Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

64results about How to "To achieve the purpose of safety" patented technology

Key agreement method in WAPI authentication mechanism

The invention discloses a secret key consulting method in the attestation mechanism of WAPI, solving the problems of ID attestation and secret key consultation of mobile equipment accessing to wireless local-area network. The method arranges three messages: request, response and answer of secret key and their interchanging course: a client-end STA generates a random number r0, encrypts the r0 by the public key of an access point AP and then sends the encrypted r0 and a conversation indication sign s to the AP; the AP decrypts to obtain the r0, selects the other random number r1, and calculates conversation secret key and message attestation code and sends the message attestation code, the indication sign s and the r1 encrypted by public key of the STA; the STA decrypts to obtain the r1 and attests the message attestation code transmitted from the AP to determine to access to the network and output conversation secret key; finally, the STA calculates the other message attestation code and sends it and s together to the AP; the AP attests the message attestation code transmitted by the STA and then outputs conversation secret key and allows the STA to access to the network. The method achieves universal combinable safety strength and implements ID attestation and secret key consultation, able to be used in improving the attestation mechanism in the WAPI.
Owner:XIDIAN UNIV

Blowing-type burner control method

ActiveCN103900103AImprove securityEffectively clean up residueCombustion regulationElectricityStopped work
The invention relates to a blowing-type burner control method which comprises the following steps that an electric controller receives an ignition instruction and conducts slash fire detection, overheat detection and draught fan rotating speed detection sequentially; the electric controller controls an air blower to blow and sweep a combustion box at the rotating speed a; the electric controller controls the rotating speed of the air blower to be a set ignition rotating speed b, an igniter is started, a power shut-off valve on a gas proportion valve assembly is controlled to be opened, and an electric adjustment opening in the gas proportion valve assembly is opened to an ignition opening degree according to a set ignition current; after the successful ignition, the electric controller synchronously controls the opening degree of the electric adjustment opening and the rotating speed of the air blower according to the burning power input by a manipulator; when the electric controller receives a stop work instruction from the manipulator, the gas proportion valve assembly is closed and the air blower continues to run for set period of time. Compared with the prior art, the blowing-type burner control method has the advantages of being high in heat exchange efficiency, high in safety and the like.
Owner:SHANGHAI HESEN ELECTRO MACHINERY

External floating roof petroleum storage tank water mist safe protection system and protection method

ActiveCN102417081AImprove active safety protection performanceControl concentrationLarge containersControl systemEnvironmental engineering
The invention discloses an external floating roof petroleum storage tank water mist safe protection system and a protection method; the external floating roof petroleum storage tank water mist safe protection system comprises a control system, a gas detection analyzer and an inert medium generating system; the control system is connected with the gas detection analyzer; the gas detection analyzer is communicated with a primary sealing space and a secondary sealing space of a petroleum storage tank through a gas pipe for detection and analysis; the inert medium generating system is connected with water mist generators which are arranged in the primary and the secondary sealing spaces of the petroleum storage tank; and the inert medium generating system comprises a water tank which is communicated with the liquid input ends of the water mist generators through high-pressure water pumps and an inert gas storage device which is communicated with the gas input ends of the water mist generators through selection valves. According to the invention, because water mist with inert media is filled into the primary and the secondary sealing spaces of the petroleum storage tank, the petroleum-gas mixture content in the sealing spaces is controlled within a set range, so that the problem that the primary and the secondary sealing spaces of the external floating roof petroleum storage tank are easy to explode.
Owner:VITALONG FIRE SAFETY GRP

REST security system based on signature mechanism

The invention provides a REST security system based on a signature mechanism. According to the REST security system, the signature mechanism is used as the core of the system, sessionkey and an md5 encrypted message of a parameter are encapsulated in a http request, hostile attacks such as interception, data tampering and the like carried out by a hacker in transmission are confronted through the transmission of the encrypted data, meanwhile, the encrypted data can also be used for protecting private information of a user, and a safe purpose is achieved. Compared with the prior art, the REST security system based on the signature mechanism has the advantages that a REST usage model which is based on signature is adopted, through certification and authority, an illegal user is limited to access application before an application program interface (API) method is called, then a private key of an application that the API belongs to is obtained after the user passes the certification and the authority to access the API, parameters of a RESTAPL request is obtained in the request, the parameters are organized according to an agreed form of application, namely the parameters and the private key, and then md5 encryption is conducted, the data after being encrypted is placed in the request, and therefore a safe aim is achieved.
Owner:LANGCHAO ELECTRONIC INFORMATION IND CO LTD

