Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

649results about How to "Without compromising security" patented technology

Method for protecting privacy data of users in cloud environment

The invention discloses a method for protecting the privacy data of users in a cloud environment. The method comprises the following steps that: a cloud platform receives a user request, and judges whether the user request is a data uploading request or a data reading request; if the user request is a data reading request, the cloud platform searches corresponding data according to an identifier of to-be-read data in the data reading request, and judges whether the data is a ciphertext; if the data is a ciphertext, the cloud platform searches whether the user is authorized in a re-encryption key server; if the user is authorized, the cloud platform re-encrypts the data into a ciphertext (can be decrypted by the user) by using a proxy re-encryption service and a re-encryption key corresponding to the user, and issues the ciphertext to the user; the user decrypts the ciphertext by using a decryption key of the user and a decryption interface of a safety plugin so as to obtain plaintext data; and the user calls a corresponding application program interface to carry out modification on uploaded data by using a client plug-in. According to the invention, the application demands of user data on the cloud platform are not affected while the privacy data of the users is protected,.
Owner:HUAZHONG UNIV OF SCI & TECH

System and method for remotely debugging application programs

A method, system, and apparatus for debugging an application program from a workstation that is remote from a server on which the application program resides includes invoking the application program from the workstation via a network interface; displaying a user frame at the workstation that includes information generated by the application program; providing a debug view option at the workstation for generating a debug frame of the application program; and displaying the debug frame at the workstation when the debug view option is selected. A user can select options to switch between the user frame and the debug frame. The debug frame includes information about one or more components of the application program such as a list of the variables or objects, and the fields, methods, and / or the constructors associated with them. When the debug view option is selected, the information for the user frame is saved, and can be restored to regenerate the information on the user frame when the user view option is selected. The developer can view internal, public, and private code associated with the application program without compromising the security of other application programs on the server. This ability to remotely debug application programs in accordance with the present invention is thus more time and cost efficient than previous methods, and also alleviates concerns about security and unauthorized access to the server.
Owner:VERSATA DEV GROUP

Identification authentication method between peer-to-peer user nodes in P2P network

The invention provides a method for authenticating identification among peer-to-peer nodes in a P2P network. Each peer-to-peer node in the P2P network has a certificate which is acquired when a user node logs on the network through a certificate server, and the certificate comprises an encryption result of a private key of the certificate server to a public key of the user node. The method comprises the following steps: a first user node transmits an identification authentication message to a second user node in the network, wherein the identification authentication message comprises a certificate of the first user node and the public key of the first user node; a second user node authenticates identification of the first user node by the identification authentication message, after authentication succeeds, the identification authentication message is returned to the first user node, wherein the identification authentication message comprises a certificate of the second user node and the public key of the second user node; and the first user node authenticates the identification of the second user node by the identification authentication message returned by the second user node, and if the authentication succeeds, identification authentication between two user nodes succeeds.
Owner:INST OF COMPUTING TECH CHINESE ACAD OF SCI

Dual authentication method, system and device for SSH safe login

InactiveCN105162764ARealize remote login authenticationWithout compromising securityTransmissionPasswordIdentity theft
The invention discloses a dual authentication method for SSH safe login. The method includes the following steps: a client sends a user name and a password or certificate, and a user uses the user name and the password or certificate to log in a managed SSH authentication server; if the user name and the password or certificate are valid, the SSH authentication server returns a two-dimensional code to be displayed on the client; the user uses an intelligent terminal to scan the two-dimensional code displayed on the client; the intelligent terminal generates signature information for a login session of this time to a two-dimensional verification server or the SSH authentication server through the two-dimensional code, a built-in certificate and a hardware token thereof; and the SSH authentication server verifies whether the signature information is correct, and if the signature information is correct, the SSH authentication server logs in successfully. The dual authentication method for SSH safe login has the beneficial effects that a secondary authentication process based on a two-dimensional code is added, and two-dimensional code information is leaked, is unique and cannot be repetitive, thereby greatly improving security of login verification of the SSH authentication server, and preventing the problem of identity theft caused by user password loss.
Owner:BEIJING STONE SHIELD TECH

System and method for remotely debugging application programs

A method, system, and apparatus for debugging an application program from a workstation that is remote from a server on which the application program resides includes invoking the application program from the workstation via a network interface; displaying a user frame at the workstation that includes information generated by the application program; providing a debug view option at the workstation for generating a debug frame of the application program; and displaying the debug frame at the workstation when the debug view option is selected. A user can select options to switch between the user frame and the debug frame. The debug frame includes information about one or more components of the application program such as a list of the variables or objects, and the fields, methods, and / or the constructors associated with them. When the debug view option is selected, the information for the user frame is saved, and can be restored to regenerate the information on the user frame when the user view option is selected. The developer can view internal, public, and private code associated with the application program without compromising the security of other application programs on the server. This ability to remotely debug application programs in accordance with the present invention is thus more time and cost efficient than previous methods, and also alleviates concerns about security and unauthorized access to the server.
Owner:VERSATA DEV GROUP

