Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

39results about How to "The transmission process is safe and reliable" patented technology

Authentication method and system of verification code security reinforcement

The invention discloses an authentication method of verification code security reinforcement. The method comprises the following steps: after a server receives a verification code acquisition request sent by a user, the server releases a short message verification code to the user; a client encrypts the short message verification code obtained by the user by using a pre-stored algorithm to generate short message ciphertext; the client obtains verification times and adds the present verification to obtain a verification counting value; the client sends a verification file composed of user information, the verification counting value and the short message ciphertext to the server; and the server receives and verifies the verification file. In addition, the invention further provides an authentication system of verification code security reinforcement. The system comprises a server and a client connected with the server, the client comprises a first information transceiver module, an encryption plug-in, a statistical module and a control module, and the control module is separately connected with the first information transceiver module, the encryption plug-in and the statistical module. By adoption of the authentication method and system disclosed by the invention, the authentication security of the verification code is greatly improved without affecting the user experience, and the user experience is improved.
Owner:SHANGHAI PEOPLENET SECURITY TECH

Intelligent robot inspection system for transformer substation and access operation method thereof

The invention relates to an intelligent robot inspection system for a transformer substation, and an access operation method thereof. The system comprises a terminal security reinforcement unit, a security authentication transmission proxy server and a security authentication encryption platform, wherein the terminal security reinforcement unit is installed on an inspection robot industrial personal computer; the security authentication transmission proxy server is deployed between an AP in an intelligent substation and a main control room router, and the security authentication encryption platform is deployed in an information intranet. By installing the terminal security reinforcing unit in the industrial personal computer of the inspection robot, security certification access of the inspection robot and security protection of data are realized. The security capability provided by the terminal security reinforcement unit comprises digital certificate application, data encryption anddecryption, secret key storage protection and terminal state monitoring, encryption and decryption of data streams can be flexibly configured according to needs, and the security of the substation intelligent robot inspection system is improved.
Owner:ELECTRIC POWER RESEARCH INSTITUTE OF STATE GRID SHANDONG ELECTRIC POWER COMPANY +1

Intelligent safe power utilization monitoring system integrated with Internet-of-things technology

The invention discloses an intelligent safe power utilization monitoring system integrated with an Internet-of-things technology. The intelligent safe power utilization monitoring system comprises anintelligent host module, a multi-service gateway module and an Internet-of-things platform, the intelligent host module is connected with a device to be monitored, collects electrical safety data of the device to be monitored in real time, and generates an alarm for abnormal information. The multi-service gateway module is connected with the intelligent host module, encrypts the electrical appliance safety data, converts the encrypted electrical safety data through a protocol and transmits the encrypted electrical safety data to the Internet-of-things platform; and the Internet-of-things platform acquires information in the multi-service gateway module, and performs integrated control and data support for applications of upper-layer services. According to the system, a power service private network frequency wireless communication network is adopted to provide full network coverage for power generation enterprises, and the transmission process is more stable, efficient and safer; in addition, the Internet-of-things platform realizes descriptive-diagnostic-predictive-guidance type full-cycle power utilization safety supervision by uninterruptedly storing, analyzing, mining and utilizing the data, so that the safety of a power utilization system is greatly improved.
Owner:BEIJING HUADIAN TIANREN ELECTRIC POWER CONTROL TECH

Anti-quantum computing Internet of Vehicles system based on secret sharing and mobile terminal and authentication method thereof

