Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

213results about How to "Improve tamper resistance" patented technology

User public key address binding, searching and verifying method and system based on crypto currency open account book technology

The invention discloses a user public key address binding, searching and verifying method and system based on the crypto currency open account book technology. The user public key address binding, searching and verifying method is characterized by comprising the following steps that (1) verification public key addresses are published to users in a crypto currency network; (2) an account name registration request of one user is received, and the public key address of the user is received; (3) crypto currency is sent to the public key address of the crypto currency of the registered user through a private key address corresponding to the verification public key address and used as a verification transaction, and it is set that additional information or script content of the verification transaction contains the account number of the user, wherein the amount of the crypto currency is greater than or equal to zero; (4) query requests from other users in the crypto currency network are received, and the public key address of the registered user is fed back according to the query requests. The user public key address binding, searching and verifying method and system can substantially improve the availability, convenience, safety and reliability of crypto currency transactions, and protect the users against economic losses caused by the situation that the public key addresses are tampered with and used illegally.
Owner:安徽中科晶格技术有限公司

Slim terminal gaming system

A computer gaming system and method of operation thereof are provided that both drastically reduce the cost of gaming stations and allow contemporaneous access to multiple game programs from a single gaming station. The computer gaming system of the present invention allows for transparent modifications and upgrades to the gaming programs by executing gaming programs on a server / host computer connected to a plurality of client / terminal computers via communication pathways. Each client / terminal computer comprises a client / terminal program that allows input and output streams of the gaming program executed on the server / host computer to be separated and redirected to the client / terminal computers. Since the gaming programs are executed entirely on the server / host computer, with only wagering input and display output operations being executed on the client / terminal computers, the cost of the hardware and software required for each client / terminal computer is greatly reduced. A patron of a client / terminal computer can access any of the gaming programs executed on the server / host computer. Modifications and upgrades of the gaming programs only need to be performed on the server / host computer. By using a stereo head-mounted display together with a joystick input device and wireless communication pathways, the present invention allows a patron to participate in a mobile gaming environment.
Owner:NEW MILLENIUM GAMING

Lock cylinder fixed type crossed-shaped mechanical antitheft lock matched with fingerprint lock

The invention discloses a lock cylinder fixed type cross-shaped mechanical antitheft lock matched with a fingerprint lock and relates to the field of antitheft locks. By means of the characteristic that the operation manner that a key can only be inserted and pulled and unlocking can be conducted as long as a handle is rotated of the mechanical antitheft lock is right the same as the operation manner of the fingerprint lock is utilized, the scheme of matched usage of the mechanical antitheft lock and the fingerprint lock is put forwards. A cam mechanism of a special structure and double clutches running independently are mainly adopted so that fingerprint recognition unlocking, key unlocking and locking operation can be completed through the same handle, wherein the cam mechanism is mainly composed of a torque limiter, a driven ring, a cam ring and a stirring wheel in a combined manner, engagement and disengagement of the auxiliary clutch are completed through key inserting and pulling, and the main clutch and the auxiliary clutch are relatively independent and do not interfere with each other; and therefore convenience of the fingerprint lock is maintained in the whole set of lock, and meanwhile the beneficial effects that technical opening, violent opening and damage are prevented, the handle can idle, and a main lock plunger, a spring bolt and a lock body are movably connected in an external hanging manner of the mechanical antitheft lock are achieved.
Owner:BEIHUA UNIV

Method of generating program, information processing device and microcomputer

In programming in high-level language, a method of generating a program supporting external specifications for generating secure codes having high tamper-resistance and automatically generating an executable program having tamper-resistance with regard to a portion designated by a user is provided. A syntax analysis step, an intermediate representation generation step, a register allocation step, an optimization processing step, an assembly language generation step, a machine language generation step and a machine language program linkage step are executed. And between finish of reading of the source program and generating the executable program, a tamper-resistant code insertion step of automatically generating a code having tamper-resistance coping with unjust analysis of an operation content of the executable program is executed to the source program, the intermediate representation, the assembly language program or the machine language program based on an instruction of a user.
Owner:RENESAS ELECTRONICS CORP

