Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

126 results about "Internet safety" patented technology

Internet safety or online safety or cyber safety is trying to be safe on the internet and is the knowledge of maximizing the user's personal safety and security risks to private information and property associated with using the internet, and the self-protection from computer crime. One key element of internet safety is the ability to maintain privacy. Internet privacy involves the right or mandate of personal privacy concerning the storing, repurposing, provision to third parties, and displaying of information pertaining to oneself via the Internet. Internet privacy is a subset of data privacy. Privacy concerns have been articulated from the beginnings of large-scale computer sharing.

Network architecture security system for Internet of Things and security method thereof

The invention aims at providing a network architecture security system for Internet of Things and a security method thereof, comprising security protective measures sequentially established in the system from inside to outside, which are mainly reflected in that a security device at a central terminal of the Internet of Things comprises a central cipher machine, a central authentication secret key management center, a data server, a security database and the like, and then the security of each sensor terminal in a Personal Area Network and the like. Compared with the prior art, the invention has the advantages that: 1. according to the characteristics of the Internet of Things, Internet security technology of the Internet of Things is realized; 2. the security protective measures sequentially established in the system from inside to outside are mainly reflected in the security device at the central terminal and security modules at each sensor terminal, thus ensuring the security of sensing information, equipment, communication and application, as well as security management; and 3. multi-level security systems are deployed in the aspects of security mechanism and management, such as the confidentiality, integrity, authenticity and non-repudiation of data, and equipment legitimacy.
Owner:BEIJING BINGGANG TECH DEV CO LTD

System and method for realizing mobile payment in internet sales

The invention discloses a system and a method for realizing mobile payment in internet sales. The method comprises the following steps that: a user installs a payment client by using a mobile phone which is provided with a financial smart card bound with bank card information; a mobile phone payment platform receives a shopping list after the user shops on an internet sales platform; the mobile phone platform sends a shopping bill through the payment client; the user pays on the mobile phone; the payment client sends the payment information to the mobile phone payment platform after the realization of payment; the mobile phone payment platform sends the payment information to the internet sales platform after checking; and finally, the internet sales platform sends a successful payment message to the mobile phone sales platform and the user, so the payment is finished. Due to the adoption of the system and the method for realizing the mobile payment in the internet sales, the payment process in an internet sales mode is greatly simplified; a user can conveniently and quickly perform remote payment operation; the operation process is very safe; the user can ask others to pay instead at will, so the user or a paying agent can conveniently and quickly pay by using the mobile phone no matter where the user or the paying agent is.
Owner:成都中联信通科技股份有限公司

Internet-of-things safe cloud platform based on deep data traffic perception

The invention discloses an Internet-of-things safe cloud platform based on deep data traffic perception. The Internet-of-things safe cloud platform comprises a functional unit arranged between an Internet-of-things connecting layer and a service application layer, wherein the functional unit comprises a deep engine perception engine which is used for identifying service attribute of a current datapacket, and extracts the characteristic parameter of a characteristic field according to the service kind for performing classification statistics analysis. Particularly the functional unit performsthe following steps of 1, extracting key information of an IP layer, a transmission layer and partial application layer of network data traffic, matching an application characteristic database, and identifying the protocol type of the current data traffic; 2, in the current protocol type, extracting the service data characteristic of the network traffic flow, and constructing a quantitative distribution model of a data load; and 3, based on the service data characteristic, identifying the characteristic field of an unknown traffic data packet and extracting the field value of the characteristic field, recording the change amount and outputting. The Internet-of-things safe cloud platform has advantages of increasing a classification method based on key content identification, realizing deepanalysis to each behavior parameter of Internet-of-things data traffic and effectively ensuring network safety of the Internet-of-things system.
Owner:北京华清信安科技有限公司

Internet evidence obtaining method, device and Internet security system

The invention belongs to the Internet technical field and discloses an Internet evidence obtaining method. The method includes the following steps that: S1, a target evidence obtaining network address and an evidence obtaining network level which are inputted by a user end are obtained; S2, the relevant information of a server corresponding to the target evidence obtaining network address is extracted, and content involving infringement is intercepted in real time; and S3, the relevant information and the intercepted content are encrypted in real time and packaged into a compressed packet of a standard format, and the compressed packet is transmitted to a security center, so that the compressed packet can be protected as evidences. According to the Internet evidence obtaining method, the Internet evidence obtaining device and the Internet security system of the invention, the relevant information of the server and the content about infringement are directly obtained from the server corresponding to the target evidence obtaining network address, since the security of the network server is higher than that of a client browser, the problem of low reliability which is caused by a condition that evidences obtained by the client browser are easy to tamper can be solved.
Owner:冯颖

