Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

77results about How to "Won't steal" patented technology

Method and device for reinforcing application program

The embodiment of the invention provides a method and a device for reinforcing an application program. The method comprises the following steps of receiving a reinforcing request of the application program, wherein the reinforcing request comprises an installation package of the application program and multi-channel information for reinforcing the application program, the installation package comprises code files and resource files, and release channel names and corresponding channel values are configured in the resource files; analyzing to obtain corresponding code files and resource files from the installation package of the application program; executing reinforcing operation on the code files obtained through analysis; executing retouching operation on the resource files obtained through analysis according to each piece of channel information to obtain a new resource file corresponding to each piece of channel information; executing packaging operation on the reinforced code files and the new resource file corresponding to each piece of channel information to obtain a reinforced installation package corresponding to each piece of channel information. According to the method and the device, the safety of the application program can be improved and the efficiency of reinforcing multiple release channels is improved.
Owner:BEIJING QIHOO TECH CO LTD

Security distributed data management method based on public cloud

The invention discloses a security distributed data management method based on a public cloud. The security distributed data management method comprises the following steps: assuming that m public cloud spaces exist, extracting a storage directory structure on a local computer, encrypting all files in a directory, dividing each encrypted file into m blocks, sharing and dividing key secrets into m blocks, respectively sending the files and the key blocks into the m public cloud spaces, and sharing directory tree secrets into the m public cloud spaces. In the event of searching a specific file and downloading a file, a directory tree is fetched and restored from any n public cloud spaces at first, wherein n is less than m; the file is searched from the directory tree; then, sub-file blocks and sub-key blocks are continuously fetched from the n public cloud spaces according to the searching result; the file blocks are combined; simultaneously, a key is recovered; and finally, an original file is obtained by decrypting the file. By means of the technical scheme provided by the invention, data information in any insufficient n public cloud spaces is insufficient to recover the original file; therefore, the data information security is increased; and the risk in leaking user data information is reduced.
Owner:SOUTH CHINA AGRI UNIV

High temperature resistant rubber base composite material used for chip packaging and application thereof

The invention discloses a high temperature resistant rubber base composite material used for chip packaging and an application thereof, and belongs to the technical field of the high temperature resistant chip packaging material. The invention aims to provide a high temperature resistant, moisture-proof and damp-proof chip packaging composite material. The high temperature resistant rubber base composite material used for the chip packaging adopts the technical scheme that the high temperature resistant rubber base composite material used for the chip packaging comprises the following raw materials in parts by weight: 100 parts of silicon rubber, 0.1-2 parts of plasticizer, 1-10 parts of reinforcing agent, 50-100 parts of heat insulation microsphere and 1-15 parts of vulcanizing agent. The plastic rubber base composite material related by the invention has a high temperature resistant characteristic, a radio frequency identification device (RFID) chip can be comprehensively protected to normally work in the high temperature environment, the chip is free from being damaged due to overheat at the temperature of 300DEG C, and the packaged chip has an excellent moisture-proof and damp-proof performance.
Owner:NO 33 RES INST OF CHINA ELECTRONICS TECHNOOGY GRP

Secure communication method and device based on identity authentication

The invention discloses a secure communication method and device based on identity authentication, and the method and device can achieve the flexible and efficient verification of identity informationof two communication sides through electronic seals of two forced authentication sides under the condition that there is no need to apply for a digital certificate from a CA mechanism, and guaranteesthe safety of communication data. The method comprises the following steps that: a request node and a response node respectively manufacture respective electronic seals; the request node and a response node report fingerprint information in electronic seals of the opposite side; the request node encrypts plaintext data by using a random factor to generate ciphertext data, encrypts the random factor by using a public key of the electronic seals of an opposite side to obtain a communication key, and then packages and sends the ciphertext data, the communication key and the fingerprint information to the response node; and the response node compares the fingerprint information in the file package with the reported fingerprint information, decrypts the encrypted private key of the electronicseals to which the response node belongs after successful comparison, decrypts the communication key through the private key to restore the random factor, and analyzes the ciphertext data to obtain plaintext data.
Owner:SUNING CLOUD COMPUTING CO LTD

Physical layer security methods based on non-optimal user cascading scheme in heterogeneous network

The invention discloses physical layer security methods based on a non-optimal user cascading scheme in a multilayer heterogeneous network and belongs to the technical field of wireless communication.According to the methods, a multilayer heterogeneous network model in a passive eavesdropping scene is analyzed through description of node distribution density, a base station transmitting power, path loss indexes and a bias factor of each layer. The problem that the optimal base stations are difficult to connect is solved by the provided method based on the non-optimal user cascading scheme. According to the scheme, network nodes are modeled into a homogeneous Poisson point process through utilization of stochastic geometry. On the basis of a stochastic geometry mathematical tool, a physical layer security probability expression of the multilayer cellular heterogeneous network is inferred. Influence of the transmitting powers, security thresholds and eavesdropper density on a system security probability is compared and analyzed according to obtained security probabilities. The method has obvious advantages in the aspect of improving physical layer security of the system. A network coverage probability and average user capacity are improved. Throughput and spectral efficiency of the network are also improved.
Owner:NORTHWEST NORMAL UNIVERSITY

System and method for verifying authenticity of financial self-service terminal

InactiveCN103268676AWon't stealEliminate the disadvantages of unreliabilityComplete banking machinesTelecommunications linkPassword
The invention discloses a system and a method for verifying the authenticity of a financial self-service terminal. The system comprises a self-service apparatus, a communication device and a bank server device; the self-service apparatus can be financial self-service terminal equipment capable of providing deposit, withdrawal deposit or account transfer service for users, or terminal equipment capable of providing financial services by requiring password entry and card insertion operation; the communication device can be communicated with a bank host instantly to finish the financial self-service for users, and the communication device is used for connecting a customer and the communication links of a bank service host; and the bank server device is a service system capable of managing user account information and deposit of the user. According to the system and the method for verifying the authenticity of the financial self-service terminal, the operation is simple, the verification is convenient, no extra communication channels are needed, the cost is lower, the verification can be realized only by utilizing the existing communication links of the self-service terminal and the bank host, more importantly, the defects caused by the second communication link such as a mobile device and unreliable information source are completely eradicated.
Owner:GUANGZHOU KINGTELLER TECHNOLOGY CO LTD

Key management-based access control method suitable for pay television system

The invention discloses a key management-based access control method suitable for a pay television system, which comprises the following steps of: forming a group by all users of the same video website, dividing the users into different user subsets according to the preferences of the users, wherein television programs subscribed by the users in the same user subset are the same. And the website manager encrypts the television program and the session key, and sends the ciphertext of the program and the ciphertext of the session key to the cloud server and the corresponding user respectively. And the cloud server updates the data storage table according to the data uploaded by the website manager and judges whether the request of the user is legal or not according to the data storage table.Only legal users can obtain the session key and the ciphertext of the television program at the same time, and the plaintext of the television program is further obtained through decryption. According to the invention, the privacy data of the user can be ensured not to be stolen, and the dynamic operation of the user and the service provider on the television program is supported; and computing and communication overheads of the user and the service provider are saved.
Owner:NANJING UNIV OF INFORMATION SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products