Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

46results about How to "Determine security" patented technology

Method for realizing safety warranty in evolution accessing network

ActiveCN101039314ADetermine securityImplement local authenticationTransmissionArithmometerShared secret
The present invention discloses a method of realizing security assurance in an evolutive access network, a UE and the evolutive access network separately maintain more than one arithmometers which are used for expressing data flow transmitted between the UE and the evolutive access network. The method comprises: when the evolutive access network satisfies the scheduled qualifications, an inspection of data flow is executed to the UE; the UE or the evolutive access network compares the arithmometer value from themselves with that from the opposite terminal; the evolutive access network performs the following disposal based on the comparing result of that whether there exists an conflicting arithmometer value; and the security of the evolutive access network is ensured with basis of the inspection results. Furthermore, information or commands, messages transmitted between the UE and the evolutive access network are totally protected by a shared secret-key therebetween, thus a periodic authentication is realized by this total protection.
Owner:北京禾怡管理咨询有限公司

Engineering structure fundamental frequency test wireless data collection system

The invention discloses an engineering structure fundamental frequency test wireless data collection system comprising an acceleration sensor, an analog signal processor, an analog-digital signal conversion and data latching device, a programmable logic controller, a main control CPU controller, an electric conversion and data communication connector and a power supply module. The main control CPU controller adopted in the engineering structure fundamental frequency test wireless data collection system is a DSP processor manufactured by American TI company, parallel multiplication and integer or floating point data ALU operation in a single period can be performed, high data operation speed can be fulfilled, and a large-data-amount calculation can be finished. In the engineering structure fundamental frequency test wireless data collection system, a mobile 3G communication technologies which are now prevalently applied are adopted for data communication, large scope monitoring of a structure can be realized via the system without wire arrangement, many procedures in on-site monitoring processes can be eliminated, and structure monitoring reliability of the system can be ensured. The acceleration sensor of the engineering structure fundamental frequency test wireless data collection system is characterized by high precision, high sensitivity output, high dynamic range, good linearity, stable and reliable performance and the like.
Owner:大连九州创智科技有限公司

Method for verifying safety of business operation, device, terminal and server

ActiveCN105516071ATrue reflection of social relationshipsTrue reflection of living habitsUser identity/authority verificationComputer security arrangementsRisk ControlSoftware engineering
The invention discloses a method for verifying safety of business operation, a device, a terminal and a server. The method comprises steps of receiving a credibility analysis instruction of the business operation sent by a business sever; calling a pre-stored risk control module according to the credibility analysis instruction and obtaining a credibility analysis result of the business operation; and sending the credibility analysis result to the business server so as to allow the business server to determine safety of the business operation according to the credibility analysis result. According to the invention, by use of the risk control module in a business terminal, the credibility analysis result of the business operation can be obtained, so precision of safety verification of the business operation can be improved.
Owner:ADVANCED NEW TECH CO LTD

Method and system for detecting request safety

The embodiment of the invention discloses a method and a system for detecting request safety, relating to the network safety field and being used for providing a proposal for detecting response request safety. In the method, the number of the past response requests which are the same as the present response requests and are received in a given time slot is determined when a main server receives the present response requests; the main server judges whether the number exceeds a preset threshold value; and when judging that the number exceeds the preset threshold value, the main server determines that the present response requests are illegal requests and exerts a preset treatment operation. When in use, the invention can effectively detect the safety of the response requests of an application server.
Owner:BLUEDON INFORMATION SECURITY TECH CO LTD

Method for confirming stress intensity factor distribution on member crack tip

The disclosed determining method for crack front stress intensity factor distribution of a structural member comprises: providing the thermal load, surface force load and body force load, as well as the general weight function base equation acted by any of three loads; dividing the front into N-1 subsegments by N nodes, and using a basic interpolation function N(s) and local variation function N'j(s) for every node j. This invention can determine the factor distribution for curve-type 3D crack with high precision and efficiency by finite modes and interpolation way.
Owner:ZHEJIANG UNIV OF TECH

Internet bar monitoring system

An Internet bar monitoring system of the present invention includes: multiple cameras; a bar counter server; and a monitoring central server, wherein the bar counter server includes: a card reader reading ID card information, a fingerprint reader registering fingerprint information, and a server database recording network browsing information, and the server database includes ID card information, on-line time information, and network browsing remaining balance information; and the monitoring central server stores a fingerprint of a person corresponding to the ID card information, reads the fingerprint information and the ID card information registered by the bar counter server, compares the fingerprint information with the currently-stored fingerprint information, and the ID card information with an ID card corresponding to the currently-stored fingerprint information, and returns a comparison result to the bar counter server. The system of the present invention determines whether the ID for the network browsing person is true according to the match of the fingerprints; the bar counter server would stop providing the Internet service if the age of the network browsing person is smaller than 18, or if the on-line time exceeds 8 hours, thereby ensuring the Internet bar to be developed in a healthy and ordered way, and also guaranteeing the safety of the Internet bar and the network browsing person.
Owner:李竹君

