Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

508results about How to "Achieve hidden" patented technology

Method for implementing multi-user management and information hiding in mobile phone

The invention discloses a method of realizing multi-user management and information hiding on mobile phone, which is characterized in that, the method comprises the following steps: (1) presetting user management module in mobile phone, which configures corresponding attributes of the user name and the information under the user name; (2) when the user boots up or re-logins, the user management module requires the user to enter the user name, and verifies; (3) after the user management module completes the verification of user name, the user management module only provides the user the information of the attributes corresponding to the user name when the user manages the information under the user name. The invention solves the problem that the mobile phone cannot realize the multi-user management and information hiding in multi-user circumstance in existing technology.
Owner:ZTE CORP

Method for performing identity authentication on user node in block chain and related equipment

The invention discloses a method for performing identity authentication on user nodes in a block chain and related equipment, and relates to the field of transaction verification, and the method comprises the steps: obtaining a group certificate distributed by a CA group administrator; when an authentication request of a user node in the block chain is received, obtaining identity identification information of the user node and a public key of the user node; encrypting the group certificate, the identity identification information of the user node and the public key of the user node by using the private key of the CA based on a predetermined encryption algorithm to generate a digital certificate of the user node; and sending the digital certificate and the public key of the CA to the usernode. According to the method, hiding of CA identity information of the certificate authority is achieved, and protection of transaction privacy is enhanced.
Owner:ONE CONNECT SMART TECH CO LTD SHENZHEN

Air swinging structure and air conditioner

The invention discloses an air swinging structure and an air conditioner. The air swinging structure comprises a clamp plate assembly, a plurality of swinging blades, a transmission connecting rod anda driving element, wherein the clamp plate assembly and a casing are detachably connected; the clamp plate assembly forms an accommodating space and is provided with a plurality of installing holes communicating with the accommodating space; the plurality of swinging blades are positioned at an air outlet and are arranged at intervals in the length direction of the clamp plate assembly; each swinging blade comprises an air guide plate and a crank handle; the air guide plate is positioned in the air outlet; the crank handle is of an integral structure with the air guide plate; the crank handlecomprises a driving part and an installing shaft connected with one end of the driving part; the driving part is positioned in the accommodating space; the installing shaft passes through one corresponding installing hole and is connected with the air guide plate; the transmission connecting rod is accommodated in the accommodating space and is rotationally connected with the other end of the driving part; the driving element is connected with the transmission connecting rod; the driving element drives the transmission connecting rod to drive the swinging blades to rotate around the installing shaft. The air swinging structure provided by the invention is the air swinging structure with the advantages of low cost and high assembly efficiency.
Owner:TCL AIR CONDITIONER ZHONGSHAN CO LTD

Multistage memory access method and discrete memory access method based on heterogeneous multi-core processor

ActiveCN102929724AMaximize performance efficiencyAchieve hiddenResource allocationFully developedAccess method
The invention discloses a multistage memory access method and a discrete memory access method based on a heterogeneous multi-core processor. The multistage memory access method comprises that an auxiliary core reads in data needed by a first time calculation; besides the first time, the auxiliary core reads in data needed by a next time calculation while performing the data calculation; besides the last time, the auxiliary core writes back result data of the last calculation while performing the data calculation; and the auxiliary core writes back result data of the last time calculation. The discrete memory access method includes that storage orders of digit groups are adjusted on the auxiliary core, and discretely-stored digit groups are adjusted into continuously stored digit groups; and communication read-in data, calculation and communication write-back data are performed on the digit groups through the auxiliary core by the multistage memory access method. According to the multistage memory access method and the discrete memory access method based on the heterogeneous multi-core processor, maximum hides between expenditures and multistage storage resource access expenditures are effectively calculated, the multistage memory access efficiency is improved, the performance efficiency of the auxiliary core is fully developed, and accordingly, the calculation efficiency of a scientific calculation subject is enhanced.
Owner:JIANGNAN INST OF COMPUTING TECH

Phase-amplitude conversion based secure optical communication system

The invention discloses a phase-amplitude conversion based secure optical communication system, and belongs to the technical field of secure communication. The phase-amplitude conversion based secureoptical communication system is to convert a noise signal at a phase to an amplitude so as to realize masking encryption for the data signal at the amplitude through the phase-amplitude conversion; compared with the traditional noise secure optical communication system, the phase-amplitude conversion based secure optical communication system can decrypt through the phase-amplitude conversion, is not required to filter a masking signal, has an unlimited signal rate, has the masking signal not required to be transmitted in a link and can greatly improves the security of the encryption system; meanwhile, the system is subjected to secondary encryption through the photoelectric feedback circuit, increases the key space by introducing time delay, increases the key space dimension by a dispersion element in the system and realizes time delay masking. Compared with the traditional chaotic secure optical communication system, the system has higher key dimension and bigger key space.
Owner:HUAZHONG UNIV OF SCI & TECH

Identification distribution and separate-storage method, identification replacing transmission method and system