Virtual machine system and safety control method thereof

The invention discloses a virtual machine system which comprises a management virtual machine, a virtual machine monitor, a client virtual machine and a safety virtual machine. The management virtual machine is used for authenticating the client virtual machine and sending an authenticated result to the virtual machine monitor. The virtual machine monitor is used for transmitting an access request sent from the client virtual machine to the management virtual machine. The authenticated result sent from the management virtual machine is transmitted to the client virtual machine. The authenticated result sent from the client virtual machine is transmitted to the safety virtual machine. According to access permission, physical resources are accessed and an access result is returned to the client virtual machine. The client virtual machine is used for sending the access request and the authenticated result to the virtual machine monitor. The safety virtual machine is used for issuing the access permission of the client virtual machine to the virtual machine monitor. The invention further discloses a safety control method of the virtual machine system. With the system and the method, workload of the virtual machine monitor can be lowered, the access permission of the client virtual machine can be flexibly controlled, and the access of the client virtual machine to the physical resources is effectively controlled.
Owner:ZTE CORP

Train-receiving signal control system of passenger dedicated line railway station

The invention relates to passenger dedicated lines and provides a train-receiving signal control system of a passenger dedicated line railway station. The train-receiving signal control system comprises two station-entering signal machines and an effective station track. Fouling posts are arranged at the two ends of the effective station track correspondingly. A platform section is arranged in the position, corresponding to a platform, of the effective station track and located between the two fouling posts. A departure signal machine is arranged between each fouling post and the platform section. At least parts of passing protective areas are located on first turnout sections on the inner sides of the departure signal machines in the corresponding directions. Successive routes of train-receiving routes are automatically arranged through interlocking equipment, and the tail ends of the successive routes are located on the first turnout sections on the inner sides of the corresponding departure signal machines. According to the improved train-receiving signal control system of the passenger dedicated line railway station, the original travelling safety is not reduced, and meanwhile at least parts of the passing protective areas are arranged on the inner sides of the departure signal machines, so that the distances between the departure signal machines and the fouling posts are shortened, the length of the station track can be decreased, and land and the construction cost are saved.
Owner:CHINA RAILWAY SIYUAN SURVEY & DESIGN GRP

External internet-of-things smart-phone call-out elevator wireless simulation artificial-triggering device

The invention discloses an external internet-of-things smart-phone call-out elevator wireless simulation artificial-triggering device. The device comprises externally arranged button controllers on elevator rooms of all floors, the button controllers comprise button control boxes, the part, on one side of each button control box, of a box body covers corresponding elevator buttons, the part, on the other side of each button control box, of the box body is fixedly installed on a wall, a button touching mechanism is arranged inside the part, on one side of each button control box, of the box body, and a button driving mechanism is arranged inside the part, on the other side of each button control box, of the box body. The button touching mechanisms comprise inner and outer touching buttons, and the outer touching buttons press the elevator buttons through the inner touching buttons in a touching mode. The button driving mechanisms comprise telescopic shafts, transmission rods and cams, wherein the transmission rods are arranged in the left-right direction. Wireless signal receiving and transmitting devices are further arranged inside the box bodies and used for receiving wireless signal instructions and controlling the cams to rotate, and at the maximum eccentric positions of the cams, the telescopic shafts push the inner touching buttons to touch the elevator buttons through the transmission rods. The device is arranged outside the elevator rooms, corresponds to the elevator buttons, is only responsible for controlling the elevator buttons and does not affect safe and normal usage of an elevator.
Owner:冯新州

Small current grounding line selection method based on residual current variable

ActiveCN102279349AReduce ground currentExtinguish the ground arcFault location by conductor typesShort-circuit testingSingle phaseGround current
The invention discloses a low current grounding wire selection method based on residual current variable, and the method comprises the following steps of: (1) correctly identifying whether an electric distribution network has a single-phase ground fault by adopting the neutral point displacement voltage of the electric distribution network as characteristic quantity; (2) after the ground fault happens, compensating the grounding current of a fault point by virtue of an arc-suppression coil to achieve the effects of reducing the grounding current and extinguishing grounding arc light; (3) adjusting the tap position of a first tap arc-suppression coil on the premise of ensuring that the grounding residual current meets the standard request; (4) because the neutral point displacement voltagebefore and after the tap position adjustment of the arc-suppression coil changes, converting the zero-sequence current of each outgoing line subjected to the tap position adjustment to be below the voltage level before the top position adjustment by utilizing a voltage translation method so as to prevent the wire selection characteristic quantity from being influenced by the neutral point displacement voltage; and (5) selecting the line with the single-phase ground fault according to the change values of the zero-sequence current of each outgoing line after voltage translation before and after the tap position adjustment. The low current grounding wire selection method based on residual current variable can be used for improving the accuracy of wire selection.
Owner:STATE GRID ELECTRIC POWER RES INST +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products