Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

151results about How to "Secure Access" patented technology

Trusted network access and access control system and method

The invention discloses a trusted network access and access control system. The control system comprises a network access requester, a network access decision-maker and a network access controller. When the network access requester accesses to the network, platform identity authentication is carried out, and secure and trusted states of the requester are detected; the secure and trusted states are sent to the network access decision-maker, and the decision-maker judges the secure and trust level of the requester and gives a network access decision; the network access decision is sent to the network access controller, and the controller limits the requested network access. The invention further discloses a trusted network access and access control method. The control system carries out the platform identity authentication on the basis of TCM and ensures the network access control while avoids identity forging. Network areas are divided on the basis of a digital label technology and dynamically updated, network self-adaption is realized, and the access security of different logical areas is ensured. Secure and trusted strategies are configured, and combined with the TCM cryptographic algorithm, so that the security and credibility of the platform state of the requester are ensured.
Owner:SHANDONG LANGCHAO YUNTOU INFORMATION TECH CO LTD

Method for realizing safe access of terminal of internet of thing

The invention discloses a method for realizing safe access of a terminal of internet of thing, which comprises the steps of: storing an authorization message in an electronic key, and using the authorization message as an identity identification, wherein the authorization message is used as a private key signature by an authorized management node and stored in the authorized management node; writing the authorization message into the electronic key in an electronic key authorization list of the management node; when no terminal node connected with the electronic key applies to accessing the internet, searching a terminal authorization list by the management node to judge whether the access of the terminal node is allowed; and when the terminal node connected with the electronic key applies to accessing the internet, firstly executing the operation without the electronic key by the management node, and if the terminal is failed to access, searching the electronic key authorization listto judge whether the access of the terminal node is allowed. According to the method realizing the safe access of the terminal of the internet of thing, disclosed in the invention, the problem of safe access of the terminal can be effectively solved, a great amount of terminals of the internet of thing can be effectively managed, and the rapid automatic access of the terminals of the internet of thing can be realized.
Owner:无锡鼎驰信息科技有限公司

Water, fire and light combined optimization power generation scheduling optimization method considering security constraints

The invention belongs to the technical field of electric power system dispatching automation and relates to a water, fire and light combined optimization power generation scheduling optimization method considering security constraints. According to the water, fire and light combined optimization power generation scheduling optimization method, the objective of the method is to realize minimum power generation cost of a system; comprehensive considerations are given to coordinated scheduling of hydroelectric, thermal power and photovoltaic power generator sets; all kinds of constraint conditions are considered, such that optimal computation is performed power generation scheduling of the generator sets; safe access of new energy such as photovoltaic power generation power can be ensured; the improvement of intelligent level and decision making ability of power generation scheduling after the access of the new energy can be facilitated; and through interactive iteration solution of two sub-problems of optimization calculation and safety correction, the power generation scheduling of the hydroelectric, thermal power and photovoltaic power generator sets, which satisfy a requirement for network safety, can be obtained, and therefore, the performability of the power generation scheduling can be ensured. The water, fire and light combined optimization power generation scheduling optimization method considering security constraints of the invention is advantageous in low calculation strength and strong adaptability, and is more suitable for being popularized and applied to scheduling mechanisms of which photovoltaic power generation power access power is larger in China.
Owner:NARI TECH CO LTD

Method and system for implementing safety access public network of network terminal as well as special network access controller thereof

The invention discloses a method for realizing that a network terminal can safely access a public network. The method comprises the following steps: a network access controller is connected in series between the network terminal and the public network; when a firewall strategy database is required to be configured, a user on a network terminal submits configuration request information; the network access control server generates a group of corresponding configuration command data packet which is transmitted to the network terminal according to the configuration request information; the group of configuration command data packet is captured by the network access control server which is connected in series on the link so as to analyze and execute the corresponding configuration command and complete the update to the configuration of firewall policy; and the user on the network terminal access the public network under the security protection of the firewall policy configured by the network access control server. The invention also discloses a system for realizing that the network terminal can safely access the public network and the network access control server. The method, the system and the network access control server not only can ensure that the network terminal can safely access the public network, but also can be convenient for a user to use.
Owner:苏州凌犀物联网技术有限公司

Standby volume analytical method under coordinating dispatch mode of batch-type energy and conventional energy