The invention discloses an identification distribution and separate-storage method, an identification replacing transmission method and system, relating to the field of network safety. The identification distribution and separate-storage method comprises the following steps of: dividing a heterogeneous wireless network by function into a user domain, an access domain, a service domain and an attribution domain, wherein the service domain comprises at least one access domain, the access domain comprises at least one user domain, and the attribution domain and the service domain are the same network when in local service; and after the successful authentication of a terminal, allocating the attribution domain, the service domain and the access domain with domain identifications domain by domain. Based on the access authentication of the heterogeneous wireless network, the invention provides a mechanism of the identification distribution, the separate storage and the replacing transmission of the identification. In the transmission process of the domain identification in the user domain, the access domain, the service domain and the attribution domain, the real identity and the location information of a terminal can be effectively concealed through the retrieval and the replacement among domains and the dynamic update at different identification mapping servers, thereby enhancing the credible access of the heterogeneous wireless network and the safety protection capacity on mobility problems.
Owner:THE PLA INFORMATION ENG UNIV

Electronic device

ActiveCN111050047AMitigate the impactStick out to avoidTelevision system detailsColor television detailsPhysicsAmbilight
The invention discloses an electronic device which comprises a device shell (100) and a camera module (200), wherein the device shell (100) is provided with an inner cavity and an opening. The openingcommunicates with the inner cavity. , The camera module (200) comprises a photosensitive chip (210), a lens (220) and a reflector (230). The photosensitive chip (210) is arranged in the inner cavity;wherein the lens (220) is movably arranged in the equipment shell (100); the lens (220) can extend out of the equipment shell (100) or retract into the equipment shell (100) through the opening, andunder the condition that the lens (220) is located outside the equipment shell (100), the reflection piece (230) can reflect ambient light emitted into the lens (220) to the photosensitive chip (210).According to the scheme, the problem that an antenna of the electronic equipment is greatly influenced in the shooting process due to the fact that the existing electronic equipment is provided witha lifting type camera can be solved.
Owner:VIVO MOBILE COMM CO LTD

Generation method of RFID member

The invention provides a generation method of an RFID member. The method comprises the following steps: integrating a computer service platform OSGi with workflow of Java business process management (JBPM), setting an RFID middleware application system as an independent application member, and operating on an engine of the workflow of the JBPM as a workflow node to realize business process of the RFID application system. The generation method is characterized by combining the JBPM with the OSGi, and managing change and business recombination of the business process by the workflow technology and the service-oriented member technology, and relative independence of the JBPM and the OSGi bundle causes correspondence of the bundle and the JBPM node; management of the OSGi on the bundle causes separation of service from realization, hot plug of the bundle is realized without restarting the platform; service is clear, realization is hidden, and service-oriented operation is really realized.
Owner:SOUTH CHINA UNIV OF TECH

Application access control method and device

The embodiment of the invention provides an application access control method and an application access control device. The method comprises the steps of when a system service receives an application access request of any application, calling a pre-registered private service in a system service list; when the application where the private service is located is the non-private application, controlling an access interface, used for accessing the application, in the system service to shield the private application, wherein the private application is the application, requested by a user to be hidden according to a hiding request of the user, determined by the private service; and feeding the non-private application not including the private application back to the application according to the application access request. According to the method provided by the embodiment of the invention, the non-private application cannot access the private application in any case, thus the user privacy is effectively protected, and the security is improved.
Owner:BEIJING ANYUNSHIJI TECH CO LTD

Novel gesture pressing pen

The invention provides a novel gesture pressing pen. During writing, a single-hand gesture can be used for quickly operating and hiding or extending out of the pen core. The novel gesture pressing pencomprises a pen core, a spring, a connecting body with a buckle, a front pen holder and a rear pen holder, and a pen point of the pen core can extend out of a front end part of the front pen holder;a polygonal inserting connection part is arranged at the rear part of the front pen holder, a clamping groove is formed in the inner surface of the polygonal inserting connection part, and a clampingring corresponding to the clamping groove is arranged at the front part of the connecting body with the buckle; the connecting body with the buckle is connected with the front pen holder through the clamping ring and can rotate in the rear pen holder along with the clamping groove; a clamping piece which protrudes outwards is arranged at the rear part of the connecting body with the buckle, and alocking groove capable of axially compressing a certain stroke along with the front pen holder and the rear pen holder is arranged in the rear pen holder; the connecting body with the buckle is rotated to enable the clamping piece to be locked or unlocked in the locking groove, so that the pen point of the pen core is in an exposed state or a hidden state, so that the single-hand rapid operation pen core can extend out or be hidden.
Owner:温州市简系文具有限公司

Synthetic method for mosaic image and device thereof

The invention relates to the technical field related to the field of information safety and signal treatment and particularly relates to a synthetic method for a mosaic image and a device thereof. The synthetic method comprises the following steps: selecting a plurality of original images as an image library in advance; selecting one original image from the image library as a main image; if no secondary mosaic image exists, selecting one original image from the image library as the secondary mosaic image and embedding the secondary mosaic image into the main image so as to obtain the main image after being embedded; and otherwise, replacing the main image after being planted by the secondary mosaic image and embedding the secondary mosaic image into the main image. According to the synthetic method provided by the invention, the problem of hiding and transferring of more information is solved. A multilayer mosaic image can be utilized to realize the hiding of multilayer information as well as the hiding and transferring of more information. The multilayer mosaic image has a potential application value in a series of applications, such as information hiding, image retrieval, computer art, philosophy, computer simulation, scene conversion, image transferring, and the like.
Owner:JINAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products