Safety socket

The invention provides a safety socket comprising a seat body and a circuit module, wherein one or more jacks connected to the inner side are arranged on the surface of the seat body, a relay module connected with a power supply is arranged on a circuit board of the circuit module at the inner side of the seat body and is electrically connected with a single-pole double-throw type active safety protection circuit, the base side edge of the active safety protection circuit connected with the relay module is electrically connected with a switch clamp, the other side of the switch clamp is provided with a first sheet body in contact with the switch clamp after the switch clamp rotates under heating, the first sheet body is electrically connected with an integrated circuit capable of transmitting a signal to the relay module to close the relay module, and the other end of a base inside the active safety protection circuit is electrically connected with one or more sockets. Because high temperature generated due to an abnormal power supply state is utilized to enable the active safety protection circuit to be switched, a power supply only supplies power to the socket(s) or one of a power supply module and the integrated circuit, and thus, the purposes of improving use safety and saving energy by stopping supplying power to the socket(s) are achieved.
Owner:SEEKER

Logic binding method for preventing PC (personal computer)hard disk information from theft

The invention relates to a safety protection method of computer information, in particular to a logic binding method for preventing PC hard disk information from theft, which is characterized in that the hard disks of the computers and computers where the hard disks are located are logically bound by a software mode to enable the hard disks to correspond to the computers where the hard disks are located one to one, and the hard disks which do not correspond to the environments of the computers do not work. The logic binding method can carry out protection by CPUID (Central Processing Unit Identification), and each hard disk corresponds to CPUID information, which ensures that the computers can be started after the hard disks correspond the CPUID. In the invention, a network card MAC (Media Access Control) address judgment procedure is installed, and under the condition that the repeat happens on CPUID, the started computers carry out network card MAC address judgment; the MAC address of each network card is unique, and thereby, the hard disk information of the computers is further protected. The invention logically binds the hard disks and the assorted computers from multiple angles, and thereby ensuring that the hard disk information can not be illegally stolen by computer hard disk crackers, effectively preventing the hard disk information from being revealed, and achieving the goal for information safety.
Owner:DALIAN NATIONALITIES UNIVERSITY

Key agreement method in WAPI authentication mechanism

The invention discloses a secret key consulting method in the attestation mechanism of WAPI, solving the problems of ID attestation and secret key consultation of mobile equipment accessing to wireless local-area network. The method arranges three messages: request, response and answer of secret key and their interchanging course: a client-end STA generates a random number r0, encrypts the r0 by the public key of an access point AP and then sends the encrypted r0 and a conversation indication sign s to the AP; the AP decrypts to obtain the r0, selects the other random number r1, and calculates conversation secret key and message attestation code and sends the message attestation code, the indication sign s and the r1 encrypted by public key of the STA; the STA decrypts to obtain the r1 and attests the message attestation code transmitted from the AP to determine to access to the network and output conversation secret key; finally, the STA calculates the other message attestation code and sends it and s together to the AP; the AP attests the message attestation code transmitted by the STA and then outputs conversation secret key and allows the STA to access to the network. The method achieves universal combinable safety strength and implements ID attestation and secret key consultation, able to be used in improving the attestation mechanism in the WAPI.
Owner:XIDIAN UNIV

Bluetooth-controlled and Freely-opened/closed door and locking magnetic feedback door system

