Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

696results about How to "Improve information security" patented technology

Mobile Device With Secure Element

Embodiments of the present invention are directed to methods, systems, and apparatuses for securely communicating issuer updates, upgrades, and allowing configuration of payment-related applications on a mobile communication device using a mobile security application. One embodiment is directed to a method of using a mobile communication device comprising a mobile security application, a key associated with the mobile security application, a first mobile payment application in communication with the mobile security application and a second mobile payment application in communication with the mobile security application. The method includes communicating, by the first mobile payment application in the mobile communication device with a mobile gateway, in a first communication, wherein the first communication is encrypted using the key and communicating, by the second mobile payment application in the mobile communication device with a mobile gateway, in a second communication, wherein the second communication is encrypted using the key.
Owner:VISA INT SERVICE ASSOC

Imaging apparatus

ActiveUS20110233383A1Simply manufactureDownsize useSolid-state devicesMaterial analysis by optical meansThin fingersAperture array
An imaging apparatus is realized which enables a thin finger vein authentication apparatus having a thickness installable in a portable information device. A light beam emitted from an object passes through a visible light cut-off filter 20 and enters a pre-focus lens array 11. The pre-focus lens array 11 focuses the light beam on an opening of a micro aperture array 15. The light beam passed through the micro aperture array 15 diverges, but it is focused with the post-focus lens array 13 on the light detection device 30. With this structure, a thin imaging apparatus can be obtained with maintained resolution, and a finger authentication apparatus installable in a portable information device can be realized.
Owner:PANASONIC LIQUID CRYSTAL DISPLAY CO LTD +1

Determination method of pseudo base station and mobile terminal

The invention provides a determination method of a pseudo base station and a mobile terminal. The method comprises the steps of sending a base station parameter acquiring request to a base station of the local community through the mobile terminal; receiving the base station parameters from the base station through the mobile terminal; comparing the base station parameters with the preset base station parameters of an operator; if the base station parameters are the same as the base station parameters of the operator, acquiring electric signal strength of the base station; comparing the variable of the electric signal strength of the base station within the preset time quantum with the preset strength variation value; if the variable of the electric signal strength of the base station within the preset time quantum is less than the preset strength variation value, comparing the electric signal strength of the base station with the preset electric signal strength; if the electric signal strength of the base station is more than the preset electric signal strength, determining that the base station is the pseudo base station. With the adoption of the determination method of the pseudo base station and the mobile terminal, the pseudo base station can be quickly and conveniently recognized, and meanwhile, the signaling load of the base station can be reduced; the privacy can be prevented from disclosing; in addition, the pseudo base station can be timely positioned.
Owner:INST OF INFORMATION ENG CHINESE ACAD OF SCI

Method and Apparatus for Enhancing Information Security in a Computer System

A method of enhancing information security in a computer system comprises receiving an input signal, reading a starting password, comparing the input signal with the starting password for generating a comparison result, and controlling an operating status of a basic input and output system of the computer system according to the comparison result.
Owner:WISTRON CORP

Secure access mode for intranet and extranet

The invention provides a secure access mode for an intranet and an extranet. An input-end interface unit of intranet and extranet safety equipment is connected with a first control unit and a second control unit respectively through a two-channel switch unit; when mobile computer equipment selects an extranet mode, a processing unit controls the two-channel switch unit to gate the second control unit, switches on a second power control switch to enter an extranet system and switches off a first power control switch to cut off connection with an intranet system at the moment; and when the mobile computer equipment selects an intranet mode, the processing unit controls the two-channel switch unit to gate the first control unit, switches on the first power control switch to enter the intranet system and switches off the second power control switch to cut off connection with the extranet system at the moment. The secure access mode for the intranet and the extranet is used for realizing isolation and safety protection of the intranet and extranet systems, and information security of the intranet system can be protected effectively.
Owner:BEIJING AISIMENG TECH

A method and device for defending against ddos ​​attacks directed at multi-service systems

The invention aims to provide a method and equipment for defending against a distributed denial of service (DDoS) attack to a multi-service system. The method comprises the following steps of: detecting whether the DDoS attack exists in network access traffic corresponding to the multi-service system according to preset DDoS attack triggering conditions by using network security equipment; when the DDoS attack exists, determining a target service aimed by the DDoS attack according to the DDoS attack triggering conditions corresponding to the DDoS attack; and protecting the network access traffic, corresponding to the target service, in the network access traffic corresponding to the multi-service system according to the service related information of the target service. Compared with the prior art, the invention not only limits the undesirable impact of the DDoS attack on the whole multi-service system, but also effectively supports access requests for other services in the multi-service system by detecting the target service aimed by the DDoS attack and performing corresponding defense processing according to the service related information of the target service, thereby effectively improving the information security capability of the whole multi-service system in defending against the DDoS attack.
Owner:BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD

Method and system for detecting rogue wireless access point in local area network

The invention discloses a system and a method for detecting a rogue wireless access point in a local area network. The system comprises a database, a wireless monitoring module and a central processing unit, wherein the database is used for storing the corresponding information of a legal wireless access point in the local area network in a legal list; the wireless monitoring module is used for periodically scanning each channel in the local area network to acquire identification information from the channel, and used for testing a suspected wireless access point determined by the central processing unit, trying connecting the suspected wireless access point in a management mode, and further trying connecting a plurality of legal nodes in the local area network by the suspected wireless access point if the connection is successful; and the central processing unit is used for comparing the identification information of an existed access point acquired by the scanning with the corresponding information in the legal list, and listing the wireless access point not occurring in the legal list as the suspected wireless access point and judging that the suspected wireless access point is the rogue wireless access point if successfully receiving the feedback information that the suspected wireless access point is successfully connected with the legal nodes from the wireless monitoring module.
Owner:AEROSPACE INFORMATION

System and method for managing errand and travel

The invention discloses a system and method of traveling management, including reservation systems and payment system. The reservation system according to the reserved the traveling information can interact information with the system of supplying traveling service to confirm the reserved traveling service, visit the corresponding system of supplying traveling service, reserve, compute fee, sent the fee information to payment system; The payment system can interact the information with the enterprises finance system to receive fee information from reservation system, visit the enterprises finance system, verify the cost. The system and method supplied by the present invention can not only improve the information safety of traveling management, but also integrated analyze the inner traveling data for enterprises and improve the management level of traveling.
Owner:HUAWEI TECH CO LTD

Login method, maintenance terminal, data management service equipment and login system

InactiveCN103916366ABlock illegal loginReduce search workloadTransmissionData centerData management
The invention provides a login method, a maintenance terminal, data management service equipment and a login system. In the method, the maintenance terminal receives a login request and transmits user authentication information contained in the login request to the data management service equipment; after the data management service equipment returns a verification result that the user identity is legitimate, the maintenance terminal obtains identification information of a server to be logged and transmits the identification information to the data management service equipment which determines whether a user has the authority to manage the server to be logged; and according to a determination result which shows that the user has the authority, the maintenance terminal requests login information for logging on to the server from the data management service equipment and transmits the received login information to the server to be logged, and the user is logged in when the login information is verified by the server to be logged server. The technical scheme of the invention can effectively improve the information security of a data center, reduce the workload to find out login information and improve the information maintenance efficiency of the data center.
Owner:CHINA MOBILE COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products