Group broadcast cipher key managing method based on physical layer

The present invention discloses a kind of managing method for group transmission key secret code based on the physical levels of group transmission network. It relates to internet safety group transmission field, which is used as a means for graduating subgroup, group transmission key secret code administration and group transmission communication in the group transmission service, thus reducing the expenses for the renewal of the group key secret code. The source of group transmission uses the local subgroup communication key secret code with the SEK data, transmit it to the physical subgroup; and after the local physical subgroup of the group safety agent has received, deciphered it, then it uses the communication key secret code with enciphered data of the logical subgroup to transmit it to other physical subgroups, and the other physical subgroups of the group safety agents, having received it, use the logical subgroup communication key secret code with encryption group to transmit it to the group transmitting receivers of the physical subgroup. The group transmitting receivers use the local transmission key secret code to obtain data through decryption. The invention can effectively divide the subgroups and resolve the problem of the key secret code administration of the safety group transmission, thus reducing the expenses for the renewal of the group transmission key secret code without limitation to scope and with favorable expansion.
Owner:UNIV OF SCI & TECH OF CHINA

Pre-shared key obtaining method, pre-shared key distribution method and pre-shared key distribution device

The present invention provides a pre-shared key obtaining method, a pre-shared key distribution method and a pre-shared key distribution device. The pre-shared key obtaining method comprises: receiving negotiation message for building an Internet safety tunnel sent by a terminal device; determining whether the negotiation message includes the user information of the terminal device or not; if the negotiation message includes the user information of the terminal device, sending the user information to a server to facilitate randomly generating a pre-shared key when the server is determined to store the user information by itself, and sending to pre-shared key to a network device and the terminal device; receiving the pre-shared key, corresponding to the user information, sent by the server; and employing the pre-shared key and the terminal device to perform follow-up message negotiation. According to the embodiment of the invention, the pre-shared key obtaining method, the pre-shared key distribution method and the pre-shared key distribution device employ a pre-shared key to perform negotiation so as to prevent the pre-shared key from being solved by attackers and avoid pretending to be a real user to access the internal network for data stealing, therefore the safety of the IKE negotiation is improved.
Owner:NEW H3C TECH CO LTD

Internet-specification entrance guard and safety management system

The invention discloses an internet-specification entrance guard and safety management system. The internet-specification entrance guard and safety management system comprises a registered user, a mobile terminal, entrance guard management software, a master control computer, an image acquisition module, an image recognizing module and an entrance guard control module, wherein the entrance guard management software is connected with the master control computer through the internet; the master control computer is separately connected with the image acquisition module, the image recognizing module and the entrance guard control module; the registered user needs to upload registered user image identity information while registering on the entrance guard management software through the mobile terminal. The internet-specification entrance guard and safety management system is artificial intelligent application of internet entrance guard safety management, is simple in structure, is scientific to use, and is convenient to operate; the image identity information must be used for successful registering on the entrance guard management software, an interpersonal relationship is established according to the register user formal information, safety of internet safe management interpersonal relationship is improved, and internet safety management is realized by taking image identity associated information as basis.
Owner:姜茂清

Goods false proof method and system based on Internet safety lock

InactiveCN106940859AAchieve anti-counterfeiting goalsAnti-lostDigital data protectionCommerceProduct traceabilityCard security code
The embodiment of the present invention discloses a commodity anti-counterfeiting method and system based on an Internet security lock. By uniformly encoding the Internet security lock and writing the locked commodity information into the security lock code, the user can verify the identity of the commodity through the security lock. Information to identify the authenticity of the goods, so as to achieve anti-counterfeiting. The method in the embodiment of the present invention includes: generating a corresponding security lock code by uniformly encoding the Internet security lock, and writing information corresponding to locked commodities in the security lock code, the security lock includes a physical anti-counterfeiting lock, a card anti-counterfeiting lock, Virtual anti-counterfeiting lock, the information of the locked commodity includes commodity code and commodity code associated information, commodity traceability code and commodity traceable code associated information, commodity specific anti-counterfeiting information; generating the first opening method corresponding to each entity anti-counterfeiting lock code ; Generate an anti-counterfeit card corresponding to each of the card anti-counterfeit lock codes; generate a second opening method corresponding to each of the virtual anti-counterfeit lock codes.
Owner:李建魁

Multi-attribute decision-making method for energy internet security assessment

The invention discloses a multi-attribute decision-making method for energy internet security assessment, which comprises the following steps: firstly, establishing eight energy internet security assessment index sets from four aspects of natural disaster threats, network structure vulnerability, system equipment risks and information security threats, and collecting each index data to form an assessment decision-making matrix; determining the objective weight of each safety assessment index by adopting a standard deviation variation coefficient method; adopting a characteristic root method toobtain subjective weight of the multi-expert group, and calculating subjective and objective comprehensive weight of the safety assessment index; and finally, evaluating the safety level of the energy internet by adopting a comprehensive proportion evaluation method. The energy internet safety assessment index system is comprehensive. The assessment method has high operability, a given energy internet safety assessment result has high reference value, weak safety links and potential risk threats existing in energy internet construction can be found out, and the assessment method has positivesignificance in guaranteeing safe and stable operation of the energy internet.
Owner:SOUTHWEST JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products