The invention discloses an anti-quantum computing Internet of Vehicles system based on secret sharing and a mobile terminal and an authentication method thereof. The system comprises a plurality of mobile terminals, a third-party trust mechanism, vehicle keys, vehicle-mounted units and roadside units. The vehicle keys and the vehicle-mounted units are arranged on a plurality of vehicles. The roadside units are used for transmitting messages of the vehicle-mounted units and the third-party trust mechanism. The mobile terminals and the vehicle-mounted units are paired in a one-to-one mode, and the vehicle-mounted units authenticate the mobile terminals. By arranging the mobile terminal, the safety of the vehicle-mounted unit to the driver authentication process is enhanced in the authentication of the vehicle-mounted unit to the mobile terminal. A signature based on ID cryptography is adopted for a transmitted message, an ID is changed into a form of a public key random number, secret sharing is adopted, and a secret is added into the signature message, so that an actual signature message cannot be obtained by an enemy, and a digital signature has very high quantum-resistant computing security. The offset is used, so that the transmission process is safer, and meanwhile, the equipment burden is reduced.
Owner:南京如般量子科技有限公司 +1

Power distribution automation information encryption method based on quantum reinforcement

The invention discloses a distribution automation information encryption method based on quantum reinforcement, and the method comprises the steps: presetting a key pool A in a master station and all terminals, independently setting a key pool B in the master station, pre-storing a key in the key pool A, pre-storing or storing a newly added key in the key pool B, and storing the newly added key in the key pool B, wherein the keys are quantum keys converted after quantum random numbers are generated by a quantum random number generator; distributing key packets: the terminals communicate with the master station, the terminals and the master station jointly select a key a from the key pool A, the master station extracts part of keys from the key pool B to form a key packet, and the key packet is encrypted by using the key a and sent to all the terminals; the terminal decrypting the received key packet by using the key a, extracting the key in the key packet for performing secondary encryption and decryption on the state grid encrypted message, and marking the key in the key packet after being used; and after all the keys of the key packet in the terminal are marked, a key a being selected from the key pool A again, and key packet distribution being performed again.
Owner:STATE GRID ZHEJIANG ELECTRIC POWER CO LTD HANGZHOU POWER SUPPLY CO

Ultraviolet disinfecting system for operating room

The invention belongs to the field of medical disinfection, and discloses an ultraviolet disinfecting system for an operating room. The ultraviolet disinfecting system comprises an information acquisition unit, an information processing unit, an implementing unit, a timed starting unit and a power supply unit, wherein the information acquisition unit comprises a nano biosensor and a human body proximity sensor; the information acquisition unit is connected to the information processing unit; the information processing unit comprises a single chip controller which is connected to the information acquisition unit, a display screen which is connected to the single chip controller and a Flash memory; the implementing unit comprises an ultraviolet lamp, a camera, a voice broadcast device and an electromagnetic lock; the implementing unit and the single chip controller are connected; the timed starting unit comprises a 555 timer which is connected to the power supply unit and a touch switch which is connected to the 555 timer; and the power supply unit is electrically connected to the information acquisition unit, the information processing unit and the implementing unit by virtue of the timed starting unit. With the application of the ultraviolet disinfecting system provided by the invention, the environment of the operating room can be monitored in real time and comprehensive and effective disinfection can be automatically conducted, so that the labor intensity of cleaning personnel is reduced.
Owner:GUANGXI UNIV

Security and protection monitoring system based on Internet of Things

The invention provides a security and protection monitoring system based on the Internet of Things. The security and protection monitoring system comprises a field parameter detection network, a system health self-checking unit, an intelligent video monitoring unit, an information transmission unit, a field maintenance terminal and a visual centralized monitoring platform. The field parameter detection network is used for forming a front-end environment information and article and personnel position information detection network; the system health self-checking unit is used for carrying out periodic self-checking on the system and forming a self-checking report; the intelligent video monitoring unit is used for monitoring personnel access at an entrance, pedestrian flow in a specific areaand abnormal behaviors of personnel; the information transmission unit is used for transmitting detection data and control instructions; the field maintenance terminal comprises an information collection sub-control module, a priority discrimination module and a dual-mode supply module; and the visual centralized monitoring platform is used for receiving the detection data and carrying out visualmanagement. According to the invention, layout can be simpler and more convenient, data can be automatically updated, a transmission process is safer, and management efficiency is higher.
Owner:浙江安防职业技术学院

