Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

271results about How to "Avoid management" patented technology

Icon hiding method and system of mobile terminal

InactiveCN104092821AThe interface is clean and refreshingSimplify the mobile terminal interfaceSubstation equipmentUser privacyComputer engineering
The invention discloses an icon hiding method and system of a mobile terminal. According to the method, display attributes, needing hiding or not hiding, of all icons in different scene modes are preset on the mobile terminal; selection instructions of the scene modes are received, the mobile terminal is switched to be in the selected scene modes, and the corresponding icons are hidden or displayed according to the display attributes of all the icons in the scene modes; through hiding or displaying all the icons of the mobile terminal in different scene modes in advance, only the application icons or file icons correspondingly selected for display in different scene modes are displayed in the mobile terminal. In this way, many items of applications and files are effectively managed, besides, an interface of the mobile terminal is cleaner and is simplified, the icons are convenient to search for and use for a user, the privacy of the user is protected from peeping, using is more convenient for the user in a targeted mode, and great convenience is brought to the user.
Owner:HUIZHOU TCL MOBILE COMM CO LTD

Method and system for automatically monitoring and real time monitoring radioactive source

The invention relates to a radioactive source automatic supervision and real-time monitoring method and a system. The method mainly comprises the following steps: a positioning terminal in which a GPS positioning unit and a CDMA network positioning unit are arranged and source file information is solidified is arranged on a radioactive source; the source file information is stored in a network server of a monitoring center and a source admission range is set up; source position information and source file information is acquired at real time and corresponding source information in the network serve is updated at real time; when the source information stored in the network server changes, the monitoring center automatically obtains prompting information and judges whether the change of the source information is beyond the admission range; when the change of the source information exceeds the admission range, automatic alarm is carried out. The system realizing the method comprises a positioning terminal assembly device, a source information storing device, a source information updating device, a source information monitoring device and a real-time alarm device. The method and the system realize automatic supervision and real-time monitoring of all links of the radioactive source, thereby putting an end to severe security accidents like loss of the radioactive source, etc.
Owner:BEIJING HUALIXING SCI TECH DEV

Method and system for protecting condition privacy of internet of vehicles based on certificateless batch verification

The invention discloses a method and a system for protecting a condition privacy of an internet of vehicles based on certificateless batch verification. The method comprises the following steps: a key generation center KGA and a track authentication center TRA jointly generate a master key and a system parameter of the internet of vehicles; according to the system parameter and vehicle user real identity information, the TRA generates a pseudonym identity of a vehicle user; the KGC generates a partial private key of the vehicle user; the vehicle user generates an own key; the vehicle user signs a message; an RSU carries out verification on a signature; and the RSU carries out the batch verification on the signature. According to the method and the system disclosed by the invention, by adopting a certificateless cryptography system, the unsolvable inherent certificate management problem and the certificate maintenance problem in the traditional public key cryptography system are effectively solved; and meanwhile, the key escrow problem caused by an identity-based cryptography system is also avoided; by adopting a batch verification technology, the signature verification efficiency in the internet of vehicles is improved; and in the internet of vehicles, the key generation center KGA and the track authentication center TRA are adopted to realize the condition privacy protection on the internet of vehicles.
Owner:HOHAI UNIV

Power utilization information collection method and system based on technology of Beidou satellite navigation system

The invention provides a power utilization information collection method and a system based on a technology of a Beidou satellite navigation system. The technical scheme comprises the following steps of: obtaining a meter reading data message of collected power utilization information, also generating a Beidou communication message by the data conversion of the meter reading data message and transmitting the Beidou communication message to a prepositive end by a Beidou communication link; and reducing the Beidou communication message to the original format of the meter reading data message by the prepositive end and also transmitting to an application server of a central master station for carrying out united managing and monitoring. By adopting the method and the system which are provided by the invention, the power utilization information of residents in a site can be connected to a master station of a power utilization information management system in a seamless way by utilizing the two-way communication function of a Beidou satellite navigation system under the condition that traditional operation equipment is not reconstructed so as to realize the process from the collection of data in the site to the connection of a Beidou communication channel. The power utilization information of regions with undeveloped communication can be effectively and reliably obtained at real time.
Owner:GZH BEIDOU TECH GRP

Performance monitoring and fault positioning method based on service

The invention discloses a performance monitoring and fault positioning method based on a service. The method is characterized by comprising the steps of a, defining a service parameter; b, acquiring network data; c, performing data statistics; d, performing data storage; e, performing correlation analysis; and f, displaying a result. The performance monitoring and fault positioning method has advantages of directly obtaining the parameter or the result of various states in an information flow or data flow which is transmitted in a network, realizing definite acquisition of interested service state, state appearance position and state appearance time by operation maintenance personnel, settling defects in prior art, performing automatic retrieval on the whole system according to a preset instruction, finding out data flow abnormity in the network system for performing automatic alarming, performing tracking and backtracking and / or positioning on the state in the network system, realizing management, operation and maintenance of a service-related system of an enterprise, and realizing integral efficiency improvement and safety improvement of the enterprise.
Owner:周向军

Information security risk assessment method and system based on situation awareness learning

The invention discloses an information security risk assessment method and system based on situation awareness learning. The method comprises the following steps: firstly, collecting network securityasset defense information and department personnel organization information; then, preprocessing the collected information; performing format unification, useless data filtering, repeated data mergingand the like on the data; then, in combination with an existing information security risk assessment standard and an existing information security risk assessment model, systematically establishing entry information of the risk assessment model, and finally, grading network security according to the collected information by utilizing a Bayesian network machine learning algorithm. The system comprises an asset defense information collection module, a statistical personnel organization information module, a data set preprocessing module, a risk assessment model establishment module and a network security comprehensive assessment module. According to the invention, a set of more complete risk assessment system is constructed in multiple aspects and multiple ways, and security assessment grading is carried out, so that risk measures are selected in a targeted manner to reduce and control risks.
Owner:湖北央中巨石信息技术有限公司

Four-stage addressing method for tile recording disk

The invention discloses a four-stage addressing method for a tile recording disk. The four-stage addressing method comprises the following steps of: dividing a logic space of the tile recording disk into a four-stage structure comprising a region, a section, a block and a sector; addressing the divided four-stage structure by a radial addressing mode; optimizing region intervals of the divided four-stage structure by adopting symmetric stack type magnetic track arrangement; and performing read-write operation on the tile recording disk with the addressed four-stage structure. Aiming at tile recording disk random write limitation, a data structure and the track arrangement of the tile recording disk are optimized; due to the advantages of high read-write speed of a flash memory and a memory, a tile recording disk system with a three-stage architecture is formed, so that the problem of low random write performance of the conventional tile recording disk is solved; the available capacity of the disk can be multiplied, and the performance can be prevented from being reduced; and the read-write speed is increased.
Owner:HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products