Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

647results about How to "Reduce the possibility of leaks" patented technology

Display method of graphical user interface, and mobile terminal

The embodiment of the invention provides a display method of a graphical user interface, and a mobile terminal, and relates to the field of data processing. The method specifically comprises the following steps: judging whether the display screen of the mobile terminal is blocked or not; when a judgment result shows that the display screen is blocked, determining the blocking area and the display area of the display screen, wherein the display area is used for displaying the graphical user interface; determining the parameter information of the display area, wherein the parameter information comprises the area size of the display area and the position of the display screen where the display area is positioned; and according to the parameter information, obtaining the graphical user interface matched with the display area, and displaying the graphical user interface in the display area. The embodiment of the invention judges whether the touch screen of the mobile terminal is blocked or not, when the touch screen is blocked, the graphical user interface is displayed in the display area, the graphical user interface can be only displayed in the display area of the display screen without full-screen display, information leakage possibility is reduced, and privacy is good.
Owner:HUAWEI DEVICE CO LTD

Mobile payment device and method thereof based on NFC technology

The invention discloses a mobile payment device and a method thereof based on an NFC technology, and the NFC technology and hardware encryption are combined. According to the mobile payment device and the method thereof, the NFC technology and the hardware encryption are combined and applied to the field of mobile terminal payment for the first time, and compared with traditional software encryption like dynamic passwords, the hardware encryption is higher in safety and reliability. The mobile payment device is designed in a folding type, a display screen can be folded and put into an outer shell of the mobile payment device when not used, therefore, the occupied space is small, the display screen is protected effectively, and damage to the display screen in the process of mobile carrying can be prevented. The payment device is small in size, easy to carry, and capable of being integrated into a card with a liquid crystal display. According to the mobile payment device and the method thereof, a hardware encryption mode is adopted, a secret key is stored in hardware, safety of the secret key can be guaranteed on the hardware, the secret key in the payment device can not be obtained by the outside through a mobile terminal, possibilities of exposure of the secret key are reduced, and therefore payment can be safer.
Owner:王越 +3

Visible light communication-based limited area authority authentication device and file security method

The invention relates to a restrictive region permission authentication device based on visible optical communication. The device comprises an LED (Light Emitting Diode) controller, a photoelectric receiver, a safety management host and a user host. The LED controller is connected with the safety management host. The photoelectric receiver is connected with the user host. A file encryption methodcomprises the following steps of: 1, numbering files in a unified manner through a file permission management program, hiding in ciphertexts of the files, and distributing to users; 2, numbering fileusers in a unified manner through the file permission management program, and correspondingly establishing a permission database according to user permissions and numbers of the encrypted files; 3, encrypting information and secret keys in the permission database through the file permission management program, and broadcasting the information in a restrictive region through interface equipment; 4, decrypting the permission information and the secrete keys through a file permission service program, and inquiring the user permissions with input user numbers; and 5, regularly executing the step 3 according to application environment requirements, and updating the permission information and the secrete keys till the system stops working.
Owner:中港大公科技(北京)有限公司

File security control and trace method and system based on digital fingerprints

The invention discloses a file security control and trace method and system based on digital fingerprints. The method includes the file uploading procedure and the file downloading procedure. In the file uploading procedure, when a user uploads files to a file server, the file server starts a natural language analysis program and conducts full-context scanning and matched analysis on file contexts, a position where the digital fingerprints can be inserted is found, a fingerprint feature position list is generated, the fingerprint feature position list and original files are stored in the file server together, the uploading and downloading record list is generated, and information uploaded this time is recorded. In the file downloading procedure, when the user sends a file downloading request to the file server, the file server generates binary random codes with the same length according to the length of the fingerprint feature position list, when the random code corresponding position is 1, the digital fingerprints are inserted in the contexts at the corresponding position, a new file is generated and sent to the user, and meanwhile the downloaded information is recorded in the uploading and downloading record list. By means of the method and system, the context files can be traced back, and the security of the context files is managed.
Owner:陈佳阳 +1

