Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

467 results about "Brute force" patented technology

Positioning spinning method of embedded system

The invention relates to a method for positioning yarn by an embedded system, belonging to the technical field of textile processing. The method comprises the technical proposal that: on a drafting mechanism of a ring spinning frame, two chopped fiber rough yarns unreeled from a rough yarn bobbin enter a drafting zone respectively in parallel to be drafted by yarn guiding horns; two continuous yarns are fed from the rear end of a front roller, and join with the two crude yarn strands respectively at a front jaw; the two drafted crude yarn strands and the two continuous yarns are output from the front jaw, enter a twisting triangular zone to be twisted, and are wound on a spun yarn bobbin into yarn; according to different relative positions of the two crude yarn strands and the two continuous yarns, yarns with various structures can be formed. The method can realize that polycomponent yarns with a core-spun structure, a fasciated structure and a folded yarn like structure can be spinned on the ring spinning frame; the yarn structure can be accurately selected and determined and is closer, and yarns has more excellent hairiness, brute force and evenness; and spinning of special fiber yarns on the traditional spinning equipment can be realized so as to enlarge the range of spinning materials.
Owner:WUHAN TEXTILE UNIV +2

Method for a Dynamic Perpetual Encryption Cryptosystem

A dynamic computer communication security encryption method or system using an initial seed key and multiple random number generators of a specific design, whereby a sequence of independent random entropy values is produced by one set of random number generators and encrypted along with the message stream using the initial seed key, or the output of a second set of random number generators initialized with the initial seed key, and following the subsequent transmission of the variable encrypted entropy/message block, the entropy values are used to symmetrically or identically augment or increase the current uncertainty or entropy of the cryptosystem at both the sender and the receiver, prior to the next encryption block operation. The encryption process effectively entailing the use of multiple encryption ciphers, and the entropy augmentation process entailing the encryption or application of various logical mathematical operations on the already dynamic but deterministic internal state values of the second set of random number generators, effectively altering their deterministic outputs in a random probabilistic manner.
Random length message value sequences from one or more data sources is combined with one or more random length entropy value sequences from an independent source, following which the entropy “updates” may also be used to alter, or change any cryptosystem variable, value or component in a randomly determined manner. In addition, whilst ensuring synchronization, the random entropy sequences also serve to “pollute” the cipher-stream and thereby hinder most current forms of cryptanalysis, whilst simultaneously injecting additional entropy into the cryptographic system and allowing for its propagation to affect any connected system nodes, and thereby introducing unpredictable entropy into the system pseudorandom number generator outputs, and thereby ensuring the perpetual generation of unpredictable random numbers.
Super-encryption mechanics are independent of the user data, simple, fast and efficient, and can incorporate compression, error correction and asymmetric encryption authentication routines. But most importantly, super-encryption ensures resistance to brute force attacks (not possible to verify if a message was even sent), an ability to exceed “perfect secrecy” requirements, and an improvement on previous super-encipherment design, since overhead can be dramatically reduced from 100% overhead.
Communication links previously established by system nodes with central authorities may be used for secure node authentication and registration, whilst allowing the central authority to broker and synchronize communication channels and providing mutual authentication and other security functions between the system nodes.
Owner:FIGUEIRA HELDER SILVESTRE PAIVA

Cross mechanical anti-theft lock with fixed lock cylinder

The invention relates to a cross mechanical anti-theft lock with a fixed lock cylinder. The lock comprises a prying resistant plate, a drilling resistant piece, a backboard, a lock cylinder, an inner rotary ring, an outer rotary ring, a dialing ring, a moment limiter, a cam shaft and a matched key. The lock is mainly characterized in that the lock cylinder is fixedly assembled between the prying resistant plate and the backboard and cannot move. Driven by the cam, the inner and outer rotary rings at the periphery of the lock cylinder synchronously rotate an angle of 15 degrees first and are staggered with the lock cylinder, and then the outer rotary ring continuously rotates independently and unlocks, so that the lock cannot be unlocked technically. The prying resistant plate is located outside the lock cylinder, and a cross hole is formed in a position corresponding to the prying resistant plate, so that the lock is prevented from being destructively unlocked by a forced unlocking tool. The moment limiter can idle when a handle is rotated with brute force, so that the lock is prevented from being damaged and cannot be unlocked. The unlocking process comprises the following steps: inserting the key without rotating the key and rotating the handle for 90 degrees. The lock is locked without the key and in a way of reversely rotating the handle for an angle of 50 degree.
Owner:吕雪寒

