Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

124 results about "Security design" patented technology

Dual-system synchronous safety computer platform

The invention provides a dual-system synchronous security computer platform, which is composed of a main control layer and an execution layer, wherein the main control layer is composed of a main control module, and is divided into main and standby systems, that is, is divided into a main control module A and a main control module B; the execution layer consists of a certain number of expandable execution modules, each of which is further divided into a security-related module and a non-security-related module, and the design of power supply isolation and bus isolation is carried out for the security function modules and the non-security function modules; the security computer platform adopts a double 2-vote-2 security redundancy architecture; all modules of the platform are connected by means of internal redundant CANFD buses; and the main control modules of the main and standby systems in the main control layer adopt Ethernet buses to implement main and standby machine synchronization and data interaction communication of the main and standby systems. The dual-system synchronous security computer platform has the technical advantages that the expansibility is excellent, the independent and redundant bus architecture is adopted between the main and standby systems, the security modules and non-security modules adopt the power supply isolation and bus isolation security design,and the reliability and security are higher.
Owner:BEIJING JIAODA SIGNAL TECH

Laser ignition system with double-security design

The invention discloses a semiconductor laser ignition system with a double security design, which belongs to the field of semiconductor laser ignition systems. The semiconductor laser ignition system comprises a singlechip system, a voltage-controlled current source, a laser, a first optical fiber connector, a second optical fiber connector, a laser detonator joint, a laser detonator, a photoelectric detector, an upper computer, a current-limiting resistor, a current-limiting switch and a normally-closed relay, wherein the singlechip system is connected with the upper computer, the voltage-controlled current source, the current-limiting switch, the normally-closed relay and the photoelectric detector respectively; the current-limiting switch is connected in parallel to two ends of the current-limiting resistor; the normally-closed relay is connected in parallel to two ends of the laser; the laser is connected with the voltage-controlled current source, the current-limiting resistor, the current-limiting switch and the first optical fiber connector respectively; the photoelectric detector is connected with the second optical fiber connector; and the laser detonator joint is connected with the laser detonator. In a security mode, static electricity is prevented from puncturing the laser. In a detection mode, the detection light power output by the laser is kept in a safe range. In an ignition mode, the laser can work in a rated state.
Owner:CHANGCHUN INST OF OPTICS FINE MECHANICS & PHYSICS CHINESE ACAD OF SCI

A captive balloon anchoring platform and a use method

The invention belongs to the technical field of captive balloon operation and security design, and relates to a captive balloon anchoring platform and a using method. The captive balloon anchoring platform comprises a ball seat, a spare part chamber in the ball seat, an empennage storage chamber, a take-off recovery chamber, a maintenance chamber and a plurality of take-off recovery devices. The ball seat is in a trapezoid shape, a conformal curved surface matched with the lower surface of the balloon is arranged in the middle of the upper surface of the ball seat; cross arm sliding rails, cross arms installed on the cross arm sliding rails and a plurality of upper captive rigging bodies are arranged on two sides of the upper surface of the ball seat. The ball seat is provided with a doorfor entering the maintenance chamber; a plurality of bottom captive rigging bodies are arranged at the bottom in the take-off recovery chamber; during anchoring, helium in the sphere can be released,the sphere becomes flat and is placed in the conformal curved surface, and a covering plate is tightly fixed through the cross arm sliding rails so as to resist extreme climate such as strong storm; by means of the captive balloon anchoring platform, an application area can be continuously expanded to areas with complex geographical and topographic conditions such as ocean islands, steep mountainous regions and wetland mudflats.
Owner:CHINA SPECIAL TYPE FLIER RES INST

Security protection authentication encryption method of intelligent network load interaction terminal information

The invention discloses a security protection authentication encryption method of intelligent network load interaction terminal information. From three aspects of system master station protection, collection channel protection and collection equipment protection, coordinated and unified security protection technology and a security management method are adopted to perform a security design on an authentication encryption system. A system master station protection module ensures the security of the a system master station by setting a security protection measures of the master station and setting network boundary security protection; a collection channel protection module adopts the GPRS access network protection, power information internal network protection, optical fiber special networkprotection and power line carrier protection, and adopts an identity authentication mechanism and a data encryption measure to improve the security protection ability of the collection equipment. By adoption of the information security protection authentication encryption method, a dynamic and sustainable overall security protection scheme is constructed to provide more reliable protection services for the intelligent network load interaction terminal information.
Owner:NARI TECH CO LTD +3

Virtual intelligent password key

The invention discloses a virtual intelligent password key which is characterized by comprising security design and logic design. The security design comprises the working processes of generating a random number via a security plug-in, and dispersing a data encryption key via an algorithm; encrypting data or a file needing to be encrypted by combining with an encryption key to form a data ciphertext, and storing the random number and the data ciphertext by a terminal; and when in decryption, according to the random number and equipment information, performing inverse operation of a symmetric algorithm on the data ciphertext in combination with the data encryption key to acquire a decrypted original file. The logic design can be divided into the following modules of initialization, right control, equipment management, application management, container management, file management and password security service. The virtual intelligent password key is used as sensitivity data of a mobile terminal, so that secure storage is also important; the encryption key dynamically generated by multiple factors is used for performing encryption protection; even the user leaks the file of the password key, the other people cannot decrypt either, and the storage security is ensured.
Owner:JIANGSU WAFA INFORMATION TECH

Method of checking producibility of a composite security design of a security document on a line of production equipment and digital computer environment for implementing the same

There is described a method of checking producibility of a composite security design of a security document, in particular of a composite banknote design, on a line of production equipment, the composite security design being the product of a combination of multiple sets of design features that are to be provided on a substrate as a result of a plurality of successive production operations carried out by means of the line of production equipment. The method comprises the steps of (a) providing digital design data representative of the composite security design of the security document, (b) modelizing, in a computer environment, the line of production equipment by means of which the composite security design is intended to be produced, (c) performing a computer simulation of production results of the plurality of successive production operations on the basis of the digital design data and the modelized line of production equipment, and (d) evaluating the computer simulated production results and determining, on the basis of these computer simulated production results, whether the composite security design can be produced on the line of production equipment.
Owner:KBA NOTASYS SA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products