Method for network security management and terminal

The embodiment of the invention discloses a method for network security management and a terminal. The method comprises the steps of obtaining network access information generated when a terminal carries out network access operation in a to-be-tested network according to a preset network address; judging whether operation abnormal data caused by the network access operation and / or network attack data obtained from a server exist in the network access information; and if so, determining the security of the to-be-tested network based on the network attack data and / or the operation abnormal data. By adoption of the embodiment, a user can independently select to connect to a security network based on the demand thereof, and the networking security of the user is protected.
Owner:SHENZHEN GIONEE COMM EQUIP

Respirator detector and detecting method thereof

InactiveCN109470427AEasy to operateTroubleshooting Linkage Wobble ProblemsMeasurement of fluid loss/gain rateEngineeringPressure reduction
The invention discloses a respirator detector. The respirator detector comprises a to-be-tested respirator air bottle, a high-pressure sensor, a first cut-off valve, to-be-tested respirator pressure reduction valve, a medium-pressure sensor, a second cut-off valve, a to-be-tested respirator adjusting device, an artificial lung and a low-pressure sensor wherein one end of the high-pressure sensor is connected with the to-be-tested respirator air bottle, the other end is connected with a signal receiving end, one end of the first cut-off valve is connected with the to-be-tested respirator air bottle, the to-be-tested respirator pressure reduction valve is connected with the first cut-off valve, one end of the medium-pressure sensor is connected with the respirator pressure reduction valve, the other end is connected with a signal receiving end, the second cut-off valve is connected with the to-be-tested respirator pressure reduction valve, the to-be-tested respirator adjusting device isconnected with the second cut-off valve, the artificial lung is connected with the respirator adjusting device, one end of the low-pressure sensor is connected with the artificial lung, and the otherend is connected with a signal receiving end. The invention further provides a detecting method of the respirator detector, and the airtightness of a whole device, the outlet pressure of the respirator pressure reduction valve, the respiration resistance of a respirator adjusting device and flow rate detection can be detected in one attempt.
Owner:中国人民解放军陆军装甲兵学院士官学校

Earth slope seismic stability analysis method combining equal reference unit method and sliding surface method

InactiveCN109632460AConsider stress-strain propertiesNot only considering the dynamic characteristicsStrength propertiesTime rangeSlope stability analysis
The invention discloses an earth slope seismic stability analysis method combining an equal parameter unit method and a sliding surface method. The earth slope seismic stability analysis method comprises the following steps that firstly, the static load is applied in a grading mode, according to the change conditions of the stress strain in the soil after applying static load of each stage, and the mechanical parameters are corrected, a constitutive model is constructed as a mathematical model of the stress-strain relation according to actual stress strain characteristics, after all the staticloads are applied, and the calculated accumulated stress is the static stress in the preseismic earth slope; then, according to the anti-seismic design requirements of the earth slope, an earthquakeacceleration time-range relation is determined, and then inputting is carried out by adopting a two-stage time period method; and finally, the static force and the power reaction are calculated, and the effective force of certain points in the soil slope is obtained. According to the earth slope seismic stability analysis method, the problem that in the prior art, an earthquake, an soil slope structure and a power characteristic of the material cannot be considered at the same time in the soil slope stability analysis is solved.
Owner:XIAN UNIV OF TECH

Vulnerability detection method and device

ActiveCN106357664ADetermine securityMeet the needs of vulnerability scanningTransmissionVulnerability detectionVulnerability scanning
The invention discloses a vulnerability detection method and device, which relate to the technical field of internet, and are invented for solving the problem that an existing vulnerability scanning method cannot meet the scanning requirement under a cloud environment. The method provided by the invention comprises the steps of scanning network interaction between each two functional units in the cloud environment through a scanning virtual machine, wherein the scanning virtual machine is located in the cloud environment; receiving scanning result data returned by each functional unit; comparing the scanning result data with a preset vulnerability triggering condition and determining the safety of the network interaction. The vulnerability detection method and device provided by the invention are applied in a process of performing vulnerability scanning on the network interaction between the different functional units in the cloud environment.
Owner:BEIJING QIHOO TECH CO LTD +1

Safety evaluation method for well head tubing head spool with crack defect

InactiveCN108362487AAccurate stress distributionAccurate Simulation CalculationsGeometric CADMachine part testingStress distributionElement model
The invention belongs to the technical field of safety evaluation of well head device structural members with the defects, and especially relates to a safety evaluation method for a well head tubing head spool with a crack defect. The method improves the matching degree of a stress distribution finite element simulation calculation value of the tubing head spool with the actual member stress distribution through the impact on the stress distribution of the tubing head spool from constraint conditions generated by different assembly modes, and can achieve the more accurate safety evaluation ofthe of the tubing head spool with the crack defect. The method comprises the steps: determining the physical dimension of the tubing head spool, and calculating and obtaining a representative crack size; determining the parameters of a tubing head material; building a tubing head spool finite element model; calculating a stress strength factor KI of a crack body of the tubing head spool; calculating a critical stress strength factor KIC of the material and a material crack toughness KC for evaluation; comparing the stress strength factor KI with the material crack toughness KC for evaluation,and determining the safety performances of the crack body.
Owner:CHINA PETROLEUM & CHEM CORP +1

