Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

46results about How to "Security upgrade" patented technology

Intelligent infant anti-theft system based on IOT (Internet of Things)

The invention discloses an intelligent infant anti-theft system based on the IOT (Internet of Things), and the system comprises a mobile terminal, a communication gateway device, a signal receiver, a signal repeater, a long distance reader, a wrist ring, a wristband, a temperature sensing probe, an infrared detector, a heart rate sensor, a wrist ring body, a battery unit, a wrist buckle, a display, an electronic tag, an access controller, an audio device, a touch screen, an exit monitor, a management server, an alarm device and a camera. According to the invention, a signal receiving device and the exit monitor are installed in a monitoring area of a hospital, and an electronic tag which can emit a radio frequency signal and causes no harm to the human body is installed on a baby, thereby achieving the safety monitoring function. The signal receiving device can receive the signals emitted by the electronic tag on the baby at any time so that the state of the baby can be judged according to the signals, thereby achieving the timely alarm against the behavior of trying to steal the baby, and tracking the signals. Moreover, the system senses whether the wrist ring is taken down through an infrared induction probe. Once the wrist ring is detected to be separated from a wrist, the system can directly give an alarm for prompt.
Owner:刘哲

Method, system and equipment for enhancing MQTT protocol identity authentication by using symmetric cryptographic technology

The invention provides a method for enhancing MQTT protocol identity authentication by using a symmetric cryptographic technology, which comprises the following steps of: performing first identity authentication from an Internet of Things terminal to an Internet of Things platform: charging a quantum key into a quantum safety chip by a quantum key charging machine, and recording and storing a corresponding relationship between the charging safety chip and the key, the Internet of Things terminal calls a quantum key in a chip to construct an identity authentication request message to the Internet of Things platform, the Internet of Things platform obtains symmetry, carries out decryption and identity comparison, generates a login token after successful authentication, and returns a verification message to the terminal; second identity authentication: the Internet of Things platform applies for a key according to the terminal ID and constructs an identity authentication request message to the terminal; and the terminal decrypts and verifies the platform ID and the login token. The invention further provides a system and equipment corresponding to the method. The invention has the advantages that identity authentication is performed by using a key set symmetric algorithm in the quantum safety chip, one key is pad at a time, a third party does not need to issue and authenticate a digital certificate. Therefore, the safety is improved.
Owner:中电信量子科技有限公司

Method and system for enhancing MQTT protocol transmission security by using symmetric cryptographic technology

The invention provides a method for enhancing MQTT protocol transmission security by using a symmetric cryptographic technology, and the method comprises the steps: carrying out the encryption and decryption of data: carrying out the encryption and decryption from an Internet of Things terminal to an Internet of Things platform, and carrying out the encryption and decryption from the Internet of Things platform to the Internet of Things terminal; in encryption and decryption, employing a quantum key filling machine for filling a symmetric key of a quantum security chip arranged in or outside the Internet of Things terminal and a key stored in a quantum exchange cipher machine, and enabling the quantum exchange cipher machine to record and store a corresponding relation between the filled quantum security chip and the key. The method has the advantages that the quantum key is used for protecting uplink and downlink information of the MQTT, and the problems that the key is reused in the transmission process of uplink and downlink information of the Internet of Things terminal, and the security is reduced along with use are solved by using a quantum security chip and a symmetric cryptographic technology.
Owner:中电信量子科技有限公司

Embedded multi-system upgrading method based on Hypervisor and computer readable storage medium

The invention relates to the technical field of computers. The invention specifically discloses an embedded multi-system upgrading method based on the Hypervisor. When the Hypervisor carries out upgrading operation on a target partition of an upgrading object, if the target partition has a standby partition, the mirror image file is written into the standby partition, and slot information of the standby partition is updated to be in a bootable state after verification succeeds; when the Hypervisor updates the mirror image file, the mirror image file is sent to the Hypervisor; the target partition is guided and started by the upgrading object; wherein if the standby partition exists in the target partition and the booting is successful, slot information of the target partition is in a successfully bootable state, and the booting fails, the booting continues to be tried, and when the number of tried booting times is zero, the effective booting partition before upgrading is rolled back tobe booted. Therefore, all the mirror images can be upgraded through the Hypervisor, and the target partition can be started by rolling back the effective starting partition before upgrading even if upgrading fails by configuring the backup partition, so that upgrading is safer.
Owner:中瓴智行(成都)科技有限公司

Front bumper of automobile

The invention discloses a front bumper of an automobile. The front bumper comprises a front bumper body. A front bumper lower decoration plate is arranged on the edge of the lower side of the front bumper body. A front bumper middle grating is arranged above the front bumper lower decoration plate. A front bumper left grating and a front bumper right grating are symmetrically arranged on the left side and the right side of the front bumper middle grating correspondingly. A front bumper lower left wrapping corner and a front bumper lower right wrapping corner are symmetrically arranged on the edges of the lower portions of the left side and the right side of the front bumper body correspondingly. A front bumper left framework and a front bumper right framework are symmetrically arranged on the upper portions of the left side and the right side of the front bumper body correspondingly. A radar left support and a radar right support are symmetrically arranged on the front bumper left framework and the front bumper right framework correspondingly. A left daytime running light and a right daytime running light are arranged on the left side and the right side of the front bumper body. A left daytime running light decoration frame and a right daytime running light decoration frame are arranged on frames of the left daytime running light and the right daytime running light correspondingly. The front bumper of the automobile has high practical performance and safety performance.
Owner:JIANGSU GAOBIAO TECH DEV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products