Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

44results about How to "Achieve data security" patented technology

Protection method for confidential files

The invention discloses a protection method for confidential files and uses the sandbox principle for reference. When downloading files through a client program of a file management software, a user redirects the downloaded files into a virtual disk of a client computer and conducts all operations of scanning and editing files in the virtual disk; the modified and newly-created files during the file operation process are controlled to be redirected into the virtual disk and the courses not performed the redirected control are forbidden to access to the virtual disk; and finally, the edited files are uploaded to a server from the virtual disk to complete a process of file modification. The user can normally use the files in the virtual disk, but cannot copy or dump the files out, and the virtual disk is like a sandbox only importing but not exporting. The security software developed by using the method can be integrated with the file management software of a third party, so as to realize secure use and anti-disclosure of the confidential files on the client computer and improve the level of data security management of the user.
Owner:南京赛孚科技有限公司

RFID (Radio Frequency Identification Device) data transmission and authentication system and method

The invention discloses an RFID (Radio Frequency Identification Device) data transmission and authentication system and method. The RFID data transmission and authentication system comprises a checking reader-writer system at a user terminal and a background checking server system, wherein the checking reader-writer system at the user terminal comprises a checking reader-writer and an electronic tag; and the background checking server system comprises a checking server and a data center. Based on the data transmission and authentication system, the RFID data safe transmission and authentication method comprises the steps of a preparation stage of the electronic tag and a radio frequency identification field stage of the electronic tag. According to the RFID data transmission and authentication system and method, by using an electronic tag sleeping technology and combining with a private key encrypted EPC (Electronic Product Code), checking reader-writer identification and background server authentication as well as matching with a passive ultra-high frequency electronic tag, practicability for various kinds of special application occasions is enhanced, the security of target information is effectively protected, application cost is lowered, and RFID data security and a function of anti-counterfeiting identification are realized.
Owner:UNIV OF ELECTRONICS SCI & TECH OF CHINA

Method for realizing secure transmission of data in cloud storage system

The invention provides a method for realizing the secure transmission of data in a cloud storage system. According to the method, when in the actual data transmission, the data are subjected to encryption through a symmetric algorithm or an asymmetric algorithm according to the size of the transmitted data volume; when mass data are transmitted, the data are subjected to encryption and decryption through the symmetric algorithm in order to ensure the throughput; and when a small amount of data are transmitted, the data are subjected to encryption and decryption through the asymmetric algorithm. The method is applied in the cloud storage system, so as to ensure the security of the data when the data are transmitted between a user and a cloud storage service system, thereby ensuring the privacy of the data of the user and realizing the real data security.
Owner:LANGCHAO ELECTRONIC INFORMATION IND CO LTD

Data safe transmission system and method based on electronic tag

The invention provides a data safe transmission system and method based on an electronic tag. The method comprises the steps of electronic tag generation and electronic tag identification. The generation step of the electronic tag is used for generating the electronic tag. Under the sleep condition of the electronic tag, requirements of any readers can not be responded, information of the electronic tag is prevented from being pried upon by illegal readers, a legal reader sends a sleep release code to a radio frequency electronic tag to attempt to activate the sleep tag to read tag data, after the tag data are successfully read, and the tag data and an identify identification code are together uploaded to a verification server. The identification step of the electronic tag is mainly used for reading encryption information of the electronic tag, and identifying the electronic tag through the encryption information. Through identification and verification of the electronic tag, safety of data transmission is effectively protected.
Owner:张家港市速达电子商务有限公司

Blockchain-based data traceability and strong encryption method, device, medium and system

InactiveCN108449336AGuarantee data privacy and securityStrong Encryption ImplementationTransmissionBlockchainData security
The invention relates to the field of blockchain technology applications, and discloses a blockchain-based data traceability and strong encryption method and device, a medium and a system. The methodincludes the following steps: acquiring user registration information, generating a user authorization code and a query key according to the registration information, and returning the data back to users; receiving data upload requests of the users, and then receiving encrypted data I uploaded by the users who pass the verification; performing data sharing on the encrypted data I, recording and encrypting operation information and attribute information of all users on the encrypted data I to form encrypted data II, adding the encrypted data II to a block, calculating the encrypted data II by using different consensus algorithms according to application scenario requirements, and then writing the calculated encrypted data II to a blockchain; and receiving a user query request, performing identity authentication according to the query key, and providing blockchain query and download permissions for the users who pass the authentication to achieve data traceability. According to the scheme of the invention, the users can benefit from added values brought by shared data, and can also enjoy complete data privacy and data security.
Owner:ZHEJIANG CHUANGLIN TECH CO LTD

Resource management method and system for data analysis and readable storage medium

The invention discloses a resource management method and system for data analysis and a readable storage medium. The method comprises the steps that a resource manager detects that corresponding usershave no reusable parser according to a code execution request which is sent by a scheduler, the resource use condition of the users and the total resource use condition of a big data platform are acquired, and according to the resource use condition of the users, the total resource use condition and resources which are applied by the users, whether or not the users have application permissions for applying new parsers is determined; if yes, the new parsers are distributed to the users according to the application permissions, and identification information of the new parsers is sent to the scheduler; the scheduler sends an execution request to the big data platform through a remote service manager and the new parsers according to the received identification information, so that the big data platform executes codes which are input by the users according to the execution request. According to the resource management method for data analysis, the resources among different users are separated through the parsers, and the resources are dynamically distributed for the users.
Owner:WEBANK (CHINA)