Efficient and safe data deduplication method and efficient and safe data deduplication system based on user perception

The invention provides an efficient and safe data deduplication method based on user perception, which comprises the steps that a client adopts key server assisted Hash-based convergence encryption to carry out file-level data deduplication across users; if duplication does not exists in files, user assisted convergence encryption is adopted to carry out block-level deduplication inside the users; and multilevel key management is adopted, a file-level secret key is used to encrypt a block-level secret key, the file-level secret key is segmented into fragment-level secret keys by using secret sharing, and the fragment-level secret keys are stored in a distributed key server. The invention further provides an efficient and safe data deduplication system based on user perception. According to the invention, random information is added through adopting key server assisted Hash-based convergence encryption in a file level and adopting user assisted convergence encryption in a block level, thereby enabling file-level secret keys and block-level secret keys of users to be randomized, being capable of effectively resisting brute force attacks of opponents, and ensuring the data confidentiality and the safety of the users; and the multilevel key management scheme is adopted to ensure the safety of secret keys, and the secret key space overhead is reduced.
Owner:HUAZHONG UNIV OF SCI & TECH

Machining method of high-quality large-diameter thin-wall metal barrel body

The invention relates to a machining method of a high-quality large-diameter thin-wall barrel body. The machining method comprises the following steps. Firstly, isothermy or hot die anti-extrusion technology is utilized, and anti-extrusion is performed on an alloy forging rod. Secondly, machining is performed on the inner and outer surfaces of a spinning barrel billet, and finish turning is performed on the inner surface of the barrel bottom of the barrel billet. Thirdly, multi-pass brute force thinning spinning is performed on the machined spinning barrel billet, and the spinning is hot spinning or cold spinning. Fourthly, intermediate heat treatment is performed on a spinning semi-finished product, and the intermediate heat treatment is annealing or solution treatment. Fifthly, the third step and the fourth step are performed repeatedly and alternatively so that finished product spinning is performed. Sixthly, scouring and cleaning are performed on the barrel body, and finished product heat treatment is performed. Seventhly, polishing of the inner and outer surfaces of the barrel body after heat treatment in the sixth step is performed, and a finished product barrel body is obtained. By adoption of the machining method of the high-quality large-diameter thin-wall barrel body to machine a large-diameter thin-wall metal barrel body without welding lines, organization is even and fine, comprehensive performance is high, the process is short, product additional values are high, and good application and popularizing prospects and certain economic and social benefits are achieved.
Owner:有研金属复材技术有限公司

Method and apparatus for equalizing video transmitted over twisted pair cable

ActiveUS7047556B2Enhancing and improving quality of high-resolutionGood cost advantageTelevision system detailsTransmission control/equlisationBrute forceTwisted pair
A apparatus and apparatus for compensating for video insertion loss due to transmission over long twisted pair cable lines is presented. Transmission of video over twisted pair cable is advantageous because of its superior cost advantage over coaxial cable. However, twisted pair cables have significant loss characteristics at the higher frequencies (i.e., broadband) compared to coaxial cables. At a transmitter station, the video signal is amplified in the high frequency region for possible skin effect losses thereby brute forcing the high frequency components to the receiving station. At the receiver station, the video signal is further compensated for diffusion line and skin effect losses. The total skin effect compensation applied in both the transmitter and receiver stations is such that the square root of frequency characteristics of skin effect losses is compensated for. Thus, at the receiving station, the high frequency compensation added at the transmitter to brute force the high frequency components to the receiving station may be removed if found excessive. Additionally, compensation is included to adjust for skew that may occur because of irregularities between the various twisted pairs used to transmit the individual video components. Non-minimum phase type filters are used to inject delay into the faster arriving signals so that they may coincide in phase with later arriving signals resulting in a true reproduction of the video.
Owner:RGB SYST INC

Website login brute force crack method and system capable of identifying verification code

