of equipment information transmission.
Owner:GCI SCI & TECH

Civil explosive article destroying device and method

The invention discloses a civil explosive article destroying device and method. The civil explosive article destroying device comprises a wire control device body, an explosion steel drum and a monitoring port. The lower end of the wire control device body of the destroying device is fixed to the upper edge of the explosion steel drum through supporting rods, and the two sides of the wire control device are provided with a first wire coil and a second wire coil correspondingly. According to the civil explosive article destroying device and method, explosion vibration can be remarkably reduced, and explosion noise is lowered; fragments produced through explosion and remaining explosives are collected to the bottom of the steel drum so that collecting, processing and analyzing can be convenient, and pollution to the environment of a destroying site is reduced; nearby arrangement can be conducted, so that the safety and the convenience of explosive articles in the destroying process are improved; the temperature and the toxic gas content in the explosion steel drum are detected in time through the monitoring port, and the situation that the temperature is too high due to multiple times of explosion, and the safety of operation personnel is threatened due to the fact that the toxic gas content is too high is avoided; the excavation number and time of explosion tunnels are decreased, and resources are saved; and the labor cost is reduced, and the working efficiency is improved.
Owner:ANHUI UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products