Method and device for managing secret keys in wireless sensor network

The invention discloses a method for managing secret keys in a wireless sensor network. The method comprises the following steps: 1. clustering the nodes of a sensor by adopting DECA (distributed energy-core algorithm) based on the spatial position information of the nodes, wherein a base station only communicates with cluster heads; the cluster heads communicate with the common nodes in the cluster; the cluster heads can not directly communicate with each other; and shared nodes do not exist among the clusters; and 2. during distributing the communication secret keys, adopting elliptic curve cryptography algorithm to encrypt and decrypt the wireless sensor network and carrying out communications among the nodes by utilizing a symmetric encryption method after establishing safe communication links. Dot multiplication of the elliptic curve cryptography algorithm is optimized by adopting a window sliding method to reduce the number of the continuous nonzero integers. By adopting the method, the safety of the wireless sensor network system can be remarkably improved. The invention also discloses a device for managing secret keys in the wireless sensor network. The device comprises a clustering module, a secret key management module and an elliptic curve cryptography algorithm optimization module.
Owner:BEIJING TOPSEC TECH

Double-insertion type antitheft door

The invention discloses a double-insertion type antitheft door and relates to the field of antitheft safety doors. The double-insertion type antitheft door is mainly characterized in that an insertion lug is arranged at the position, corresponding to each doorframe insertion hole, of a doorframe buckled edge, an insertion lug gap is formed between each insertion lug and a doorframe, a double-insertion plate is arranged at the position, closely neighboring a door leaf side edge, inside the door leaf, the double-insertion plate is provided with liner plates in the mode that each liner plate corresponds to the corresponding insertion hole in the doorframe, a narrow-slit type insertion hole is formed between each liner plate and the double-insertion plate, the side edge of a panel inside the door leaf is provided with rectangular insertion holes in the mode that each rectangular insertion hole corresponds to the corresponding narrow-slit type insertion hole, the insertion lugs, the door leaf side edge, the double-insertion plate and the liner plates are each provided with an insertion hole in the mode of corresponding to the doorframe insertion holes, the five insertion holes which are correspondingly formed constitute a group, after the door leaf is closed, the insertion lugs are inserted into the rectangular insertion holes and the narrow-slit type insertion holes, the double-insertion plate is also inserted into the insertion lug gaps, the five insertion holes are all coaxial, lock tongues are inserted into the five concentric insertion holes correspondingly and used for locking the antitheft door, and the double-insertion type antitheft door is resistant to unclenching and damage.
Owner:BEIHUA UNIV

Electric energy meter theft prevention sealing structure

The invention designs an electric energy meter theft prevention sealing structure which solves the technical problem of low productivity because the traditional electric energy meter seal is still manually operated. The electric energy meter theft prevention sealing structure comprises a meter shell and a meter body, wherein the meter shell is provided with a screw hole, and a screw is fixedly connected with the meter body after penetrating through the screw hole. The electric energy meter theft prevention sealing structure is characterized in that a seal cap with an outer folding edge at thelower part is arranged on the screw; a metal ring is sleeved outside the seal cap; the metal ring is abutted against the outer folding edge, and the outer wall is provided with a plurality of buckling pieces which are outwards inclined and opened to the upper part; the buckling pieces are circumferentially arranged; the inner wall of the surface shell arranged at the upper part of the screw hole is provided with an annular projection; and the buckling pieces are positioned at the lower part of the annular projection to form inversed buckling. The invention can visually find out damage traces and replace the damaged electric energy meter in time and has the advantages of good electricity theft prevention effect, high inversed buckling matching strength, good pickproof performance, convenience in processing, simplicity in sealing operation and high productivity.
Owner:STATE GRID ZHEJIANG ELECTRIC POWER +1

Surface shape recognition sensor and method of manufacturing the same

A surface shape recognition sensor of this invention has a surface protective film having a hydrophobic property on an insulating protective film which is made of an insulator and formed to cover a sensor electrode, and includes at least a ground electrode which is formed on the substrate such that the ground electrode is partly exposed on the surfaces of the insulating protective film and surface protective film so as to be insulated / isolated from the sensor electrode and come into contact with the surface of a detection target. This sensor prevents fingerprint residues from easily remaining and improves tamper resistance.
Owner:NIPPON TELEGRAPH & TELEPHONE CORP

Block chain-based account password management method, device and apparatus and storage medium

The invention is applicable to the technical field of block chain, provides a block chain-based account password management method, device and apparatus and a storage medium. The method comprises: receiving a block chain login request sent by a user through a remote procedure call protocol interface, and encapsulatingthe block chain address and the block chain private key contained in the request, and then sending the encapsulated login information to the login contract; the chunk chain address and the chunk chain private key are authenticated by the login contract, When validation is passed,obtaining and outputting all account password information stored in the block chain corresponding to the block chain private key through the account password obtaining contract, so as to realize themanagement of account password information, Thus, a plurality of personal account password information of a user is managed by a block chain private key, the probability of preventing the account password from being lost, tampered with and stolen is improved, the security of the account password management based on the block chain is further improved, and the management cost and the operation costof the account password are reduced.
Owner:SHENZHEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products