Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

250results about How to "Improve storage security" patented technology

Identification analysis system implementation method based on blockchain technology and identification coding technology

The invention discloses an identification analysis system implementation method based on a blockchain technology and an identification coding technology. The method comprises the following steps: A, establishing a consensus node mechanism; B, carrying out on-chain deployment by utilizing an intelligent contract technology so as to guarantee an identification rule; cC generating a data tree management mode for producing a full link based on a distributed account book technology; D, establishing a component model; E, querying the component model; if a result is inquired, directly entering the step G, otherwise, entering the step F; F, performing intercommunication analysis of the identification system; and G, outputting identification information. According to the method, the management efficiency of the identification data can be effectively enhanced, identification codes are unified, the method is unified with the construction of a national identification analysis system, the identification information management of all elements and all links of an industrial internet identification analysis ecosphere is realized, and an interconnected and intercommunicated data ecological chain isformed between the method and other identification systems.
Owner:SICHUAN CHANGHONG ELECTRIC CO LTD

Method for protecting data of cloud storage system

The invention relates to a method for protecting data of a cloud storage system. The cloud storage system comprises a cloud central authorization mechanism, a client processing module, cloud severs and a plurality of cloud attribute authorization mechanisms. The cloud attribute authorization mechanisms manage attribute information of registered users. The method for protecting the data of the cloud storage system has the advantages that the method is based on the various attribute authorization mechanisms specifically for attributes of the registered users, brand new encryption and decryption processes are designed for the user data stored in the cloud storage system, the safety of the user data stored in the cloud storage system is greatly improved, and risks that malicious users breach the attribute authorization mechanisms are spread as compared with an existing cloud storage system with a single authorization mechanism.
Owner:SUZHOU SIJIE MAKEDING SOFTWARE CO LTD

Refrigerator

The invention relates to a refrigerator which comprises a refrigerator body. A refrigerating chamber is arranged on the upper portion of the refrigerator body, and a freezing chamber is arranged on the lower portion of the refrigerator body. A refrigerator door mounted on the refrigerator body comprises an inner door and an outer door. The inner door and the outer door form the refrigerator door which is of a double-layered door structure. When the refrigerator door is closed, the inner door is positioned in the refrigerator, the outer door facing users enables the users to open the refrigerator body, the inner door and the outer door are in rotating or sliding connection, and the outer door and the refrigerator body are in rotating connection. A plurality of special storage devices and lighting devices are arranged in the refrigerator body, the refrigerating chamber and the freezing chamber according to stored objects. The refrigerator is simple in structure and convenient to use, food can be effectively stored according to different packages or cleanliness, neatness and convenience levels of the food, the problems like scattering and odor tainting of the food or food materials are avoided, safety and convenience in storing of the food or the food materials are improved, and the refrigerator is in conformity with use habits of users.
Owner:GUANGDONG CANBO ELECTRICAL

Data storage method and system

The invention is suitable for the technical field of data treatment and discloses a data storage method and system. The data storage method includes that acquiring data to be stored, and storing the data in a non-relational database; carrying out data mining on the data in the non-relational database according to a preset time interval to obtain keywords of the data; building index of the data according to the keywords, and storing the keywords and index in a relational database. The data storage method and system lower the security data storage cost, improve the security data storage safety and improve the security data mining and inquiry efficiency.
Owner:SHENZHEN KEMANDA INTELLIGENT MANAGEMENT SCI &TECH

Aluminum-based boron carbide composite material and neutron absorption plate

The invention discloses an aluminum-based boron carbide composite material and a neutron absorption plate. The aluminum-based boron carbide composite material comprises the following components in percentage by mass: 15-35 percent of B4C, 0.5-7 percent of a Ti element and 60-84.5 percent of a Al element, wherein in the composite material, the existence form of the Ti element is as follows: the Ti element coats the surface of B4C particles in a TiB2 compound form. The neutron absorption plate is a plate made from the aluminum-based boron carbide composite material. The test proves that the elongation rate of the aluminum-based boron carbide composite material at normal temperature is 6-16 percent and is superior to that of the conventional composite material, and when the prepared neutron absorption plate is used, collision or thermal stress deformation can be resisted, and the plate is difficult to break, so that the storage safety performance is improved. Meanwhile, the tensile strength and neutron absorption performance can meet the application requirements.
Owner:SHENZHEN GRADUATE SCHOOL TSINGHUA UNIV

