Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

39results about How to "Absolute security" patented technology

Inherent safety pool case combination low-temperature stack nuclear heating station apparatus and operational procedure thereof

InactiveCN101441902AIncreased average volume specific powerReduce initial loadIntegral reactorsNuclear energy generationInherent safetyPressurized water reactor
The present invention provides an inherent security pool-shell combination low temperature nuclear heating device and an operation program thereof, which belongs to nuclear energy centralized heat-supply field. The invention mainly comprises the following procedures: adopting separated layout, forced circulation and high effective small temperature difference heat exchange in primary loop of reactor; under the precondition that parameter requirements of centralized heat-supply by big cities heat supply network satisfied, reducing work temperature of shell-type heating reactor as far as possible; meanwhile optimized layout of equipment, and organic combination of normal pressure pool in large volume (47) and shell-style heating reactor(29) remove accident possibility of water loss and coldness loss of reactor core (1). Complete inherent safety principle is carried out in the invention. Thus, absolute security of nuclear heating can be guaranteed by using mature pressurized water reactor technology, and enterprises have develop nuclear station pressurized water reactor experience can possibly jump over research and develop stage and enter into nuclear heating market directly, and make a real contribution for energy-saving and emission-reduction and improving country energy structure.
Owner:肖宏才

Automatic screening and propelling method and system with high matching degree for managing user and confidential information

The invention provides an automatic screening and propelling method and system with a high matching degree for managing a user and confidential information. The method comprises the following steps: a step A: self-defining and screening out a target option to be screened according to a screening model of the target option; a step B, establishing a first scoring mechanism of the screening model for scoring the target option to be screened; a step C: capturing the information associated with the target option from a first database according to the scored result, and showing the scored information from high to low in sequence according to the scores; and a step D: propelling the user information to the selected target option according to the self-defined propelling mechanism. According to the automatic screening and propelling method and system provided by the invention, the conational screening tool is improved; the user-defining and quantifying function is additionally added; self-defining treatment to a plurality of objects on the basis of protecting information privacy is carried out; and all operation processes and data are stored in the central database of the system. The automatic screening and propelling method and system are suitable for high-precision matching of market development, company merger and acquisition, investment banking and commercial procurement, and even a plurality of fields such as personal employment and education, marriage dating and the like.
Owner:GEBO INFORMATION TECH SUZHOU

True random password generation device based on vertical cavity surface emitting laser

ActiveCN106301754ACreate a new field of applicationAvoid the "Electronic Speed ​​Bottleneck" ProblemKey distribution for secure communicationDigital data processing detailsVertical-cavity surface-emitting laserDriving current
The invention provides a true random password generation device based on a vertical cavity surface emitting laser. A driving current source loads a periodic electric signal to the vertical cavity surface laser, and the vertical cavity surface laser is periodically turned on and off to acquire a periodic laser signal. A noise signal source loads a noise signal to the vertical cavity surface emitting laser to form weak perturbation on the periodic electrical signal amplitude. The vertical cavity surface emitting laser periodically and randomly keeps in an x or y polarization mode. Random polarization laser emitted by the vertical cavity surface emitting laser enters a polarization beam splitter through a polarization controller. The polarization controller is adjusted, so that the polarization laser coincides with two orthogonal base vector directions of a crystal in the polarization beam splitter. The polarization laser is divided into two ways by taking two orthogonal base vector directions as reference, wherein x polarization laser is output in one way, and y polarization laser is output in the other way. Two laser signals in a single polarization mode are two complementary true random password sequences. The response time of the device is up to 100 fs. The device has the ability to produce true random passwords of dozens or even hundreds of Gbit/s in real time to ensure the safety of digital communication.
Owner:TAIYUAN UNIV OF TECH

Router with hardware encryption and decryption function and encryption and decryption method of router