Method and device for protecting personal identification code

The invention relates to the field of information safety, in particular to a method and device for protecting a personal identification code. The method comprises the steps that the device receives the plaintext personal identification code and determines an encryption mode, when the encryption mode is a first encryption mode, a sixth preset value is used for organizing filling domain data, according to control domain data, the plaintext personal identification code and the filling domain data, a plaintext data package is organized, account domain data in an encryption parameter is used for conducting first preset processing on the plaintext data package, and a prestored encryption key is used for encrypting a processing result to obtain a plaintext data package; the plaintext data packageis sent to a server; when the encryption mode is a second encryption mode, a random number is generated and used as filling domain data, according to the control domain data, the plaintext personal identification code and the filling domain data, a plaintext data package is organized, and a prestored encryption key is used for encrypting the plaintext data package to obtain a ciphertext data package; the ciphertext data package is sent to the server, and accordingly the personal identification code is safer during transmission.
Owner:FEITIAN TECHNOLOGIES

Sterile liquid cross-level transmission device and pharmaceutical workshop

The invention provides a sterile liquid cross-level transmission device and a pharmaceutical workshop. The sterile liquid cross-level transmission device comprises a casing pipe, fastening chucks, valve bodies and a disposable liquid transferring bag. The casing pipe is used for being installed between walls of different clean areas. The fastening chucks are arranged at the two ends of the casingpipe. The valve bodies can be arranged on the fastening chucks. The end portions of the casing pipe can be sealed through the valve bodies. The disposable liquid transferring bag comprises a bag bodyand a liquid transmission pipe, one end of the liquid transmission pipe penetrates out of a bag opening of the bag body, the other end of the liquid transmission pipe penetrates out of the surface ofthe bag body, and the bag body can be arranged on the fastening chucks. The pharmaceutical workshop at least comprises a B-level clean area, a C-level clean area and an air return passageway, whereinthe sterile liquid cross-level transmission device is arranged between the B-level clean area and the C-level clean area. The sterile liquid cross-level transmission device has the beneficial effectsthat usage is simple, cost is low, and the sterile liquid transmission process is safe and reliable.
Owner:珠海西格膜生物技术有限公司

Distributed micro-power system

The invention discloses a distributed micro-power system. The distributed micro-power system comprises a receiving module, a digital module, a monitoring module, a closing module, a power electronic inversion module, an energy storage module, a microcontroller, a rectification module, a display module, a recording module and a comprehensive module; the receiving module is connected with the digital module; the digital module is connected with the monitoring module; the digital module is connected with the closing module; the monitoring module is connected with the display module; the closing module is connected with the power electronic inversion module; the power electronic inversion module is connected with the energy storage module; the energy storage module is connected with the microcontroller; the microcontroller is connected with the rectification module; the microcontroller is connected with the display module; the display module is connected with the recording module; and therecording module is connected with the comprehensive module. The distributed micro-power system is convenient to use, and the received signals are monitored in real time, so that professional workerscan carry out analysis and research conveniently.
Owner:浙江博通信息技术有限公司

Safety control method, device and computer equipment

ActiveCN109257374BRealize legitimacy verificationEnsure safetyBus networksCommunications securityEngineering
The present invention proposes a security control method, device and computer equipment, wherein the method includes: acquiring a key generated according to the ECU identity information of the vehicle control unit ECU to be authenticated and the gateway identity information of the vehicle gateway, and generating the corresponding ECU identity information The verification information is encrypted with the key to generate the first verification information, and the second verification information generated based on the first verification information sent by the ECU is received, and the second verification information is decrypted with the key to obtain the carried verification information. The verification information and ECU identity information, by judging whether the verification information obtained by decryption has a corresponding relationship with the ECU identity information, the security verification of the ECU is performed. In each verification, the gateway uses different verification information for each ECU to perform security verification. At the same time, when the verification information is transmitted, it is encrypted with different keys, which makes the transmission process more secure, realizes the security verification of the ECU, and ensures the communication security.
Owner:APOLLO INTELLIGENT CONNECTIVITY (BEIJING) TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products