Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

47 results about "Unsafe environment" patented technology

Secure two-party collaboration SM2 signature method

The invention provides a secure two-party collaboration SM2 signature method consisting of steps of system initialization, negotiation generation of a signature public key, collaborative signature andoutput of a complete signature. According to the secure two-party collaboration SM2 signature method provided by the invention, prior to the negotiation of the signature public key and the collaborative signature, the both communication parties authenticate the identity of the opposite party by using the zero knowledge proof technology, the correctness of outputting the complete signature is ensured by using the promise technology, it is ensured that the first communication party does not need to decrypt a received ciphertext by using the homomorphic encryption technology, the operation of the corresponding ciphertext can be realized, and a timestamp mechanism is added to ensure that the both communication parties can output the complete signature only when the identity of the first communication party, the current time and the position information of the first communication party are consistent, so that the security of the system is greatly improved, the loss caused by the leakage ofa signature private key is reduced, and the man-in-the-middle attack can be prevented. The secure two-party collaboration SM2 signature method provided by the invention has higher security and can beused in an environment in which a communication channel is not safe.
Owner:SHAANXI NORMAL UNIV +1

Annular steel structure supporting construction method with open type TBM (tunnel boring machine)

An open state is formed behind a shield of an open type TBM (tunnel boring machine), so that bolting and shotcreting with wire mesh and the like can be realized, when unfavorable geological conditions such as crushed zones are encountered, broken surrounding rock collapses and falls, which not only threatens the safety of operating personnel and equipment, but also greatly lowers the construction efficiency. The invention discloses an annular steel structure supporting construction method with the open type TBM. The supporting TBM is provided with a shield which has an annular steel structure installation space. When the unfavorable geological conditions are encountered, the annular steel structure can be fast erected in an assembly line mode under the protection of the shield, the shield is replaced with the annular steel structure for supporting the surrounding rock as the TBM tunnels; under the protection of the annular steel structure, an annular steel grating and a steel mesh hollow structure are used for carrying out the bolting and shotcreting supporting and the like, the previous extensive construction is changed to controllable standardized operation, the original open type unsafe environment is changed to a closed protected operation zone; the construction method disclosed by the invention is different from the passive supporting which is carried out after the surrounding rock collapses and falls; the annular steel structure actively close off the broken surrounding rock, then the surrounding rock becomes a part of the supporting structure, the work amount for backfilling concrete and removing slag is greatly reduced, and thus the method is more efficient and safer, the cost is reduced and the operation is easy to realize.
Owner:王静

Cryptography attribute-based access control method and system based on dynamic rule

The invention relates to a cryptography attribute-based access control method and system based on a dynamic rule, mainly belonging to the technical field of information. In the cryptography attribute-based access control system based on the dynamic rule, protected objects are stored in a encrypted form, and only the requests satisfying the requirements of access policies in the attribute-based access control can be authorized to decrypt the objects, therefore, it can be ensured that data in an unsafe environment can be accessed with authorization according to a security policy, and meanwhile,the extensibility of the policies and the dynamic acquisition of the attributes are also supported. The cryptography attribute-based access control method and system based on the dynamic rule are divorced from the traditional encryption system framework, and are a new attribute-based access control model, method and system supporting the cryptography decision. The cryptography attribute-based access control method and system based on the dynamic rule can achieve more secure, diversified, dynamic and flexible access authorization, which are suitable for large-scale organizations or informationsystems, and can be applied to the environments such as cloud computing, grid computing, distributed computing, and so on.
Owner:UNIV OF SCI & TECH BEIJING

Mobile storage medium management method and mobile storage medium management device

The invention discloses a special formatting method and a special formatting device for mobile storage equipment, and aims to solve the problem that data of mobile storage equipment leak in an unsafe environment. The mobile storage equipment comprises first system data and second system data. The special formatting method for the mobile storage equipment comprises the following steps of judging whether redirection operation is performed only or not, judging whether the current environment is a safe environment or not if the redirection operation is not performed only, prompting that special formatting cannot be carried out if the current environment is not safe, and then quitting; constructing and updating the first system data of the mobile storage equipment; judging whether the redirection operation is performed only or not, formatting the mobile storage equipment if the redirection operation is performed only, then performing redirection operation on the first system data and the second system data of the mobile storage equipment, and quitting; performing redirection operation on the first system data if the redirection operation is not performed only, setting an encryption completion status, setting an encryption key, formatting data of various partitions of the mobile storage equipment, and performing redirection operation on the second system data of the various partitions.
Owner:北京明朝万达科技股份有限公司

Closed space device inspection method and apparatus

The embodiments of the present invention disclose a closed space device inspection method and device. According to the closed space device inspection method and apparatus of the invention, point clouddata collection is performed on devices in different regions in a closed space; after splicing and de-noising processing is performed on the point cloud data of the devices in each region, and the de-noised point cloud data are matched with each point cloud data model in a point cloud data model library, so that the first attribute information of each device, which is represented by the de-noisedpoint cloud data, can be determined; the de-noised point cloud data and the first attribute information are saved in an associated manner; the de-noised point cloud data are compared with historicalpoint cloud data associated with the first attribute information, so that abnormality analysis can be performed on the devices which are represented by the de-noised point cloud data; and therefore, the automatic inspection of the devices in the enclosed space can be realized, the inspection efficiency of the devices in the enclosed space can be improved, and the probability that inspection personnel are exposed to an unsafe environment such as lack of oxygen and water can be lowered.
Owner:STATE GRID INTELLIGENCE TECH CO LTD

Method and equipment for transferring multi-channel information into single channel safety information

The invention relates to a method and to an apparatus, which has been adapted to carry out the method, for the coupling of a safety-critical process from a safe environment, which has at least two redundant processing channels, to an environment which is not safe or to an environment which is safe but has fewer processing channels. To this end, provision is made of a method which processes a data record which is relevant to the safety-critical process, in particular on a protocol-specific basis, to form a respective safe protocol ( 14, 24 ) using at least two redundant processing channels ( 1, 2 ) in accordance with identical laws, and forms a common safe protocol taking into account at least two redundant safe coupling protocols ( 14, 24 ), to be precise by accessing a common (buffer) register ( 30 ) using each of the processing channels ( 1, 2 ), in which case a write authorization is allocated only once for each register location, and, when writing at least elements ( 14 ') of the common safety-based protocol using a processing channel ( 1 ) with write authorization, at least one further processing channel ( 2 ) is first of all used to check ( 25 ) whether these elements ( 14 ') are identical to one another, and access to the common buffer register for the purpose of storing these elements is enabled only when they are identical to one another.
Owner:PHOENIX CONTACT GMBH & CO KG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products