ActiveCN105357218AHigh speed and efficient forwardingEncryption and decryption high speedSecuring communicationComputer hardwarePlaintext
The invention provides a router with a hardware encryption and decryption function and an encryption and decryption method of the router. The router includes a routing function module and a field programming gate array-based hardware encryption and decryption module, wherein the routing function module and the field programming gate array-based hardware encryption and decryption module are connected with each other; the hardware encryption and decryption module encrypts plaintexts received by the routing function module from the outside or decrypts ciphertexts received by the routing function module from the outside; and the routing function module transmits out encrypted data generated by the encryption of the hardware encryption and decryption module or decrypted data generated by the decryption of the hardware encryption and decryption module through a wireless channel. In a work process, the routing function module of the router is not utilized to encrypt or decrypt the received plaintexts or ciphertexts, but the hardware encryption and decryption module is utilized to realize encryption and decryption, and therefore, the router can perform high-speed safe hardware encryption on the received plaintexts or ciphertexts, and at the same time, high-speed and effective forwarding of the encrypted data and the decrypted data of the router can be ensured.
Owner:台州市吉吉知识产权运营有限公司

Quantum entanglement teleportation-based spinal cord injury nerve signal relay system and method

The invention discloses a quantum entanglement teleportation-based spinal cord injury nerve signal relay system and a quantum entanglement teleportation-based spinal cord injury nerve signal relay method, and mainly solves the problem that the spinal cord injury of a human body is not easy to repair. The method comprises the following implementation steps: irradiating pumping light on barium metaborate crystals to generate an entanglement photon pair consisting of a first photon (2) and a second photon (3), and respectively distributing the entanglement photon pair to an upper breaking point J of a spinal cord injury and a lower breaking point K of the spinal cord injury; and performing Bell states measurement on a damaged neuron cell state |phi)>1 and the first photon (2) to obtain the quantum state |phi<+>>12 of a Bell state 1, the quantum state |phi<->>12 of a Bell state 2, the quantum state |psi<+>>12 of a Bell state 3 and the quantum state |psi<->>12 of a Bell state 4, wherein a completely repaired damaged neuron cell is obtained by transmitting any quantum state to the lower breaking point K of the spinal cord injury and performing unitary transformation on the second photon (3) according to the transmitted quantum state, so that spinal cord injury nerve signals are relayed. The system and the method are convenient to operate and high in safety, and can be used for repairing the spinal cord injury nerve signals of the human body.
Owner:XIAN UNIV OF POSTS & TELECOMM

Skiing implement having a simplified structure

A skiing implement having a simplified structure, comprising an elongated frame which defines, in a central portion, supports for the feet of a user and, at the front end, a head tube for rotary engagement with a steering column; there are also provided a front ski, which is connected to the lower end of the column, and a rear ski, which is connected to the rear end of the frame; the skis are connected so that they can oscillate about substantially horizontal axes.
Owner:EASY SKI BIKE

Network real-name authentication method and system

InactiveCN111200617AAccurately judge the authenticity of identityAccurate verification of identity authenticityUser identity/authority verificationEngineeringInformation security
The invention relates to the field of network and information security, and in particular relates to a network real-name authentication method and system in the field of network and information security. The network real-name authentication system disclosed by the invention comprises an authentication terminal and a real-name authentication server, wherein the authentication terminal is used for compiling a password for an identity authentication digital signature, and the real-name authentication server is used for controlling access of remote network resources and providing comprehensive real-name authentication and auditing services. According to the invention, the authentication terminal is provided with a microprocessor for receiving a dynamic password sent by the real-name authentication server; the method comprises an operation rule key, a fingerprint key, a memory identity identification rule key and identity authentication fingerprint identity authentication; an instruction secret key signature module and a dynamic password operation digital signature compile a password, and send the password to the real-name authentication server to decrypt and restore the dynamic password, so as to accurately confirm the mutual identity authenticity real-name authentication of the operation rule key and the fingerprint key network activity personnel, and ensure the absolute securityof network resource authorized access.
Owner:BEIJING PASSWORD TECH