The invention provides a Bluetooth-controlled and Freely-opened / closed door and locking magnetic feedback door system. The device is composed of a Bluetooth module, a single microcomputer chip system, magnetic induction modules, a transmission rod motor module, electric mechanical lock modules, an alarming module, a power supply module and an intelligent terminal, and is characterized in that long-distance information interaction is carried out by the intelligent terminal and the Bluetooth module, so that a door is controlled by a single microcomputer chip to be opened and closed by a free angle and is adapted to different user requirements; meanwhile, a door lock is remotely controlled to be locked; on the previous basis of the system, a magnetic induction switch is automatically switched on by the system to detect whether the door is really locked or not after the door is locked; if the door is unlocked, an alarm makes sounds to remind a user of carrying out door locking operation for one time and the safety aim is realized; when the intelligent terminal is met outsides the door or the system has no power, the lock is opened by an original mechanical lock key; when the user stands indoors, the door can be opened by a manual module, so that the emergency effect is realized; the system is simple to operate, convenient and practical and safe.
Owner:桑露萍

Method and system for illegal invasion identification base on wireless network signal CO complexity

The present invention discloses a method for illegal invasion identification base on wireless network signal CO complexity, and relates to the information safety protection field. The method comprises the following steps: firstly, performing signal direct current subtracting processing of an original wireless network signal sequence, obtaining a direct current subtracting signal sequence, performing signal Fourier transform processing, and obtaining a Fourier transform sequence; secondary, according to a threshold energy value, performing sequence reconstruction of the Fourier transform sequence, and solving the estimation value of the CO complexity; and finally, employing a nearest neighbor method to perform identification of the illegal invasion. Besides, the present invention further discloses a system for illegal invasion identification base on the wireless network signal CO complexity. The method and system for illegal invasion identification base on the wireless network signal CO complexity do not depend on traditional wireless network safety protection means such as passwords, MAC address verification, digital watermarking and the like to thoroughly solve the safety threats such as password leakage, MAC address falsification or digital watermarking and the like; and moreover, the calculation efficiency is high, and processing delay is little.
Owner:NAT UNIV OF DEFENSE TECH

Chemical anchor bolt, connecting structure for fixing building attachment by using chemical anchor bolt and mounting method

The invention provides a chemical anchor bolt, a connecting structure for fixing a building attachment by using the chemical anchor bolt and a mounting method. A metal anchor rod of the chemical anchor bolt is provided with an anti-loosening anchor section and a fastening sleeve, wherein the fastening sleeve tightly presses a connected part under the action of a tool, and an inner hole is shrunk to tightly wrap the anti-loosening anchor section and simultaneously form a concavo-convex inner hole surface matched with anti-loosening stripes on the surface of the anti-loosening anchor section to form weldless permanent connection; a convex ring or a bump is arranged at the front end of the fastening sleeve, and is squeezed into a gap between the hole wall of a hole, through which the metal anchor rod penetrates, of the building attachment and the metal anchor rod to form squeezing or interference fit. The chemical anchor bolt can be used for realizing permanent firm connection without welding, loosening is avoided, the fastening strength is greatly strengthened, all uncertain factors influencing chemical gum are eliminated, the aim of safety is actually fulfilled, and the mounting labor and the mounting cost can be reduced; a fireproof and heat-resistant solution to the chemical anchor bolt is also disclosed, so that the chemical anchor bolt is applied to various fire zones.
Owner:斯泰科技(杭州)有限公司 +2

Nitrogen-hydrogen compressor self-adjusting system based on safety and working method thereof

ActiveCN110905783AOptimizing the Shortcut Adjustment ProcessRealize unattendedPump controlPump installationsControl systemGas compressor
The invention discloses a nitrogen-hydrogen compressor self-adjusting system based on safety and a working method thereof. The system comprises a gas holder, a Roots blower and a nitrogen-hydrogen compressor. A first-return first-near path and a second-return first-near path of the nitrogen-hydrogen compressor are in a self-adjusting state, and a first-return first-self-adjusting near path and a second-return first-self-adjusting near path are interlocked with a height of the gas holder. An inlet pipeline and an outlet pipeline of the Roots blower are connected with blower safety water seal. The height of the gas holder is interlocked with the one-return one-near path and the two-return one-near path of the nitrogen-hydrogen compressor according to low alarm and very low alarm. A DCS control system is arranged in the nitrogen-hydrogen compressor, and a gas holder height detector is arranged in the DCS control system to detect the height of the gas holder. In the invention, the near path of the gas compressor is reconstructed, and the safe water seal of the Roots blower is combined for use so that a possibility of ultralow pressure and negative pressure pumping of a gas-making gas holder is avoided, safety of a production process is improved, and a purpose of intrinsic safety is achieved.
Owner:JINYIMENG GRP CO LTD

