Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

95results about How to "Reduce the Risk of Confidentiality" patented technology

Safety JTAG module and method for protecting safety of information inside chip

The invention relates to a safety JTAG module and a method for protecting security of information inside a chip, wherein the safety JTAG module comprises a nonvolatile medium (206), a loading circuit (205), a security attribute control register (214), a TAP controller (201), two selectors (207 and 211), a switch (203), a password authentication module and a logic processing module; the TAP controller (201) and the two selectors (207 and 211) are connected between a JTAG port (1) and a protected object inside the chip; the switch (203) is switched by the control of a timer (202); the password authentication module is used for authenticating whether a clear-text password input by a user is accordant with a fuzzification password or not; and the logic processing module is used for logically processing an authentication result output by the password authentication module and an indication signal output by the security attribute control register (214) and outputting an enable signal to the two selectors (207 and 211) so as to control whether the JTAG port (1) is allowed to be connected with the protected object inside the chip through the TAP controller (201) or not. The invention ensures the security and the convenience of an SOC chip in testing and debugging processes, thereby protecting the security of data inside the chip.
Owner:SHENZHEN STATE MICRO TECH CO LTD

Method and device for safety control and source-tracing tracking of paper document

The invention relates to a method and device for safety control and source-tracing tracking of a paper document. The method comprises the steps that (1) a client side inserts watermark information in the printed and output paper document by a printing control module; (2) when the printed paper document is copied, copying user identity authentication will be conducted by a copy control module, a user obtains scanning image data of the paper document after passing the identity authentication, the watermark information inserted into the paper document is extracted in real time, and then legality of a copy operation behavior is judged; (3) when the copy operation behavior of the paper document is judged to be legal, the watermark information will be inserted into the copied and output paper document once again; and (4) the copied and output paper document is converted into digital image data by digital equipment, and a watermark information extraction and recognition program is conducted for a document source-tracing tracking operation. According to the invention, technical puzzles in safety control output, source-tracking tracking of secrete divulgence and so forth during whole processes of paper document printing and copying can be solved uniformly.
Owner:李晓妮

Screen control system combining strength and fingerprint identification and control mode thereof

The invention provides a screen control system combining strength and fingerprint identification and a control mode thereof. A triggering processor is sensed by a position sensing assembly in real time, and the triggering processor enables a biological characteristic identification assembly and a pressure sensing assembly; click position information is obtained by the position sensing assembly, biological characteristic information is obtained by the biological characteristic identification assembly, and the pressure information at the click position of a finger is sensed by the pressure sensing assembly; after the triggering processor receives the above information, the information is converted into a secret key according to specific logic, then whether the secret key is reasonable or not is verified for unlocking the screen; a simple and practical advanced ciphering / deciphering strategy is realized by combining three technologies of touch screen, pressure-sensitive touch and fingerprint identification; by combining touch screen, pressure-sensitive touch and fingerprint identification, the security of secret keys is strengthened, operability is stronger, promotion and implementation are easy to achieve, and the system has broader industrial application prospect.
Owner:SHENZHEN TINNO WIRELESS TECH

Desktop display control method and device and mobile terminal

The invention provides a desktop display control method and device and a mobile terminal. The method comprises the following steps: according to the task attribute and the application level of an application program, establishing one or a plurality of application program lists by all application programs of a terminal, and independently generating a plurality of display desktops by each application program according to a prestored interface display style; detecting a sliding event to a touch display screen by a user, and switching the display desktops according to the movement direction and the movement position of a finger of the user; according to a preset configuration strategy, carrying out user identity verification, and switching to a target display desktop after the user identity is successfully verified; and carrying out encrypted storage on the private data of the application programs on the current display desktop. The application programs are subjected to centralized management under different tasks, time for users to look up applications is shortened, different desktops are switched through a way of screen sliding, so that the desktop display control method is simple, easy in use and convenient in operation, user privacy can be prevented from being leaked through a setting of encrypted storage, and safety is improved to a certain degree.
Owner:DATA COMM SCI & TECH RES INST

End-to-end encryption method and system based on mobile network and communication client side

InactiveCN104270380AAvoid the defects of plaintext transmissionAvoid controlTransmissionSecurity arrangementPlaintextEnd-to-end encryption
The invention relates to an end-to-end encryption method based on a mobile network and a communication client side, and further relates to an end-to-end encryption system based on the mobile network and the communication client side. According to the encryption method, the symmetric encryption algorithm is adopted to carry out data encryption, an account number managing center is used for managing the identity and a secret key of an authorized user, a secret key processing module is used for carrying out secret key encryption and decryption on a secrecy system, a terminal processing module is used for carrying out encryption or decryption on the plaintext or ciphertext data information through the symmetric encryption algorithm, and a communication software client side is used for transmitting enciphered data, and accordingly the end-to-end enciphered data interaction is achieved. The encryption system comprises the account number managing center, the secret key processing module and the terminal processing module, the account number management center and the secret key processing module interact through the mobile communication network, the terminal processing module interacts with the enciphered data through the communication software client side, and encryption or decryption on the terminal processing module is achieved. The end-to-end encryption method and the end-to-end encryption system are good in encryption safety and capable of being used for various mobile communication platforms.
Owner:叶涛

Decision model construction method, decision method and decision model

The invention provides a decision model construction method, a decision method and a decision model. The method comprises the following steps of sending an attribute number and a to-be-batched data number used by a to-be-constructed node in the current iteration to N data platforms; determining a task data platform corresponding to the to-be-constructed node according to the N maximum informationgain rates based on the batch attribute numbers sent by the N data platforms; sending a node construction notification to the task data platform, and obtaining a batch data number determined by the task data platform according to the batch attribute number and the to-be-batched data number; synchronizing the batch data numbers to the rest N-1 data platforms to form the child nodes of the to-be-constructed node and the to-be-batch data numbers corresponding to the child nodes; and when the next to-be-constructed node exists, determining the batch attribute number of the to-be-constructed node and repeating the above steps. According to the decision model construction method provided by the invention, the data interaction during a multi-platform joint modeling process can be reduced, and thedata confidentiality is improved.
Owner:JINGDONG CITY BEIJING DIGITS TECH CO LTD