Computer information safety control system

InactiveCN101414336AAbsolute securitySolve the problem of mutual control between applicationsInternal/peripheral component protectionSecuring communicationPower controlEncryption
The invention belongs to the field of computer information security control, and more particularly relates to a computer information security control system which comprises a relay drive part, a computer network control relay, a computer power control relay, a computer power, a microprocessor and an interface conversion part; one circuit of the output port of the microprocessor is connected with a user computer by the interface conversion part; another circuit of the output port of the microprocessor is connected with the input port of the relay drive part; one circuit of the output port of the relay drive part is connected with the input port of the computer network control relay and another circuit of the output port of the relay drive part is connected with the input port of the computer power control relay; the computer power control relay is used for controlling the encryption on the secret HD of the computer; the computer network control relay is used for controlling the on-off of a computer network. The computer information security control system can effectively ensure the absolute security of the information of the user computer.
Owner:吴晓明

Fingerprint identity recognition system and method for finger print image setting and verification

The present invention discloses a fingerprint identity recognizing system and a setting and recognizing method of fingerprint identity image thereof. The recognizing method comprises the following steps: activating power source for entering a fingerprint identity recognition reminding information interface; sensing the fingerprint by a fingerprint recognizing sensor for obtaining fingerprint image information; comparing the fingerprint image information with fingerprint identity recognizing image information, confirming the matching of fingerprint image information and the fingerprint identity recognizing image information with each other, and finishing the identity recognizing. The fingerprint identity recognizing method provided by the invention guarantees the absolute safety of user in using the electronic product and has the advantage of simple operation through adopting a mode which comprises the following steps: sensing the fingerprint with the fingerprint recognizing sensor for obtaining fingerprint image information; comparing the fingerprint image information with fingerprint identity recognizing image information, confirming the matching of fingerprint image information and the fingerprint identity recognizing image information with each other, and finishing the identity recognizing.
Owner:KONKA GROUP

Device for aircraft simulation catapulting test

The invention relates to the field of aircraft simulation catapulting tests, specifically to a device for an aircraft simulation catapulting test. The device for the aircraft simulation catapulting test comprises a control cabinet, a test frame and a platform truck, wherein the control cabinet is used for controlling; the test frame is matched with the control cabinet; the platform truck is arranged at the lower end of the test frame; a hooking device used for hooking an aircraft is arranged on the test frame; a simulation device used for realizing the aircraft simulation catapulting test is also arranged on the test frame; and a hydraulic system and a pneumatic system which are used for realizing hydraulic and pneumatic functions are embedded in the control cabinet. A foundation bolt is poured with ground cement to realize the stability of the test frame during testing; and meanwhile, the stability is improved under the coordination of a shock absorption mechanism so that the absolutesafety in the testing process is guaranteed; in order to limit the contracting velocity of an acting cylinder, the stability, safety and reliability of the acting cylinder in the whole contracting process can be guaranteed under the coordination of a throttle valve.
Owner:芜湖航翼集成设备有限公司

Real estate data encryption system based on quantum communication

The invention relates to the technical field of quantum communication, particularly a real estate data encryption system based on the quantum communication. The system comprises an information collection and transmission module and a data storage management and control module. The information collection and transmission module comprises a collection tool, a database server and a quantum server. The collection tool and the quantum server are connected through two channels. The quantum server is connected with the database server. The data storage management and control module comprises a KMS quantum key management server, the quantum server and a client side for searching real estate information. The database server and the client side are connected through the two channels. Quantum gateways are connected with the KMS quantum key management server. The quantum gateways are connected with the quantum server. According to the real estate data encryption system based on the quantum communication, the information is prevented from being leaked unconsciously and accidently, and if the information is artificially leaked, tracing can be carried out after the event, and a person in charge can be confirmed.
Owner:浙江神州量子通信技术有限公司

Blow-Fill-Seal Fully Automatic Aseptic Production Process for Water Needle Injection