Powerless type electric lock piece and method for controlling same

The invention discloses a powerless type electric lock piece which comprises at least one portable type equipment and a plurality of sets of electronic locks; each electronic lock is arranged on a plurality of files or archive cabinets; the electric lock is provided with different authentication codes inside; and a database is provided with authentication codes corresponding to the authentication codes of the electric lock. The invention also discloses a method for controlling the powerless type electric lock piece; the portable type equipment obtains the corresponding authentication code from the database to the electric lock on each archive cabinet or file cabinet for the contact or non-contact with the electric lock; the power supply is provided for the electric lock; the portable type equipment transmits the authentication code stored inside the portable type equipment to the electric lock; if the authentication code of the portable type equipment is tallied with the authentication code of the electric lock, the electric lock is started; therefore, the electric lock is kept in a state without electrical energy in normal times and can reduce the meaningless consumption of the electrical energy; and when the electric lock is arranged on a cabinet body, a complex wire pulling or fixing structure is not needed so as to reduce the cost of the overall setting and improve the efficiency of safeguarding and controlling articles in the cabinet.
Owner:林岱右

Stopping machine special for low-temperature tanker loading and unloading arm

The invention relates to a stopping machine special for a low-temperature tanker loading and unloading arm. The stopping machine comprises a main plate and an auxiliary plate which are connected with each other in a plane-stacking manner. A cavity capable of containing a flange is formed between a middle protrusion of the auxiliary plate and the main plate, a U-shaped notch allowing the low-temperature tanker loading and unloading arm to enter and to be placed is formed on the auxiliary plate, and the stopping machine further comprises a first flange limiting bolt. The stopping machine is mounted on a tanker loading platform or other utensils provided with loading and unloading arms; after loading and unloading is completed and when the loading and unloading arm is contained, the loading and unloading arm is rotated and the flange at an opening of the loading and unloading arm is pushed or inserted into a space between the main plate and the auxiliary plate, the flange limiting bolt is overturned to fall into an opening bolt groove of the flange, and a butterfly-shaped nut on the flange limiting bolt is screwed to form pressure limiting. A flaring is arranged at an opening of the U-shaped notch on the auxiliary plate, so that the auxiliary plate has a guiding function, and convenience is brought to pushing-into or inserting-into of the loading and unloading arm. In addition, a sealing pad is arranged on the main plate, so that sealing can be quickly realized when the loading and unloading arm stops in place.
Owner:贺耿

A kind of control method of blast type burner

ActiveCN103900103BImprove securityEffectively clean up residueCombustion regulationStopped workElectricity
The invention relates to a blowing-type burner control method which comprises the following steps that an electric controller receives an ignition instruction and conducts slash fire detection, overheat detection and draught fan rotating speed detection sequentially; the electric controller controls an air blower to blow and sweep a combustion box at the rotating speed a; the electric controller controls the rotating speed of the air blower to be a set ignition rotating speed b, an igniter is started, a power shut-off valve on a gas proportion valve assembly is controlled to be opened, and an electric adjustment opening in the gas proportion valve assembly is opened to an ignition opening degree according to a set ignition current; after the successful ignition, the electric controller synchronously controls the opening degree of the electric adjustment opening and the rotating speed of the air blower according to the burning power input by a manipulator; when the electric controller receives a stop work instruction from the manipulator, the gas proportion valve assembly is closed and the air blower continues to run for set period of time. Compared with the prior art, the blowing-type burner control method has the advantages of being high in heat exchange efficiency, high in safety and the like.
Owner:SHANGHAI HESEN ELECTRO MACHINERY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products