An auditable privacy protection deep learning platform construction method based on a block chain incentive mechanism

The invention discloses an auditable privacy protection deep learning platform construction method based on a block chain incentive mechanism. The problem of parameter deficiency in deep learning model training is solved, so that trainers of a plurality of similar models can cooperate to train the deep learning model under the condition that privacy is protected and correctness of the shared parameters can be audited. The technical effects obtained by the method are as follows: firstly, the privacy of parameters is ensured by an encryption method used by a model trainer, and all participants are required to cooperate in the process of decrypting the updated parameters, so that the possibility of parameter leakage is further reduced; Secondly, the encrypted parameters are stored in the block chain in a state form, and only participants and authorized miners can access the encrypted parameters; Thirdly, due to the existence of an excitation mechanism based on a block chain, the effectiveness of parameters is ensured; And the participant needs to pay the collateral money when submitting the parameters, and if the parameters are invalid, the collateral money is not received, so that the auditability of the shared parameters is ensured.
Owner:JINAN UNIVERSITY

Application behavior intercepting method and application behavior intercepting device

An embodiment of the invention provides an application behavior intercepting method and an application behavior intercepting device. The method comprises the following steps of transmitting corresponding inquiry information to an application after dangerous operation information of the application is intercepted by an intercepting module which is injected into a system service process in advance; popping a corresponding prompt box by using the application according to the inquiry information; receiving confirmation information of a corresponding operation inputted by a user; returning the confirmation information to the intercepting module; and allowing or stopping a dangerous operation of the system service process on the application by using the intercepting module according to the received confirmation information. By the method and the device, behaviors of the application can be intercepted effectively; after the behaviors of the application are intercepted, the corresponding operation is stopped temporarily, the temporary stopping operation is notified to the user, the corresponding operation only can be carried out after the confirmation information of the user is obtained, so that the leakage possibility of data information and individual privacy information which are stored in the application is reduced, the safety of personal data is improved, and the user experience is also improved.
Owner:BEIJING QIHOO TECH CO LTD

Crucible and coating method thereof

The invention discloses a crucible and a coating method of the crucible. The disclosed coating method of the crucible comprises the following steps: coating paint is manufactured, and the coating paint comprises hexagonal boron nitride and pure water; the coating paint is coated on the inner wall of the crucible in a spraying mode; and the crucible is aired to be dry. The possibility of the reaction between the crucible and the hexagonal boron nitride is small, silicone material is not prone to stick to the crucible, the possibility of occurrence of leakage is obviously lowered, and therefore the safety and reliability in the process of production of the silicone material are improved. Meanwhile, a coating is poor in wettability with liquid silicone and is not prone to stick to the silicone materials under the condition of carrying the liquid silicone. In addition, due to the fact that the hexagonal boron nitride has good wettability, demolding of a silicone ingot is good. The coating enables the heat conduction to be more uniform in the growth process of the silicone ingot, so that the interior quality of the silicone ingot is improved. Therefore, the coating method of the crucible is capable of reducing the sticking and permeation between the crucible and the liquid silicone material, plays a role in a protective layer, has the functions of lubrication and demolding, and improves the production quality of the silicone material and production efficiency.
Owner:TIANJIN YINGLI NEW ENERGY RESOURCES

Method for improving safety of Web service

The invention discloses a method for improving the safety of Web service, which comprises the following steps: generating a request data packet comprising a first message digest generated by encrypting a user password by using a hash algorithm at a client side, and sending the data packet into a server side; using the hash algorithm to encrypt the stored user password by the service side, and generating a second message digest; comparing the first message digest with the second message digest by the server side, generating and storing a session identifier if the first message digest and the second message digest are same, using a symmetric encryption algorithm to encrypt the session identifier by taking the stored user password as a secret key, and sending the session identifier to the client side; using the symmetric encryption algorithm to decrypt the session identifier by taking the user password as the secret key by the client side to obtain a plaintext of the session identifier, and using the plaintext of the session identifier to send a session request to the server side; firstly judging whether the session identifier which is same as the session identifier in the session request exists or not in a memory by the service side, processing the session request and eliminating the session identifier if so, and returning a processing result.
Owner:深圳市励拓软件有限公司

