Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

911results about How to "Security" patented technology

Consortium chain permission control method based on digital certificates and CA authentication system

The invention discloses a consortium chain permission control method based on digital certificates and a CA authentication system. In a consortium chain, the enrollment control and automatic authorization of the consortium chain are realized through a layered digital certificate issuance system. The method of the invention pre-defines three kinds of permission mechanisms for respectively controlling enrollment permissions between consortium chain nodes, role permissions of the consortium chain nodes and access permissions of blockchain users. Three kinds of digital certificates including the enrollment certificate, role certificate and transaction certificate are used for respectively controlling the three permissions of node enrollment, role identification and client enrollment. An internationally accepted elliptic curve digital signature algorithm or a national crypto digital signature algorithm is used for achieving the generation of the digital certificates and secure message signature and validation, the defects of being large in permission granularity of a traditional blockchain or even having no enrollment functions and the like are overcome, the blockchain users are provided with anonymous transaction features, the security of blockchain transactions is improved, and the privacy needs of the users are met.
Owner:HANGZHOU QULIAN TECH CO LTD

Safety isolation method for cloud side multi-tenant data storage

The invention provides a safety isolation method for cloud side multi-tenant data storage. According to the safety isolation method for cloud side multi-tenant data storage, isolated distributed storage is applied to multi-tenant data storage, when a tenant applies for a data storage space, storage software API provided by an operator is called, a specific virtual storage area is provided for the tenant through division according to the ID of the tenant, the storage area of each tenant is relatively independent and isolated, and when a tenant uses private data, the distributive storage software collects tenant data from a private space in a disk array on the physical layer according to the ID of the user and provides a data service for the tenant in a concentrated mode; for each tenant, the data isolated distributed storage process is automatically completed by a system, transparent encryption and decryption is conducted on the volume levels, of cloud side multi-tenant data, in the storage disk array on the physical layer, safety isolation of the multi-tenant data in the cloud computing environment is achieved, and the problem that a cloud service provider administrator views, tampers and deletes sensitive data of the tenants without authorization is solved.
Owner:LANGCHAO ELECTRONIC INFORMATION IND CO LTD

Automobile data recorder with automatic SOS functions, method, and system

The invention provides an automobile data recorder. The automobile data recorder comprises a positioning module used for determining vehicle position; a communication module used for remote data transmission with a preset specified communication device; an automatic detection accident module used for recording driving parameters in accidents, and detecting vehicle damage situations; a voice interaction module used for realizing voice conversation with people in vehicles so as to determine personal casualty situations; a memory module used for storing information of the voice interaction module, a sensor module, and the positioning module; an alarm module used for sending alarm commands; a central processing unit which is connected with the voice interaction module, the communication module, the positioning module, the automatic detection accident module respectively, and is used for receiving data of the voice interaction module, the positioning module, and the automatic detection accident module, and sending the corresponding data to the memory module. The invention also discloses a vehicle accident automatic alarm SOS method based on the automobile data recorder, more time is saved for traffic accident rescue, and the safety of drivers and vehicles can be guaranteed more effectively.
Owner:SHENZHEN VCYBER TECH

Video output control method, video output control device and control circuit

The invention provides a video output control method and a video output control device. The video output control method comprises the following steps that: a safety controller detects whether the output resolution configured in a video display controller and the HDCP encryption state configured in a HDMI interface satisfy the HDCP protection requirement of a video or not in real time; and, if the output resolution configured in the video display controller and the HDCP encryption state configured in the HDMI interface do not satisfy the HDCP protection requirement of the video, the safety controller sends an instruction to the video display controller, such that the video display controller is indicated to close output of the video. From the foregoing, when the output resolution configured in the video display controller and the HDCP encryption state configured in the HDMI interface do not satisfy the HDCP protection requirement of the video, it shows that the output resolution of the video display controller or the HDCP encryption state of the HDMI interface is tampered due to the fact that a video driving module in a rich execution environment REE is attacked; the video output at this time is unsafe; the safety controller sends the instruction to the video display controller, such that the video display controller is indicated to close output of the video; and thus, the video output safety is ensured.
Owner:HUAWEI TECH CO LTD

Method and system for controlling time type vehicle unlocking/locking

The invention discloses a method for controlling time type vehicle unlocking/locking. The method comprises the following steps of enabling a server to generate an unlocking dynamic password according to the vehicle information and unlocking time of the existing vehicle, and displaying; enabling the vehicle to perform unlocking verification on the obtained unlocking dynamic password; after the unlocking verification is successful, successfully unlocking the vehicle, and changing the vehicle state information of the vehicle into the successful unlocking state; after the vehicle is used, enabling the vehicle to generate a locking dynamic password according to the vehicle information and the locking time, and displaying; enabling the server to perform locking verification on the obtained locking dynamic password; after the locking verification is successful, successfully locking the vehicle, and changing the vehicle state information on the vehicle into the successful locking state. The method has the advantage that a dynamic password is generated through a transaction platform and a vehicle intelligent lock, and then a public vehicle is locked/unlocked, namely the use/return state, so as to solve the problem of password stealing, and also solve the problems of stealing and waste by illegal persons.
Owner:SHANGHAI PEOPLENET SECURITY TECH

Method for monitoring of drug temperature and humidity and trace management of quality