Software-defined network type industrial controller

InactiveCN108241304AConvenient networking needsRealize data collectionSimulator controlControl layerControl system
The invention discloses a software-defined network type industrial controller, which comprises a system layer, a control layer, a cloud platform with a virtual controller, a hardware layer and a communication module; the virtual controller is in signal connection with the hardware layer and the cloud platform through the communication module. By modularizing the hardware design, it is convenient to use the software method to describe the control functions, interface components, peripheral modules, etc. implemented by the controller, and form the virtual controller. The user uses the developerenvironment provided by the cloud platform to perform function development for a to-be-implemented control system. In the development process, the virtual controller is used as the object to completethe program design, interface configuration, and virtual simulation function. After the function development is completed, the result is pushed to the device end of the physical controller, and the controller receives the result and then submits it to the controller. A program interpreter performs responding and execution. Development and verification are carried out on the cloud platform, and theInternet is implanted at the beginning of equipment design. Obvious advantages are realized in the later use process.
Owner:广东青璃智造科技有限公司

Wearable equipment authentication device and authentication encryption method

The invention discloses a wearable equipment authentication device and an authentication encryption method. The authentication encryption method comprises a security support platform. The security support platform comprises wearable equipment, a cryptographic chip, a security agent module, a security agent server, a security management console and a server. The method comprises the steps that wearable equipment sends a network request to a cryptographic chip through an application program; the cryptographic chip receives the network request, encrypts the received network request and sends theencrypted network request to the security agent module; the security agent module transmits the received encrypted network request to a security agent server through an encryption channel; and the security proxy server decrypts the received network request and transmits the decrypted network request to a background server to complete security channel establishment, communication data encryption and credible authentication operation of the equipment. Security support and password service are provided for the wearable device, and communication security, data security and device trusted authentication of the wearable device are realized.
Owner:GUANGDONG IND TECHN COLLEGE

Law enforcement recorder intelligent supervision platform and system and law enforcement recorder

The invention discloses a law enforcement recorder intelligent supervision platform, a supervision system and a law enforcement recorder. An NB-IOT narrowband Internet of Things module is embedded inthe law enforcement recorder, and a platform is used for receiving real-time state information sent by the law enforcement recorder in real time, and the real-time state information comprises electricquantity, storage space, police officer information, a video recording state, a use unit, a GPS position and / or a video recording resolution; and when the electric quantity or the storage space is insufficient, the platform can automatically dial the telephone number of the corresponding police officer to carry out notification prompt. According to the invention, the current situations that an existing common law enforcement recorder cannot perform real-time supervision and a 4G law enforcement recorder cannot be practically applied are broken through; real-time state supervision of the law enforcement recorder can be realized, the situations of police officer negligence, police officer making excuses and the like in file system supervision are avoided from the technical perspective, caseascertainment is facilitated, and intelligent law enforcement of the law enforcement recorder is realized; moreover, when the law enforcement recorder deletes the copied video and audio data in an unauthorized manner, the intelligent supervision platform can give an alarm and lock the operation in time, so that the data security is realized.
Owner:周莲萍

Intelligent customer service method and system based on power grid business

InactiveCN114881675AImprove the efficiency of centralized financial processingPrevent theftCustomer relationshipDigital data information retrievalPower gridEngineering
The invention provides an intelligent customer service method and system based on power grid business. The method comprises the following steps: after user identity authentication, starting question answering and question answering process monitoring; obtaining a question plain text according to the input type of the financial question information; extracting keywords from the question plain text to obtain structured question key fields; in combination with the identity information of the user and the background corpus of the financial question information, screening a recommendation intention analysis model and carrying out user intention analysis to obtain a user financial question; after the user confirms the financial questions of the user, obtaining financial answers of the user according to the financial questions of the user through a question answering model; after the user confirms the financial answer of the user, question answering and question answering process monitoring are ended. According to the intelligent customer service method and system based on the power grid business provided by the embodiment of the invention, the efficiency of financial centralized processing and the data security through a power grid financial sharing center can be improved.
Owner:GUANGDONG POWER GRID CO LTD

Method and system for invisibly storing file in encrypted manner

The invention provides a method and a system for invisibly storing a file in an encrypted manner. The method includes the steps: receiving the file transmitted by a client by a file processor, generating an encrypted file according to a first strategy and transmitting the encrypted file to a controller; acquiring the size of residual storage space and the number of clusters of a memory by the controller; acquiring a file assignment table according to a second strategy and transmitting the encrypted file and the file assignment table to a file distributor by the controller if the residual storage space of the memory is larger than or equal to the size of the encrypted file; and storing the encrypted file in the clusters in the residual storage space by the file distributor according to the received file assignment table and the received encrypted file.
Owner:SUZHOU CODYY NETWORK SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products