Encryption-domain reversible information hiding method based on classified scrambling and hiding information classification

InactiveCN107103631AAdd classification scrambling encryptionAchieve protectionImage codingPictoral communicationPattern recognitionXML Encryption
Provided is an encryption-domain reversible information hiding method based on classified scrambling and hiding information classification. Variable pixels and fixed pixels are classified into blocks and scrambled in a classified way to reserve a hidden space of an encryption image; during image encryption, the image is divided into variable pixels and fixed pixels, bitwise XOR and scrambling encryption are carried out by taking the pixel as unit, and pixel values and positions are protected by encryption; at the same time, a block classification matrix serves as a part of an image encryption key, and further the possibility of leakage of content of the encryption image is further reduced; and during information hiding, the information to be hidden is divided into disclosed, authorized and private types according to functions, and protection of different levels is realized by using different encryption methods. During information extraction, the information can be extracted correctly by obtaining corresponding authorization, and the private information is very hard to obtain without a hidden secret key; and during image decryption, the encryption image the same with an original image can be obtained via an encryption key only. An algorithm is easy to realize, and the steganographic capacity is large.
Owner:SOUTHWEST JIAOTONG UNIV

Sealing device and bearing box system

The invention provides a sealing device and a bearing box system. The device is installed in a bearing cavity which is provided with a shaft, a bearing and a shaft sleeve, wherein the bearing and theshaft sleeve are arranged outside the shaft in a sleeving mode, the shaft sleeve abuts against the end surface of the bearing, and the shaft sleeve is made of a magnetic material; the sealing device comprises a first magnetic conductor, a permanent magnet and a second magnetic conductor; the first magnetic conductor, the permanent magnet and the second magnetic conductor are arranged outside the shaft sleeve in a sleeving mode, the first magnetic conductor abuts against the end surface, the permanent magnet is clamped between the first magnetic conductor and the second magnetic conductor, andthe permanent magnet, the first magnetic conductor, the shaft sleeve and the second magnetic conductor are matched to form a closed magnetic line; and gaps are formed between the outer wall of the shaft sleeve and the inner wall of the first magnetic conductor and between the outer wall of the shaft sleeve and the inner wall of the second magnetic conductor, and pole teeth are arranged on the inner wall of the first magnetic conductor and the inner wall of the second magnetic conductor, and the gaps and the pole teeth are all filled with magnetic fluid. The embodiment of the sealing device caneffectively ensure the sealing effect on the bearing cavity, thereby avoiding environmental pollution and harm to human health.
Owner:BEIJING UNIV OF CHEM TECH

Insulated container based on integral cold storage plate and cold filling and cold supply method of insulated container

The invention discloses an insulated container based on an integral cold storage plate and a cold filling and cold supply method of the insulated container. The insulated container comprises a container body provided with a heat insulation container wall, and a cold storage plate device and a cold filling pipeline system are arranged in the container body. The cold storage plate device comprises at least one cold storage plate. Each cold storage plate comprises a cold storage plate shell and a longitudinal partition plate connected with the cold storage plate shell into a whole. One part is isolated out of the space in each cold storage plate shell by the corresponding longitudinal partition plate to serve as a cold filling channel, and the rest of parts of the space of each cold storage plate shell serve as a cold storage liquid cavity. The cold filling pipeline system comprises a secondary refrigerant inlet pipe, a secondary refrigerant return pipe and a cold filling connector. The cold filling channels of all the cold storage plates are connected between the secondary refrigerant inlet pipe and the secondary refrigerant return pipe. By means of the cold filling and cold supply method, a ground movable or fixed cold filling station is utilized for filling the cold storage plates with cold, cold storage liquid in the cold storage plates stores cold of the maximum quantity, andsource-free refrigerating in the transporting process is achieved.
Owner:CHINA RAILWAYS CORPORATION +2
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products