The invention relates to a method for monitoring drug temperature and humidity and trace management of quality. The method comprises the following steps that (1) basic information of drugs is collected by a mobile data terminal and is written in an RFID (radio frequency identification device) temperature and humidity recorder, secondly, the RFID temperature and humidity recorder is started to record temperature and humidity, then positioning information collected by the mobile terminal is written in the RFID temperature and humidity recorder together, and the information is sent to a cloud platform together; (2) temperature and humidity data are continuously collected by the RFID temperature and humidity recorder and are locally stored; (3) the temperature and humidity data collected by the RFID temperature and humidity recorder are read by the mobile data terminal, and additionally, a unique bar code, a drug electronic supervision code and the positioning information of a reached unit together with the temperature and humidity data are written in the RFID temperature and humidity recorder and are sent to the cloud platform; (4) the temperature and humidity data of the drugs are fully monitored and traced by the cloud platform. Compared with the prior art, the method has the advantages of wide monitoring range, good safety, economy, rich information, convenience in law enforcement query and the like.
Owner:NEWLAND DIGITAL TECH CO LTD

Pre-warning system used for curve vehicle crossing pre-warning

The invention discloses a pre-warning system used for curve vehicle crossing pre-warning. The pre-warning system is characterized by comprising a control module, and a detection module, a data analysis module and a pre-warning module which are sequentially connected with the control module. In the practical application, a crossroad is detected in real time by utilizing a ground sensor and a pedestrian detection sensor so that data of speed and the vehicle type of a vehicle entering the curve can be automatically detected, and the detected data are processed and then displayed on an alerter arranged at the crossroad to prompt passing vehicles of another crossroad. Visual observation of a driver is substituted by automatic detection, and safety of curve vehicle crossing is enhanced so that an objective of guaranteeing safety of pedestrians and vehicles can be achieved. Vehicle speed detection, vehicle length detection and pedestrian detection are combined by the system and can be displayed on pre-warning screens of other crossroads in real time, and a mode of purely relying on visual observation of the driver for the traffic condition of another crossroad is substituted by a sound-light alarm device so that safety of the pedestrians and the vehicles of the curve is guaranteed to the largest extent.
Owner:GUILIN UNIV OF ELECTRONIC TECH

Internet-of-Vehicles trust management method based on block chain

The invention discloses an Internet-of-Vehicles trust management method based on a block chain, and the method comprises the steps: firstly calculating the credibility of received vehicle informationrelated to an event, judging the occurrence probability of each event through the credibility of the vehicle information, generating a rating for transmitted information, and uploading the rating of the vehicle information to nearby RSUs; enabling the RSU to call a reputation value updating method in an intelligent contract deployed on a block chain to calculate a vehicle reputation value, whereinthe calculated vehicle reputation value and the collected rating information are all packaged into a block; through a consensus mechanism combining PoW and PoS, ensuring RSUs with larger change of vehicle reputation values to serve as miner nodes to publish blocks; and enabling other RSUs to re-use the reputation value updating method of the smart contract to re-calculate the rating in the release block, and if the calculation results of most nodes are consistent with the data in the release block, releasing the release block to the block chain to realize Internet-of-Vehicles trust management. According to the invention, the data security is ensured, and the accuracy of event judgment in the Internet of Vehicles is improved.
Owner:NORTHWESTERN POLYTECHNICAL UNIV

High-speed vertical and continuous wire-rewinding machine

InactiveCN102513402AGood take-up effectSecurityElectric machineryFuselage
The invention discloses a high-speed vertical and continuous wire-rewinding machine, which mainly comprises a machine body, a main shaft mechanism, a rotary wire rewinding platform mechanism, spools, a supporting mechanism, a wiring mechanism and a clamping and cutting device. The main shaft mechanism fixed on the upper part of the machine body is a main transmission mechanism of the device, and the main shaft is driven by a variable frequency motor to rotate. The rotary wire rewinding platform mechanism is installed on the machine body by a rotary support and is driven by the variable frequency motor to rotate so as to change the positions of the spools. When at work, the supporting mechanism installed on the lower part of the machine body supports one spool to deviate from a rotary platform so as to be combined with the main shaft, and the spools and the supporting mechanism rotate with the main shaft. The wiring mechanism installed on the side face of the machine body is used for controlling the wiring uniformity. If the wires are fully distributed on the spools, the clamping and cutting device installed on the lower end of the main shaft clamps and cuts the wires to finish the wire rewinding work. The high-speed vertical and continuous wire-rewinding machine disclosed by the invention has the advantages that the vertical wire rewinding manner guarantees the high-speed and stable rotation of the spools so as to guarantee firm and regular wire rewinding, and that double spools are utilized to quickly change the spools so as to improve the production efficiency.
Owner:张谷旭

Information hiding and protecting method based on image

The invention provides an information hiding and protecting method based on an image and belongs to the technical field of computer applications. According to the information hiding and protecting method, original information to be transmitted is encrypted and hidden into an image, a user without a decryption password can only see the disguising image, and setting of an encryption password and a decryption password is completed by operations carried on the image; the operations carried on the image are composed of one behavior conducted on the area of the image by a user or multiple behaviors conducted on the area of the image by the user; during decryption, when the user inputs a correct decryption password, the coding data of the image are read, decrypted original information is extracted from the coding data, and the original information is displayed after the original information is decrypted through the decryption password. The information hiding and protecting method based on the image is high in safety and usability, capable of being applied to a mobile computing platform and a non-mobile computing platform and also capable of being applied to encrypted storage of local information and encrypted transmission or encrypted copying of information, and therefore the information safety of the user is effectively protected.
Owner:BEIJING DEEP AI INTELLIGENT TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products