Distributed file storage method and system based on block chain

The invention relates to the technical field of block chains, and discloses a distributed file storage method and system based on a block chain, and the method comprises the steps: meta-information ofa to-be-uploaded file carried in a file uploading request is acquired when a coordination server detects the file uploading request of a client, a coordination server obtains the file size of the to-be-uploaded file from the meta-information, formulates a corresponding fragmentation strategy according to the file size, generates a file identification code according to the meta-information, and sends the fragmentation strategy and the file identification code to a client; and the client performs fragmentation processing on the to-be-uploaded file according to the fragmentation strategy and thefile identification code to obtain fragmentation data, and uploads the fragmentation data to a block chain node corresponding to the storage server for storage so as to realize distributed storage ofthe file. Potential safety hazards caused by the fact that the to-be-uploaded file is stored in the third-party server in the prior art are avoided, the storage pressure of the storage server is reduced, and the file storage efficiency and the storage safety are improved.
Owner:ONE CONNECT SMART TECH CO LTD SHENZHEN

Modularized intelligent terminal implementation method

The invention discloses a distributed intelligent Internet of Things with high flexibility. The distributed intelligent Internet of Things comprises a public and private cloud service, a general control module, an intelligent module, an intelligent module expansion module, a function module and a function module peripheral, which are networked and connected in a flexible manner, so that owning and maintenance costs are reduced, the rapid deployment of the service is achieved, more application requirements are met by convenient combination. According to the distributed intelligent Internet of Things with high flexibility, through the definition of an standard interface, the flexible networking is achieved, the cost for primarily owning by a user is reduced, and the cost for subsequently required expansion is also reduced; through the convenient cloud service, each module is convenient to upgrade and maintain, and the maintenance cost is lowered; through the convenient, safe and economical cloud storage, the safe historic recording of key data can be achieved; through the developed network, convenient use is achieved at any time and any place; through the expansion of the function module, the deployment with the requirement of low cost is achieved; through the expansion of the intelligent module, the cost ratio of the intelligent module is reduced.
Owner:范伟飞

Authentication method, unlocking method and unlocking system for dynamic password lock

The invention provides an authentication method, an unlocking method and an unlocking system for a dynamic password lock. The authentication method comprises the following steps: setting a third algorithm corresponding to a first algorithm and a fourth algorithm according to a second algorithm in a hand-held terminal for unlocking the dynamic password lock; generating a first authentication sequence on the hand-held terminal side by use of a first key number set through the third algorithm, and generating a second authentication sequence through a second key number set received from the dynamic password lock through the fourth algorithm; generating a fourth authentication sequence on the dynamic password lock side through the second key number set of the current side through the second algorithm, and generating a third authentication sequence through a first key number set received from the dynamic password lock through the first algorithm; and carrying out corresponding steps, and determining that the authentication is passed in the case that the first and the third authentication sequences are correspondent and the second and the fourth authentication sequences are correspondent. By adopting the authentication method provided by the invention, the security performance of the dynamic password lock can be improved.
Owner:SGSG SCI & TECH CO LTD

Document storage method and document recovery method

The invention provides a document storage method which comprises the following steps: generating document fragmentation seeds against a document; dividing the document into a plurality of document fragments according to the document fragmentation seeds; and storing the document fragmentation seeds and the document fragments. By adopting the method, the document can be fragmented or re-combined to the result document which has the complete fragments and contents incapable of being read directly, and the storage safety is higher.
Owner:YOZOSOFT