The invention provides a website login brute force crack method and system capable of identifying a verification code. The method comprises the steps of 1, through static webpage analysis, extracting information required for website login; 2, through dynamic webpage analysis, intercepting a login data package submitted to a website server by a client browser; 3, reading a group of user names and passwords from a brute force crack dictionary; 4, obtaining a verification code picture; 5, identifying the obtained verification code picture; 6, filling corresponding parameters in the login data package intercepted in the step 2 with a verification code identification result as well as the user names and the passwords read in the step 3, and submitting the replaced login data package to the website server; and 7, analyzing a website server response, if it is prompted that the verification code is wrong, returning to the step 4; if it is prompted that the user name or the password is wrong, returning to the step 3; and if it is prompted that the login succeeds, recording the user name and the password by which the login succeeds. According to the method and system, a website with a verification code login function can be subjected to automated security testing.
Owner:STATE GRID CORP OF CHINA +2

Cloud platform identity identification method

InactiveCN107231346AIrreversible operationImprove securityTransmissionPlaintextBrute force
The invention provides a cloud platform identity identification method. The cloud platform identity identification method comprises the following steps that before a system is accessed, identity authentication must be conducted; a single sign-on mode is adopted as the sign-on mode of a user, after the user inputs a user name and a password, the user name and the password are encrypted through an RSA public key in the transmission process, and a request is sent to a server side; the server side receives the sign-on request, and the user name and the password are decrypted through an RSA private key and then stored in a database through an SHA256 algorithm and a random number salting strategy; the user name and the password are verified; identity authentication is finished; the user accesses the system. According to the cloud platform identity identification method, data encryption is conducted on the user name and the password which are input by the user through RSA asymmetric encryption (the public key and the private key), therefore, it is guaranteed that ciphertext of each request cannot be repeated, and plaintext transmission and brute force cracking of the password are avoided; and by adopting the sha256 algorithm, it is guaranteed that same data cannot be repeated or reversely operated after being encrypted, and then the user identity authentication security is greatly improved.
Owner:北京海顿中科技术有限公司

Preparation method for liquid phase stirring and mixing of white carbon black and natural rubber

The invention relates to the production field of tire rubber sizing materials, in particular to a method for mixing liquid state white carbon black and liquid state natural rubber in a liquid phase. The preparation method for liquid phase stirring and mixing of the white carbon black and the natural rubber comprises the steps of (1) preparing slurry; (2) mixing; (3) solidifying, dehydrating, washing and stoving. The method adopts liquid-liquid high speed stirring and mixing to effectively preserve original states of natural rubber macromoleculars, effectively preserves brute force of the natural rubber and substantially promotes brute force and abrasive resistance of mixed glue. Brute force of sizing materials mixed by using the method is substantially promoted, and themogenesis and hysteresis loss are obviously reduced. The mixed glue produced by the method can be singly used and can also be blended with the natural rubber, rubber polymer, natural rubber carbon black rubber master batch and rubber polymer carbon black rubber master batch according to certain proportion. According to the method, the liquid state white carbon black and the liquid state natural rubber are mixed directly, the process is simple, the land occupation is small, the equipment investment is low, and dust pollution does not exist in a production process.
Owner:ZHONGCE RUBBER GRP CO LTD

Novel sludge brick making technique

The invention discloses a novel sludge brick making technique which comprises the following steps that municipal sludge is subjected to dewatering conditioning and desodoration treatment; heavy metal is controlled; treated sludge pug, clay and an additive are blended to form a material; the material is fed into a brute force extrusion mixer to be mixed fully, and is ground and homogenized by brute force roll grinding and aged; the aged brick making pug is fed into an adobe making workshop to be subjected to compression moulding for adobe making; the moulded adobes are fed into a drying room to be dried; and the dried adobes are placed in a back stage of a tunnel kiln to be sintered. According to the technique, the sludge from a sewage plant is mixed with the raw clay directly, so that energy resources consumed due to sludge drying are saved; targeted improvement measures are put forwards to solve the problems of sludge dewatering, odor control, heavy metal stabilization, etc.; the quality performance and the strength grade of sludge bricks are improved by methods of optimizing a sludge blending ratio and feeding the additive, etc.; the reduction, harmlessness, reclamation and industrialization treatment goals on the municipal sludge are realized; and the sludge bricks, serving as a product, have objective economic benefits.
Owner:XIAN LISHENG SLUDGE TREATMENT +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products