Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

64 results about "Security specification" patented technology

Waist type wearable indoor mobile positioning terminal

The invention provides a waist type wearable indoor mobile positioning terminal which comprises a power supply module, an ultra-wide bandwidth (UWB) locating module, a Bluetooth transmission module, a Zigbee transmission module, an inertial navigation module, an information processing module and a locating waist, wherein the UWB locating module is in two-way connection with the Bluetooth transmission module; the inertial navigation module is in two-way connection with the Zigbee transmission module; the Bluetooth transmission module and the Zigbee transmission module are respectively connected with the information processing module; the information processing module is arranged on the locating waist; the power supply module is used for supplying power for the other modules in the terminal. According to the waist type wearable indoor mobile positioning terminal, UWB locating and inertial navigation locating are fused and integrated into a special locating routing inspection waist, and a sound-light alarm signal can be sent out when the mobile positioning terminal enters a dangerous zone mistakenly; a wearable device which is in accordance with electric power security specification, is convenient to carry and is integrated with a high-accuracy wireless positioning technology is formed; after the waist type wearable indoor mobile positioning terminal is adopted, workers in the dangerous zone in a room can be conveniently and accurately located, so that the personal safety is guaranteed.
Owner:STATE GRID CORP OF CHINA +2

Computer-vision-based security detection method

The invention discloses a computer-vision-based security detection method, which is used for meeting the requirements of current security detection on persistence and high accuracy. The method comprises the following steps: performing original image gray processing on original video data, performing color space standardization on an input image, and regulating the contrast of the image to reduce the influence of a local shadow of the image and an illumination change and suppress the interference of noise; describing characteristics of a pedestrian by virtue of a gradient histogram, classifying by combining an SVM (support vector machine), analyzing a behavior of the pedestrian by virtue of deep learning after the pedestrian is found out, and sending security alarming information if the behavior of the pedestrian is inconsistent with a security specification. According to the method, existing hardware equipment can be fully utilized, so that changes in an original system are maximally reduced. Moreover, more image details can be understood by deep learning, so that a higher recognition rate is achieved. A deep learning neural network is less sensitive to the environment, light and noise, and can run in each environment after being trained once, so that high generalization capability is achieved.
Owner:NANJING UNIV OF POSTS & TELECOMM

Method and system for internal security management and control of enterprise data

ActiveCN107944284AAbnormal behavior can be traced backEnsure safetyDigital data protectionOpen dataConfidentiality
The present invention discloses a method and a system for internal security management and control of enterprise data. The method disclosed by the present invention is based on a full-service unifieddata center built by an enterprise cloud platform, the full-service unified data center comprises structured data in a unified view area and in a digital warehouse area, and after carrying out actualoperating environment risk analysis on the structured data, from the perspective of the security lifecycle, the entire data protection security specification is formulated; based on the security specification, the LabelSecurity security tag mechanism is enabled on the enterprise cloud platform, and the data access levels of the enterprise cloud platform are divided into four levels of confidentiality of open data, internal data, secret data and confidential data by the security tags; and through the LabelSecurity access mechanism, different effective security control strategies are implementedfor different columns of the data in the same table. According to the method and system disclosed by the present invention, secure tracking and management and control of the service data within the life cycle is ensured; and at the same time, a friendly visual operation is ensured during the entire data management and control process.
Owner:ELECTRIC POWER RES INST OF STATE GRID ZHEJIANG ELECTRIC POWER COMAPNY +1

Method for estabilishing Web service security analysis model based on program slice

The present invention relates to a software establishing technique and network security, and specifically to a method for establishing the Web service security analysis model based on the program slice. The invention provides a method for establishing Web service security analysis model based on program slice for protecting the key information and the common information in the network service from the inside and the outside and increasing the network service security. The method of the invention adopts the following technical solutions: 1) establishing a slicer module for obtaining the abstract of the information flow in the Web service realizing code; 2) establishing a network service analysis module for discovering the safety breaking state that the key information is leaked to the Internet user through the current service interface, wherein the step comprises the safety analysis of the independent network service and the safety analysis of the network service network; and 3) establishing a safety reporting module for analyzing the result based on the module, and combining the safety measures presented in the existing Web service security specification and process for generating a corresponding security report. The method of the invention is mainly used for providing the Web service security.
Owner:江苏永达电力电信安装工程有限公司

Motor employing immersion type evaporative cooling and structure optimization method thereof

