Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

40 results about "Trade secret" patented technology

A trade secret is a type of intellectual property in the form of a formula, practice, process, design, instrument, pattern, commercial method, or compilation of information that is not generally known or reasonably ascertainable by others, and by which a person or company can obtain an economic advantage over competitors. In some jurisdictions, such secrets are referred to as confidential information.

Real-time auditing of covert data marks

A system and method is provided for the real time auditing of covert data marks. Specific information relating to a product or document is entered into an information cell or shell from a product data file. A high definition, high resolution, high speed inline video system is provided to take specific details from the individual product or document, which details are added to the data cell or shell. Details are then inspected, quality checked, matched in the event there are multiple identifiers (e.g., currency would normally carry two matching sequential numbers), and verified to the product order. This cell or shell is passed to the special design computer/controller through a high speed electronic interface. Information entering the computer/controller is once again verified and matched to the original data as well as the product or document. The cell or shell is converted into a specially created 2-dimensional bar code which is encrypted by the computer/controller and then transformed into a video rip. This video rip is sent to high quality/high resolution production print engines. The encrypted 2-dimensional bar code is imaged directly to the product or document as it is carried past the print imaging engines. The ink also is specially designed and manufactured for this system and process. It is an invisible ink which is unique, durable, permanent and not available commercially (covered under trade secrets). These special inks are well suited for delivery using inkjet technology to efficiently make well formed invisible images at slow to high speed production schemes. The product or document is then sent instantly into a drying scheme (this can be air, forced air, heat, UV Dryer, depending on the printing system selected). After drying there is a final scanning. This scanning equipment is the same scanner design which will be used in the field so that each product or document will be verified with the actual scanning device and programs which will be used in the field. From this final scanning of the 2-dimensional data bar code, a final audited product or document profile is created, as is a database which will be the point of reference in the infrastructure during the life of the product or document. Each time any product or document is scanned at a transaction point, the database will be updated, either in real-time or downloaded from a data collection scanning device. This will build a complete history from the point of manufacture to the moment it is removed from service.
Owner:COVERT SECURITY SOLUTIONS

Transaction security method, acceptance device and submission software

InactiveCN102262760AProtect account password securityImprove security and confidentiality functionsPayment architectureKey exchangeBluetooth
A transaction confidentiality method, acceptance device and submission software relate to the technical fields of finance, electronics, communication, software and information security. Trading institutions, especially banks' trading terminal equipment (such as ATM, POS) are equipped with wireless transaction acceptance devices. Customers use mobile phones to input transaction information (password and / or amount), and use short-range wireless communication (such as Bluetooth) to establish a confidential channel to send and submit; transaction acceptance The device is configured to automatically identify the HID keyboard, convert the transaction information to generate a key character code sequence, and transmit the simulated keyboard keys to the host of the transaction terminal device, which is equivalent to inputting from a physical keyboard; the key negotiation process bilaterally generates and exchanges random keys, and the transaction acceptance device Randomly generate or transform the exported key, and finally use it to encrypt and decrypt transaction information; limit the valid value range of the character code of the verification key, and shield and not pass invalid character codes; the mobile phone submission software also encrypts and transforms to prevent peeping, effectively protecting the account password; device system No changes to business processes are required.
Owner:杨筑平

Computer and office equipment provided with device with functions of preventing secret photography and preventing eavesdropping

The invention discloses computer and office equipment provided with a device with the functions of preventing secret photography and preventing eavesdropping, which relates to equipment, such as a notebook computer, a desktop computer, a pen based computer, a palm computer, relevant office equipment and the like. The computer and office equipment with the device with the functions of preventing secret photography and preventing eavesdropping comprises a casing of the computer and office equipment, a power supply circuit and a functional circuit. The computer and office equipment with the device with the functions of preventing secret photography and preventing eavesdropping is characterized in that a device system with the functions of preventing secret photography and preventing eavesdropping is arranged in the computer and office equipment, and the device system with the functions of preventing secret photography and preventing eavesdropping is connected with a mainboard of the computer and office equipment. By adding the warning system with the functions of preventing secret photography and preventing eavesdropping according to the computer and office equipment, the condition whether secret photography equipment and a detectaphone work at the periphery of a user or not can be automatically monitored, the information of reminding is also sent out to the user in time, and the influence of illegal secret photography equipment and an illegal detectaphone to the work and the life of people in the work and the life nowadays is solved. Meanwhile, the behavior of a competitor adopting some underhand means to carry out secret photography and eavesdropping so as to obtain the privacy of other people or the trade secret of an enterprise is effectively prohibited.
Owner:崔华

