Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

53results about How to "Security does not affect" patented technology

Lightweight anonymous authentication and key negotiation method in multi-server environment

The invention relates to a lightweight anonymous authentication and key negotiation method in a multi-server environment and belongs to the technical field of information safety. The method is characterized by achieving the anonymous authentication and key negotiation in the multi-server environment by means of the following three steps: (1) building a system and selecting system parameters; (2) registering in a registering center RC by a server and a user; (3) carrying out authentication and key negotiation by the user and a remote server so as to provide subsequent communication session keys. The lightweight anonymous authentication and key negotiation method is applicable to remote authentication of a mobile terminal and servers with low calculation capability, memory space and communication capability; the mobile terminal can log in any server registered by RC through a user name and a password; the server only can authenticate that the user is a valid user and cannot know the specific identity of the user, so that the privacy of the user is protected; the lightweight anonymous authentication and key negotiation method is excellent in expansibility; the two-party negotiation session keys are determined by random numbers Ni1 and Ni2 selected by authenticating for each time by two parties; the independence and the forward and backward security of the session keys are ensured.
Owner:深圳市迅威恒达信息技术有限公司

PUF-based three-factor anonymous user authentication protocol method in Internet of Things

The invention discloses a PUF (Physical Unclonable Function)-based three-factor anonymous user authentication protocol method in the Internet of Things, which solves the security problems such as physical clone attacks and the like, and is implemented by the following steps that: a gateway generates a long-term key for registration and key negotiation of nodes and users; the node sends a PUF-basedchallenge and response to the gateway, and the gateway generates an authentication certificate and sends a node key to the node to complete registration; the user sends the identity identifier to thegateway, the gateway generates a user dynamic identity identifier and a user key and sends the user dynamic identity identifier and the user key to the user, and the user encrypts and stores the userdynamic identity identifier and the user key in the smart card to complete registration; and the user, the gateway and the node perform mutual authentication and key agreement to form a PUF-based three-factor anonymous user authentication protocol method in the Internet of Things. Based on three-factor authentication, smart card loss, password guessing attack and the like can be resisted; the method achieves the anonymity of the user and the node, is small in calculation amount, is high in efficiency, is suitable for IOT nodes with limited resources, and is used for IOT safety communication.
Owner:XIDIAN UNIV

Quick-response matrix code receipt paying method and system

The invention discloses a quick-response matrix code receipt paying method and system. According to the quick-response matrix code receipt paying method, a consumption receipt is printed with quick-response matrix code consumption information including a primary account number, a transaction processing code, a transaction amount, transaction transmission time, the type of a merchant, an identification code of a processing machine terminal, a transaction money code and the like, the phenomenon that a consumer align a displayer of a cash register to conduct code scanning payment is not needed, and the consumer can directly align the printed consumption receipt printed with a quick-response matrix code to conduct code scanning payment. The quick-response matrix code receipt paying system comprises the cash register, a two-dimension code generating device and a thermal printer, wherein the cash register, the two-dimension code generating device and the thermal printer are connected in sequence. The quick-response matrix code receipt paying method and system can be effectively applied to all types of cash registers. By the adoption of the quick-response matrix code receipt paying method and system, payment operation is easy, convenient and fast, low cost is achieved, the efficiency of payment is greatly improved, the practical value is high, and the practical significance is important.
Owner:王冉 +1

Intelligent industrial wastewater treatment system

The invention relates to an intelligent industrial wastewater treatment system. The intelligent industrial wastewater treatment system comprises PH value monitors (1), chemical component analysis meters (2), wastewater control terminals (3), a serer (4) and an electronic control aeration tank (5). According to the system, firstly, through the PH value monitors and the chemical component analysis meters, the wastewater PH values and chemical components of various drainage outlets are monitored, then monitored data is fed back to the server, the wastewater monitored data of various plants is summarized by the server, secondly, based on a big data analysis and processing technology, after the monitored data is input to a trained model, a system executive strategy is automatically generated, through a numerical control technology, the wastewater control terminals are driven to conduct drainage according to the set strategy, the electronic control aeration tank is driven to run, the acid wastewater and the alkaline wastewater are neutralized by each other, and mutual neutralization of the acid wastewater and the alkaline wastewater is fully used for achieving the aim of using the wastewater to treat the wastewater; meanwhile, the intelligent industrial wastewater treatment system is based on a blockchain technology to achieve interaction of the monitored data, so that the safety ofthe data is improved.
Owner:刘守凯 +2