Information full-text retrieval method and system based on intra-domain information access permission

The invention discloses an information full-text retrieval method based on intra-domain information access permission, which comprises the following steps: extracting key field information of each unit data from updated data according to a preset information extraction rule, and adding the key field information into an index submission queue according to a preset format; obtaining identity authentication information of a login user; and screening unit data containing the search request content and a field for describing the access authority, the authority information of which is higher than the identity authentication information of the login user, based on a preset authority matching rule by utilizing the search request content of the login user and the identity authentication informationof the login user, and returning the unit data. The method is based on the Lucene search engine, the engine only returns data with right access during retrieval, secondary screening is not needed, and the risk of data leakage is reduced to the maximum extent. Meanwhile, the index is established through the keywords, the matching speed is high, the accuracy is high, high concurrency support of Lucene is quite good, and the search efficiency in the high concurrency environment is guaranteed.
Owner:HUADI COMP GROUP

Ultrahigh-speed all-optical data real-time encryption/decryption systems and methods based on composite logic

In order to solve the problems in the prior art, for example, all-optical data in the physical layer is easy to crack, and it is difficult to encrypt ultrahigh-speed data in real time, the invention provides ultrahigh-speed all-optical data real-time encryption/decryption systems and methods based on composite logic. The encryption method comprises the following steps: (1) generating a first electrical domain pseudo-random sequence and a reference clock; (2) loading the first electrical domain pseudo-random sequence onto a pulse laser carrier output by a first laser to produce an optical domain random encryption key; (3) injecting the optical domain random encryption key and to-be-encrypted ultrahigh-speed all-optical data together into a first optical fiber amplifier for optical power amplification; (3) injecting the amplified optical domain random encryption key and the amplified ultrahigh-speed all-optical data together into a first high-nonlinearity optical fiber to produce different logic in real time between the optical domain random encryption key and the ultrahigh-speed all-optical data; and (4) carrying out filtering at different wavelengths at the output end of the first high-nonlinearity optical fiber, and coupling two filtered wavelengths to form an optical cipher text with composite logic.
Owner:XI'AN INST OF OPTICS & FINE MECHANICS - CHINESE ACAD OF SCI

A method for dynamically analyze locomotive event data

ActiveCN109491660AClear business boundariesMeet data analysis needsCode compilationConfidentialityData acquisition
The invention provides a method for dynamically analyzing locomotive event data suitable for locomotive event data acquisition and processing system, a locomotive description file is use to store thatcommunication bus type, communication port number, data frame identifier group, variable position, data processing formula, description information such as disposal conditions, each description information corresponds to various buses and data transmission protocols of the buses. The ground equipment reads the description information and transmits it to the vehicle-mounted equipment. The vehicle-mounted equipment creates a data frame management class, a data variable management class, an event management class and a global management data dictionary according to the description information, and extracts, processes and stores the locomotive event information. When the data transfer format on the locomotive is updated, Modifying the locomotive description file can meet the needs of data analysis without modifying the software, which reduces the test requirements after the locomotive data change, saves the cost, makes the business boundary between the locomotive integration unit and thedata acquisition and processing system supplier clearer, and reduces the risk of confidentiality leakage of the locomotive integration unit.
Owner:大连莱克科技发展有限公司

Safety JTAG module and method for protecting safety of information inside chip

The invention relates to a safety JTAG circuit and a method for protecting the security of information inside a chip. The safety JTAG circuit connected between a JTAG port and a protected object comprises a nonvolatile medium, a loading circuit, a security attribute control register, a TAP controller, a first selector, a second selector, a switch, a password authentication circuit and a logic processing circuit. The TAP controller and the two selectors are connected between the JTAG port and the protected object. The switch is switched by the control of a timer. The password authentication circuit is used for authenticating whether a clear-text password input by a user is accordant with a fuzzification password or not. The logic processing circuit is used for logically processing an authentication result output by the password authentication circuit and an indication signal output by the security attribute control register and outputting an enable signal to the two selectors so as to control whether the JTAG port is allowed to be connected with the protected object inside the chip through the TAP controller or not. The invention ensures the security and the convenience of an SOC chip in testing and debugging processes, thereby protecting the security of data inside the chip.
Owner:SHENZHEN STATE MICRO TECH CO LTD

Document security level division method based on decision tree

The invention provides a document security level division method based on a decision tree, which comprises the following specific steps: step 1, traversing all conditions in a sample set, calculating Gini indexes of the sample set under different conditions, and selecting a condition corresponding to a minimum value as a first segmentation point, so as to divide a leaf node and remaining child nodes; step 2, continuing to calculate the Gini index of the new sample set for the remaining conditions for the child nodes, performing further subdivision, selecting a value with the minimum Gini index as a second segmentation point, and continuing to screen out leaf nodes and the child nodes; step 3, repeating the process until division of all conditions is realized, and realizing establishment of a decision tree; and step 4, re-capturing the sample for determination, and verifying the new sample according to the decision tree established by the training set to realize determination of the document security level. According to the method, automatic judgment of the document security level is realized, the workload of judgment personnel is greatly reduced, the judgment accuracy is improved, and a powerful guarantee is provided for a company to reduce the document leakage risk.
Owner:STATE GRID CORP OF CHINA +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products