Method and system for managing commercial secret based on block chain negotiation encryption

The invention relates to a method and a system for managing commercial secret based on block chain negotiation encryption. A plurality of company legal persons and natural persons with different levels inside the company form N nodes; each time a contract is successfully signed, a record is constructed and a new block is formed; the block comprises a contract page label type and a contract sectiontype; the block also comprises a two-dimensional code generating module; when different nodes check, corresponding two-dimensional codes are generated for obtaining corresponding contract informationaccording to difference of jurisdiction of the different nodes to check the block; the contract page and the contract section character image regions with normalized size are subjected to uniform gridding coverage; the contract page and the contract section character images are divided into a plurality of attribute regions, wherein each small attribute calculating grid is a sub-qualitative mapping cluster; and the two-dimensional code of a corresponding content is generated according to the query jurisdiction type and the attribute of the sub-qualitative mapping cluster. The method and the system for managing commercial secret based on block chain negotiation encryption in the invention realize a new management mode in the commercial secret field, thereby significantly reducing the risk of leakage of the commercial leakage in the related contract signing process and reducing the occurrence of error rate; moreover, the accuracy rate aspect is greatly enhanced; the management efficiencyin the commercial secret contract field is enhanced; and the user experience is enhanced.
Owner:广州市溢信科技股份有限公司

A design method and device of an audit block chain in an energy internet

The invention provides a design method and device of an audit block chain in an energy network. The method comprises the steps of firstly defining the access policy according to the physical network of the pre-constructed audit block chain in the energy Internet; then using the access policy and the pre-designed smart contract to access the audit block chain, and pre-designing the smart contract based on the transaction business process of the energy Internet. The invention ensures the stable operation of the audit network, prevents the transaction data from being tampered with, and can realize the cross service across industries and regions. The technical proposal provided by the invention can ensure that the private secret data and the trade secret data cannot be tampered with, the transaction process can be traced, the audit service with public credibility is provided to the transaction organization and the supervision organization, and the safety of the energy internet transactionis ensured. The method provides the two-way accounting books, traces the flow of energy and financial assets, monitors illegal transactions in energy and financial assets, provides data validation services, confirms the integrity and validity of data, and provides data screening services to ensure the truthfulness and reliability of transaction reporting, clearing and settlement of confidential data.
Owner:CHINA ELECTRIC POWER RES INST +2

Anti-peeping lamp bank and display device

The invention discloses an anti-peeping lamp bank and a display device so that the display device has an anti-peeping effect and further protects individual privacy or trade secret of a user. The anti-peeping lamp bank comprises a heat radiating lamp holder, a lamp bar and a lamp shade, wherein the lamp bar and the lamp shade are fixed on the heat radiating base, wherein the lamp cover is arranged on the lamp bar in a covering manner, and is provided with a narrow slit opened along a length direction of the lamp bar; an included angle is formed between light rays ejecting from the narrow slit by the lamp bar and a screen of a display module. The anti-peeping lamp bank provided by the embodiment of the invention and structural members such as the display module and a housing are assembled, the included angle is formed between the light rays ejecting by the anti-peeping lamp bank and the screen of the display module, and the light rays reject from the display module after being reflected between a first total reflection plate and a second total reflection plate. When a user peeps the screen from the side surface, eyes are irradiated by ejected bright light, so that contents of the screen can not be seen, thus the display device can have a better anti-peeping effect, and the individual privacy or trade secret of the user is effectively protected.
Owner:BOE TECH GRP CO LTD +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products