Terminal application legal-copy authentication method and system

The invention discloses a terminal application legal-copy authentication method. The terminal application legal-copy authentication method comprises the following steps: a terminal application sends an access request to a service server; the service server receives the access request, and authenticates the terminal application through an authentication server; if authentication is passed, the service server judges that the terminal application is the legal copy, and responds to the access request of the terminal application; and otherwise, the service server judges that the terminal application is pirated, and refuses the access request of the terminal application. On the other hand, the invention further discloses a terminal application legal-copy authentication system. The terminal application legal-copy authentication system comprises a terminal, the terminal application, the service server and the authentication server; the terminal application is positioned on the terminal; the service server is separately in communication connection with the terminal application and the authentication server, wherein the terminal application comprises a first information transceiving module; and the service server comprises a second information transceiving module and an information verification module connected with the second information transceiving module. By means of the terminal application legal-copy authentication method and system disclosed by the invention, the terminal application legal-copy authentication security is greatly improved; and the rights and interests of general legal-copy terminal applications can be effectively maintained.
Owner:SHANGHAI PEOPLENET SECURITY TECH

Login system of application platform and login method thereof

The invention provides a login system of an application platform and a login method thereof. The login system of the application platform comprises a login terminal, a mobile terminal, the application platform and an authentication platform. The login terminal is used for obtaining the requesting information of users for logging in the application platform and receiving the identification information automatically distributed by the application platform on the basis of the requesting information. The mobile terminal is in communication connection with the login terminal, obtains the identification information from the login terminal while obtaining the user information, and generates a first authentication code on the basis of the user information and the identification information. The application platform is in communication connection with the login terminal, the mobile terminal and the authentication platform respectively, receives the requesting information sent by the login terminal and automatically distributes the identification information which is fed back to the login terminal; and at the same time, the application platform receives the first authentication code and sends it to the authentication platform for authentication. The authentication platform is in communication connection with the application platform and is used for achieving authentication of the first authentication code. The login system greatly reduces the risk caused by the leakage of a user account to a user, and is safe and reliable.
Owner:SHANGHAI PEOPLENET SECURITY TECH

Space station safe region design method capable of satisfying passive safety requirement

The invention discloses a space station safe region design method capable of satisfying the passive safety requirement. The space station safe region design method comprises steps of the design of a keep out sphere, the design of a radial pulse transfer approach ellipsoid and the design of tangential pulse transfer approach ellipsoid. The design of the keep out sphere comprises steps of determining the design principle that the keep out sphere satisfies the passive safety requirement, establishing a relative dynamics and deviation forecast model of a visiting spacecraft and a space station, calculating the shortest ellipsoid distance between a spacecraft united enveloping sphere and a relative track error ellipsoid, assuming that the visiting spacecraft begins to fly around the V-bar boundary of the keep out sphere in dependence on the design principle that the keep out sphere satisfies the passive safety requirement, changing the radius of the keep out sphere, analyzing the relationship between the shortest ellipsoid distance when the visiting spacecraft flies around the keep out sphere and the change of the radius of the keep out sphere, and completing the design of the keep out sphere. The pace station safe region design method is advantaged in that the design method is correct and reasonable, safety of the space station is guaranteed, sufficient time is provided for the visiting spacecraft to remove the fault, and the design result is suitable for practical engineering tasks.
Owner:NAT UNIV OF DEFENSE TECH

Temporary blocking wall structure of comprehensive pipe rack and construction method

The invention discloses a temporary blocking wall structure of a comprehensive pipe rack and a construction method. The structure comprises H1 structural steel, H2 structural steel, H3 structural steel, H4 structural steel and a sealing plate; the H1 structural steel, the H2 structural steel and the H3 structural steel are welded and connected to form a plugging framework; the bottom of the plugging framework is provided with a waterproof mortar cushion layer; the joint of the plugging framework and the comprehensive pipe rack is provided with a polysulfide sealing paste layer; the plugging framework is connected with the upper face and the lower face of the comprehensive pipe rack in a sealed manner through the waterproof mortar cushion layer and the polysulfide sealing paste layer; the sealing plate is arranged on the plugging framework in a welded manner; the H4 structural steel is fixedly arranged on the inner side of the sealing plate; the two ends of the H4 structural steel are both fixed in a comprehensive pipe rack wall body through bolts; and a temporary blocking wall is fixed. The temporary blocking wall structure of the comprehensive pipe rack is simple, the construction process is mature, safe and reliable, the polysulfide sealing paste and the waterproof mortar cushion layer are adopted, the sealing performance is good, the safety performance is high, the waterproof performance is good, the safety of an original structure cannot be affected after disassembling, and thus the temporary blocking wall structure of the comprehensive pipe rack is suitable for application and popularization.
Owner:HANGZHOU MUNICIPAL CONSTR GRP CO LTD