ActiveCN105291406BDoes not affect taking medicineImprove the shortcomings of not being easy to punctureBottle-handling machinesLiquid bottlingPunchingBottle
The invention discloses a full-automatic aseptic production technology for blowing, filling and sealing of a water needle injection medicament. The full-automatic aseptic production technology comprises the production technology steps that firstly, raw materials are sterilized; secondly, impurity removing is conducted on the raw materials; thirdly, material melting is conducted; fourthly, filling and forming are conducted; fifthly, die opening is conducted; sixthly, punching and slitting are conducted; and seventhly checking is conducted. The materials are sterilized and disinfected in the heating step and the material melting step in the production technology, and the use risk of the materials is lowered; during forming and filling, extruding, bottle blowing, local cooling, filling, sealing and die opening are conducted, blowing, filling and sealing are combined, the bottle forming time is short, pollution to liquid medicine from microorganisms and particles in air in a sealed environment is avoided, and especially the defect of a traditional mode is overcome through the ultra-low-temperature filling technology. Meanwhile, aseptic air is used in the whole process, pollution of microorganisms in air is effectively avoided, and medicine quality is ensured greatly.
Owner:HUBEI KELUN PHARMA

Back-clamp-type facing wallboard locking device

The invention belongs to the technical field of facing wallboard installing, and particularly discloses a back-clamp-type facing wallboard locking device. The back-clamp-type facing wallboard lockingdevice comprises an upper clamping piece and a lower clamping piece, the outer end of the upper clamping piece is turned towards one side of a facing wallboard or straightly extends to form an upper clamping sheet, and the upper clamping sheet is embedded into an upper groove in the back face of the facing wallboard; the outer end of the lower clamping piece is turned towards one side of the facing wallboard or straightly extends to form a lower clamping sheet, and the lower clamping sheet is embedded into a lower groove of the back face of the facing wallboard; the upper clamping piece and the lower clamping piece are fixed with a bolt through a structural supporting point, and the upper clamping sheet is matched with the lower clamping sheet to clamp the facing wallboard. The back-clam-type facing wallboard locking device adopts a back-clamp mode, short grooves are formed in the back face of a decorating material, and correspond to form two parallel faces or wedge-shaped, the clamping sheets enter the grooves, anti-drawing force is formed through friction force generated by clamping force of the clamping pieces, and the safety of the decorating material is guaranteed.
Owner:杨义生 +1

Network real-name authentication method and system

InactiveCN111245865AAccurately judge the authenticity of identityAccurate verification of identity authenticityUser identity/authority verificationInternet privacyDigital signature
The invention relates to the field of network and information security, in particular to a network real-name authentication method and system in the field of network and information security. The system used by the network real-name authentication method disclosed by the invention comprises an authentication terminal and a real-name authentication server. The method comprises the following operation steps: an identity identification rule secret key operation step; a step of identity authentication fingerprint operation; a step of human behavior operation; and a step of performing network real-name authentication operation through a identity identification rule key, an identity authentication fingerprint and human behaviors. According to the invention, an identity identification rule key, an identity authentication fingerprint and human behaviors are adopted, rule keys and a fingerprint key of the authentication terminal, a memory identity identification rule key, identity certificate fingerprint identity authentication and a dynamic password digital signature compilation cipher are operated, the cipher is sent to the real-name authentication server to decrypt and restore a dynamicpassword to perform real-name authentication, and absolute security of network resource authorized access is effectively guaranteed.
Owner:BEIJING PASSWORD TECH

Password compiling method based on authentication terminal

InactiveCN111200616AAuthentic and reliable authenticationAbsolute securityUser identity/authority verificationFingerprintInternet privacy
The invention relates to the field of network and information security, and in particular relates to a password compiling method based on an authentication terminal in the field of network and information security. The method comprises the operation steps of authenticating terminal operation, identity identification rule secret key operation, identity authentication fingerprint operation, human behavior operation, and password compiling through the authentication terminal, the identity identification rule key, the identity certificate fingerprint and the behavior of the person. According to the password compiling method based on the authentication terminal, which is provided by the invention, the authentication terminal compiles a password based on the operation rule key and the fingerprint key through a microprocessor, the memory identity identification rule key and the identity certification fingerprint identity authentication and dynamic password digital signature; mutual identity authenticity of network activity personnel who compile the password operation rule key and the fingerprint key can be accurately confirmed; real and reliable identity authentication is realized; and absolute security of network resource authorized access is guaranteed.
Owner:BEIJING PASSWORD TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products