Method for computing voltage sensitivity of automatic voltage control system

The invention discloses a method for computing the voltage sensitivity of an automatic voltage control system. The method, by setting examination items, screens the acquired data, strictly examines data used during the computing, is conducive to guaranteeing the quality of the acquired data, effectively prevents bad data from influencing the result of the computing, and increases the precision in computing current voltage sensitivity. According to the invention, when computing the prediction value of the voltage sensitivity, the method uses an algorithm similar to weighted average, by collecting statistics from historical record of voltage sensitivity and the changing trend of numerical values, to compute the actual voltage sensitivity which best conforms to next adjustment, such that the computed prediction value of the voltage sensitivity more conforms to the changing trend of a power grid within a short time period in the future, can effectively increase the speed and precision of actual adjustment of the automatic voltage control system and also increases the percent of pass of the adjustment.
Owner:LEADZONE SMART GRID TECH

Construction and application of transgenic mouse model for exosome tracing

The invention discloses a construction method and application of a transgenic mouse model for exosome tracing. The specific implementation process mainly comprises the following steps: constructing plasmids for expressing stop-EGFP-tracrRNA and expressing crRNA or sgRNA; construction of donor cells and verification of exosomes; constructing, breeding and identifying transgenic mice; the five parts are verified by the tracing exosome transgenic mouse model, and finally the transgenic mouse model for tracing the exosome is successfully obtained; the successful construction of the model lays a foundation for the research of the exosome as a gene drug carrier, and scientists can more easily and clearly observe the distribution of the exosome in vivo under pathological or physiological conditions.
Owner:NANJING UNIV

Multifunctional rear view mirror for motorcycle

The invention provides a multifunctional rear view mirror for a motorcycle, comprising a support rod, a rear-mounted box I, a rear-mounted box II, a second mirror frame, a first mirror face, a second mirror face and a first mirror frame, wherein the rear-mounted box I is mounted at the right side of the support rod; the first mirror frame is mounted in front of the rear-mounted box I; the first mirror face is mounted in the first mirror frame; an mounting groove is arranged at the joint between the first mirror frame and the rear-mounted box I; the second mirror frame is mounted in the mounting groove by a bolt; the second mirror face is mounted in the second mirror frame; and the rear-mounted box II is mounted behind the second mirror frame. Compared with the prior art, the multifunctional rear view mirror provided by the invention has the beneficial effects that an article storing part for placing articles is additionally arranged on the rear view mirror so as to be convenient for a driver to carry about the articles, and the articles cannot be lost easily; and by additionally arranging the second mirror face, the visual field of the rear view mirror is widened. The multifunctional rear view mirror provided by the invention is simple in structure and convenient to use; and the rear-mounted box I can be locked by connecting a lock body and a lock catch, so that the article storing safety can be further ensured.
Owner:CHONGQING YONGCHUAN DISTRICT BANGWEI MACHINERY MFG CO LTD

Security authentication system, method, apparatus, device, and computer-readable storage medium

The invention discloses a safety authentication system, method, device, equipment and computer-readable storage medium. The method includes: the terminal device sends normal state information to the management server; the management server generates terminal control information and terminal authentication information; the terminal device generates terminal authentication information according to the terminal control information; sends a communication authentication request to the block chain authentication server cluster, receives And determine that the block chain authentication server cluster returns the security authentication result; the communication authentication request includes terminal authentication information; the block chain authentication server cluster performs security on the terminal authentication information included in the communication authentication request according to the terminal authentication information from the management server. Authentication, returning the security authentication result to the terminal device; when the security authentication result is that the security authentication is passed, the terminal device executes the control instruction carried in the terminal control information. The invention can determine the security of the transmission link between the terminal equipment and the management server.
Owner:GREE ELECTRIC APPLIANCES INC +1

Safety authentication system, method, device, equipment and computer readable storage medium

The invention discloses a safety authentication system, a method, a device, equipment and a computer readable storage medium. The method comprises the steps that terminal equipment sends state normal information to a management server; the management server generates terminal control information and terminal authentication information; the terminal equipment generates terminal authentication information for the terminal control information; a communication authentication request is sent to the blockchain authentication server cluster, and a safety authentication result returned by the blockchain authentication server cluster isreceived and determined; the communication authentication request comprises terminal authentication information; the block chain authentication server cluster performs safety authentication on the terminal authentication information included in the communication authentication request according to the terminal authentication information from the management server, and returns a safety authentication result to the terminal equipment; and the terminal equipment executes the control instruction carried in the terminal control information when the safety authentication result is that the safety authentication is passed. According to the invention, the safety of the transmission link between the terminal equipment and the management server can be determined.
Owner:GREE ELECTRIC APPLIANCES INC +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products