Liquid-cooling power battery with battery box with immersed external bottom face

The invention discloses a liquid-cooling power battery with a battery box with immersed external bottom face. The liquid-cooling power battery comprises a liquid inlet joint, a liquid outlet joint, asealing supporting plate, bolt holes, a monomer battery cell, a baffle plate, divided-flow reinforcing ribs, reinforcing rib flow passages, a baffle plate flow passage, a liquid outlet, a liquid inlet, baffle plate sealing bolt holes and a battery box bottom face sealing table, wherein the liquid inlet joint and the liquid outlet joint are positioned above the sealing supporting plate; the liquidinlet joint is connected with a liquid heat management medium inlet pipeline; the liquid outlet joint is connected with a liquid heat management medium outlet pipeline; the sealing supporting plate iscombined with the bottom of the power battery box to form a sealed cavity; the bolt holes are formed in the periphery of the sealing supporting plate; the baffle plate is positioned at the bottom ofthe battery box to make liquid in the bottom face of the battery box divided into inflowing liquid and outflowing liquid; divided-flow reinforcing ribs are positioned at the bottom of the battery box,and is perpendicular to the baffle plate; reinforcing rib flow passages are arranged on the divided-flow reinforcing ribs; and the baffle plate flow passage is arranged on the baffle plate. Accordingto the invention, the flexible configuration of the power battery with or without heat management can be achieved.
Owner:开沃新能源汽车集团股份有限公司

Application platform login system and login method thereof

The invention provides a login system of an application platform and a login method thereof. The login system of the application platform comprises a login terminal, a mobile terminal, the application platform and an authentication platform. The login terminal is used for obtaining the requesting information of users for logging in the application platform and receiving the identification information automatically distributed by the application platform on the basis of the requesting information. The mobile terminal is in communication connection with the login terminal, obtains the identification information from the login terminal while obtaining the user information, and generates a first authentication code on the basis of the user information and the identification information. The application platform is in communication connection with the login terminal, the mobile terminal and the authentication platform respectively, receives the requesting information sent by the login terminal and automatically distributes the identification information which is fed back to the login terminal; and at the same time, the application platform receives the first authentication code and sends it to the authentication platform for authentication. The authentication platform is in communication connection with the application platform and is used for achieving authentication of the first authentication code. The login system greatly reduces the risk caused by the leakage of a user account to a user, and is safe and reliable.
Owner:SHANGHAI PEOPLENET SECURITY TECH

Emergency rescue equipment for new energy automobile falling into water

The invention discloses emergency rescue equipment for a new energy automobile falling into water, which structurally comprises a vehicle body, wherein an inner cavity is formed in the vehicle body; aplurality of accommodating cavities are formed in the front and rear end walls of the inner cavity; open cavities in bilateral symmetry are formed in the left end wall and the right end wall of the inner cavity; protruding blocks in bilateral symmetry are fixedly arranged on the front end wall and the rear end wall of the inner cavity. A matching cavity with an opening is formed between the convex blocks; bottom bulges in bilateral symmetry are fixedly arranged on the left and right end walls of the matching cavity; and an electric crushing device handheld escape device used for crushing theaccommodating cavities and the open cavities is arranged in the matching cavity. According to the equipment, the electric crushing device handheld escape device and a skylight crushing device top escape device are adopted, an automobile skylight is broken in an explosive detonating mode, skylight glass is pushed out of the equipment through a spring and connecting rod type structure, and a handheld glass breaking device convenient for people to use is utilized, so that people can efficiently break and damage glass in other areas in an automobile.
Owner:泰山启帆山东创业投资管理有限公司

Verification code sending method and device, electronic equipment and computer readable medium

The embodiment of the invention discloses a verification code sending method and device, electronic equipment and a computer readable medium. A specific embodiment of the method comprises the steps of obtaining user order information corresponding to a warehousing information code; changing the state of the state code into a state representing that the article is put in storage, and generating an article taking code; generating a verification code according to the pickup code and a state code included in the user order information; performing first encryption processing on a user mobile phone number and a pickup address included in the user order information by using the login password to obtain a target information code; performing second encryption processing on the target information code and the verification code by adopting a verification code generator to obtain a verification code; and sending the verification code to a terminal device corresponding to the user mobile phone number included in the user order information. According to the embodiment, the verification codes are generated by using different secret keys at different verification points, so that after the secret key of one verification point is cracked, the security of the verification codes generated by other verification points is not influenced, and the overall security of the verification codes is improved.
Owner:杭州拼便宜网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products