The invention discloses a structure optimization method for a motor employing immersion type evaporative cooling. The method comprises the following steps of: correspondingly reducing the thickness of a main insulating layer of a stator by 50 to 60 percent, and correspondingly improving the current density of the stator by twice to 2.5 times by taking an air-cooled motor with the same voltage grade and the same capacity as a reference; and obtaining the minimum shape data of each part structure according to combinational calculation results obtained by different values of each parameter on the basis of the thickness of the main insulating layer of the stator and the current density of the stator under conditions which are consistent with security specifications about the motor in national standard, wherein the parameters comprise air gap flux density, the number of turns of a stator winding, the internal and external diameters of the stator and a rotor, and the heights and widths of a stator slot and a rotor slot. By the method, the advantages of an immersion type evaporative cooling technology are fully utilized, the overall dimensions of the motor and each main part are greatly reduced under the same voltage grade and the same capacity, and manufacture cost is decreased. On such a basis, the invention also provides the motor employing the immersion evaporative cooling.
Owner:MCC XIANGTAN HEAVY IND EQUIP

Method for implementing parameter synchronization of integrated power information buses

Disclosed is a method for implementing parameter synchronization of integrated power information buses. According to requirements of security specifications, software application systems in a power system need to be distributed in safety production area and a safety management area, which are isolated by a physical unit. Data exchange buses implemented by an SOA (service oriented architecture) are distributed in one safety area, a double-bus server configuration scheme is used in a practical project, and accordingly the power information data exchange buses are inevitably distributed on a virtual integrated bus formed by four buses of four bus servers by crossing the safety area, and effective and reliable synchronization of bus configuration parameters of the four bus servers is a must. By the method using the comprehensive scheme of cross-area synchronization, network synchronization and single-unit synchronization, reliable parameter synchronization of integrated power information buses is effectively achieved. The method is widely applicable to the field of integration of power software application systems in nation, networks, provinces, cities and counties of China, and also applicable to the field of software integration, except for power systems, requiring isolation and data exchange.
Owner:ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID CO LTD +1

Audiovisual APP security and service compliance automatic detection system and method, and medium

The invention discloses an audio-visual APP security and service compliance automatic detection system, which comprises an APP software package uploading module, a security detection module, a service compliance detection module and a detection report management module, and is characterized in that the APP software package uploading module is used for providing a to-be-detected APP software package uploading service; and the security detection module is used for providing an APP security detection service, and detecting basic information, malicious behaviors, security specifications, dynamic security and vulnerability and risk prevention to obtain a security detection result; the service compliance detection module is used for carrying out standardization detection, soft terminal validity detection, user use behavior detection and video and audio decoding capability detection on an APP to obtain a compliance detection result, and the detection report management module is used for generating a detection report according to the detection results of the APP security detection module and the service compliance detection module. The safety condition and the content compliance condition of the audio-visual APP are automatically detected through different dimensions, and a detection report is generated, so that the detection efficiency is improved.
Owner:北京中微云安信息科技有限公司

Hoisting system and method for hoisting high and large anaerobic jar body through low davit group

The invention provides a hoisting system and method for hoisting a high and large anaerobic jar body through a low davit group. The hoisting system comprises an anaerobic jar foundation, wall boards, davits, davit lugs, wall board lugs and electric chain blocks. The tops of the davits are provided with lifting lug mounting slots vertically in a cut mode. The davit lugs are inserted into the lifting lug mounting slots. The davit lugs are provided with davit lug holes. The wall board lugs are provided with wall board lug holes. The electric chain blocks and the davits are identical in number. The electric chain blocks are hung between the davits and the wall boards. One end of each electric chain block penetrates through the corresponding davit lug hole, and the other end of each electric chain block penetrates through the corresponding wall board lug hole. According to the hoisting method, an inverted hoisting manner is adopted. The hoisting system meeting the hoisting security specifications and regulations is adopted to conduct inverted construction. The hoisting system is convenient, fast and safe to use. It can be effectively guaranteed that the jar body is stably lifted up by lifting the jar body just by the height of a circle of the wall boards every time. The cost is lowered. The construction cycle is shortened. The environment is protected. Green construction and almost zero emission are realized. The construction quality is improved. Welding operations are all conducted on the ground.
Owner:BEIJING URBAN CONSTR SIXTH GRP

Security-critical software verification method and device, equipment and medium

The invention belongs to the technical field of software test verification, and provides a security-critical software verification method and device, equipment and a medium. The method comprises the following steps: expanding an FTA model based on an LTL language to obtain a formalized system security constraint condition and a corresponding software demand specification; matching the software requirement specification with a software specification symbol of the MBD according to a pre-formulated conversion rule, so that the software requirement specification is converted into a security specification model; and inputting the security protocol model and the pre-generated SCADE software design model into a model verifier to complete security verification of the software. By adopting the technical scheme of the embodiment of the invention, the security constraint condition and the software requirement specification corresponding to the security constraint condition are enabled to meet the formalized characteristics through extension of the LTL language, and meanwhile, the software requirement specification can be converted into the security specification model according to the pre-formulated conversion rule, and the security specification model is input into the model verifier for verification; the interference of human factors in a safety verification method is avoided, and the reliability is improved.
Owner:中航机载系统共性技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products