Sample storage library and sample storage method

PendingCN111332768ARealize fully automatic storageNo human intervention requiredConveyor partsProcess engineeringManipulator
The invention discloses a sample storage library and a sample storage method. The sample storage library comprises a sorting library and a storage library, wherein the sorting library is internally provided with a temporary storage rack, a scanning device, a test tube capping device, a test tube recycling device, a second manipulator and a third manipulator; and the storage library is internally provided with a storage rack and a fourth manipulator, and the storage library communicates with the sorting library. When test tubes are put in storage, the second manipulator conveys the test tubes to be put in storage to the scanning device for scanning, the test tube capping device caps the test tubes which are correctly scanned, the third manipulator conveys the capped test tubes to the temporary storage rack, and after the test tubes are placed on the temporary storage rack for a period of time, the test tubes are conveyed to the storage rack under the action of the third manipulator andthe fourth manipulator; and after the test tubes are placed on the storage rack for a period of time, the test tubes to be recycled are conveyed to the test tube recycling device under the action of the third manipulator and the fourth manipulator. Manual intervention is not needed in the warehousing, ex-warehousing, capping and recycling processes of the samples, full-automatic storage of the samples is achieved, and the test tube storage efficiency is improved.
Owner:QINGDAO HAIER BIOMEDICAL TECH CO LTD +1

Information integrity measurement verification method and system for satellite-borne computing system

The invention discloses an information integrity measurement verification method and system for a satellite-borne computing system. The method comprises the following steps: S1, establishing a trust chain in a whole starting sequence; taking the integrity trust module as a starting point, carrying out integrity measurement and local verification on the next object in the starting sequence on the premise of trusting the current object, considering that the next object is credible after the local verification is passed, transferring the control right to the next object, and sequentially pushingbackwards until the object in the whole starting sequence completes the local verification; S2, in the running process of the system, conducting integrity measurement and local verification on the data in the memory; and when the ground system sends a task to the satellite-borne computing system, carrying out data transmission after remote verification is passed. Safety measures are taken from thebottom layers of hardware and software of the satellite-borne computing system, measurement and verification of the system and key applications are increased, tampering attacks and the like can be better resisted, and the integrity and authenticity of platform codes and data can be verified.
Owner:中国星网网络应用有限公司

Achievement method of custody, storage and intelligent management of important objects

The invention relates to an achievement method of custody, storage and intelligent management of important objects. According to the achievement method, by means of all-weather seamless real-time connection between ultrahigh-frequency RFID tags, RFID antennas, an RFID read-write mainframe and a data server, the objects in storage cabinets are monitored, the objects in each storage unit in the cabinets are under all-weather real-time monitoring, and monitoring signals of each storage unit are fed back to a computer system in time; meanwhile, when an abnormal situation happens, an alarm signal or prompt signal is sent out in time to inform the management staff; moreover, according to a storage cabinet system, object monitoring is not conducted through judging of whether or not a cabinet door is open, or times of open or close, so that a cabinet body scheme with or without the cabinet doors is implemented. By means of the storage cabinet system, the safety of custody and storage of the objects is greatly improved, and the problem of safety defects of existing storage cabinet systems is effectively solved.
Owner:广东亿锋物联网科技有限公司

Cotton warehouse safety monitoring system based on 3G network

InactiveCN104656601AThe system is safe and reliableImprove storage quality and securitySimultaneous control of multiple variablesProgramme total factory controlFirefightingData collector
The invention discloses a cotton warehouse safety monitoring system based on a 3G network. The cotton warehouse safety monitoring system comprises a monitoring center upper computer, a data acquisition unit, a safety control unit and a 3G network, wherein the monitoring center upper computer comprises a monitoring host, a data server, an alarm unit, a printer and a Fire Department 119 monitoring station; the data acquisition unit comprises a temperature sensor, a humidity sensor, an infrared sensor, a smoke detector, a 3G video camera and a data collector; the safety control unit comprises a main controller, dehumidifying equipment, cooling equipment, a fire alarm controller and an automatic sprinkling system. The cotton warehouse safety monitoring system realizes wireless detection and control on the temperature and the humidity of a cotton warehouse through the 3G network in real time, and has automatic safe protection and firefighting functions. On one hand, the cotton storage quality and safety are greatly improved, and on the other hand, the problems of a wired communication system, such as complicated wiring, high investment cost and poor system expandability are solved.
Owner:XIAN ZHONGZHI HUIZE PHOTOELECTRIC TECH

Large file storage method

The invention provides a large file storage method. The large file storage method comprises the steps that a large file is mapped into at least one catalog of at least one file system; an index of the large file records an initial address of a first catalog after mapping, the address of a storage region where the index of the large file is located and basic information of the large file; a plurality of data files are included in each catalog after mapping of the large file. According to the scheme of the large file storage method, the storage safety of the large file is higher.
Owner:ZHEJIANG UNIVIEW TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products