The invention discloses a standby volume analytical method under a coordinating dispatch mode of batch-type energy and conventional energy. The method comprises the following five steps of calculating a standby past sample data region, obtaining similar cluster time intervals in a planed date, carrying out statics on a forecast output power deviation distribution of each time interval, obtaining a probability density function of the standby volume of wind energy, and calculating a rotation standby volume of a system under the coordinating dispatch mode of the batch-type energy and the conventional energy. With the adoption of the analytical method, according to a consideration of the coordinating dispatch of assembling units of the batch-type energy and the conventional energy, statics and analysis on data of past wind-power operation are carried out to form the current requirement on the rotation standby volume, safety guarantee is provided for the coordinating dispatch of the batch-type energy and the conventional energy, a reasonable standby volume is provided, and the realization of economical requirement on operation of a power system is facilitated. The method has the characteristics of low calculation intensity and strong adaptability, and is more suitable for popularization and application of connecting with dispatch mechanisms with larger power of wind power.
Owner:NARI TECH CO LTD +1

Tamper-proof license camera system and method

The invention discloses a tamper-proof license camera system and method. The tamper-proof license camera system comprises a license camera, a license camera access server and a license cloud storage, wherein the license camera comprises a license original picture shooting module, an access modification prohibition module, a watermark encryption module and a transmission communication module. The tamper-proof license picture shooting method comprises the following steps: shooting license original pictures by the license camera; in the process of shooting and generating the license original pictures, prohibiting users or other software to access the original picture data, and prohibiting users or other software to modify the license original picture data; writing the shot license original pictures into a fragile watermark and encrypting the shot license original pictures; performing compression and secondary encryption on the pictures after being performed watermark encryption, and transmitting the pictures to an independent storage space of a license cloud storage end for conservation. The tamper-proof license camera system and method provided by the invention can guarantee the authenticity and timeliness of pictures in the processes from imaging to generating standard license pictures, submitting and transmitting, prevent pictures from being tampered, and can very conveniently and easily acquire the license pictures.
Owner:GUANGZHOU XINGFU NETWORK TECH

Dangerous chemical storage cabinet

The invention relates to a dangerous chemical storage cabinet. The dangerous chemical storage cabinet comprises a cabinet body, wherein the cabinet body comprises a plurality of storage cells, a door is mounted on each storage cell, an electronic lock connected with a main control device is arranged between each door and the corresponding storage cell, the main control device is provided with an identity authentication device, an information acquisition device, an input-output device, a video monitoring device, an alarm device and a wireless data transmission device, the main control device is connected with a remote server; and a temperature sensor, a humidity sensor, a smoke detector, a dehumidifying machine core and a cooler are arranged in each storage cell of the cabinet body. According to the dangerous chemical storage cabinet provided by the invention, a storage environment for dangerous chemicals in the cabinet can be monitored in real time and adjusted automatically; the storage information of the dangerous chemicals and the condition of entering and exiting the cabinet body of the dangerous chemicals are read in real time; the problems that information management cannot implemented in time and is not perfect, and the safety supervision is not in place during manual operation are solved, supervision level and working efficiency are effectively improved, and the storage and access security of the dangerous chemicals is guaranteed.
Owner:ZHEJIANG UNIV OF TECH

Method and system for changing data transfer bus

The invention discloses a method for changing a data transfer bus, which comprises the following steps: receiving telemetry parallel data (sub)frame by (sub)frame, and converting the parallel data into serial data; carrying out the lossless compression on the serial data; transferring the compressed data to an upper computer via Ethernet; and demodulating, recording and storing various physical variables by the upper computer according to the data transfer protocol and the data telemetry protocol of the product. Accordingly, a tester can complete the remote setting of working conditions and the task of information query interaction by the upper computer. An information processing platform system has a structure of FPGA (field programmable gate array), DSP (digital signal processor) and ARM (advanced reduced instruction set computer machine), wherein the FPGA completes the task of converting the parallel data to the serial data; the DSP reads the data processed by the FPGA and completes the task of the lossless compression of the data; and the ARM reads the coded data from the DSP and achieves the real-time communication with the upper computer via the Ethernet. The invention not only solves the problem of signal distortion, but also meets the requirement for the real-time performance of information transfer; and meanwhile, the system serves the functions of the gateway and embedded Web, thereby guaranteeing the safe access of the system to the Ethernet.
Owner:凯迈(洛阳)电子有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products