Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

42results about How to "Not easy to attract attention" patented technology

Antenna device and mobile terminal

The invention provides an antenna device. The antenna device comprises a radio frequency transceiving circuit, a matching circuit and a metal shell, wherein the matching circuit is electrically connected to the radio frequency transceiving circuit, the edge of the metal shell comprises an arc segment, the metal shell is provided with at least one micro-slot belt, the at least one micro-slot belt comprises an arc part, the arc part is matched with the arc segment of the metal shell, the radio frequency transceiving circuit is electrically connected with the metal shell through the matching circuit so that the metal shell is used as a radiation body of the antenna device, the metal shell is grounded by a grounding line, and a switch is arranged on the grounding line and is used for controlling on / off of the grounding line. With the antenna device according to the invention, the comprehensive appearance effect of a mobile terminal can be ensured, meanwhile, a signal of the antenna device can be prevented from being intervened, and the bandwidth of the antenna device is improved. The invention also provides the mobile terminal.
Owner:GUANGDONG OPPO MOBILE TELECOMM CORP LTD

Method for designing forest fire prevention early warning system

The invention discloses a method for designing a forest fire prevention early warning system. The method comprises the following steps that (1) monitoring terminals are distributed at all monitoring points of a forest so as to collect environment information around the monitoring points and then the environment information and position information of the monitoring points are sent to a remote monitoring center in a binding mode; (2) the remote monitoring center is provided with a monitoring data base server and a monitoring software platform and a forest fire alarm model which is set in advance is further stored in the monitoring data base server; (3) the monitoring software platform reads the environment information, newly received by the monitoring data base server, around the monitoring points and conducts data processing, then analysis and comparison are conducted on the forest fire alarm model and the processed environment information, if the forest fire alarm model is matched with the processed environment information, the situation that corresponding forest fire occurs to the monitoring point is judged, an alarming sound is emitted, meanwhile, warning information is generated and a pre-protocoled fire prevention measure scheme is sent to a forest fire prevention center. The method for designing the forest fire prevention early warning system is reasonable in design, low in erection cost, stable in running and reliable in monitoring.
Owner:柳州市宏亿科技有限公司

Carrier-free text steganography method based on character features

The invention discloses a carrier-free text steganography method based on character features. Binary digits are expressed through the character features; secret information is processed into a binaryciphertext string and then is packaged and segmented; mapping between texts and binary ciphertext string segments is established by taking abundant webpage texts in a network big data environment as candidate carriers; corresponding texts are found for the secret information through the mapping relationship; and the texts or the corresponding URLs are sent, thereby finishing secret information interaction. After a receiving end receives the texts, the character features of a first text are analyzed to obtain head information; a binary ciphertext segmentation mode and length are determined; thefollow-up text character features are analyzed to obtain binary ciphertext segments; the segments are recombined to form the complete binary ciphertext string; and decoding or decryption is carried out to obtain the secret information. The method has the advantages of high stealthiness, high expandability and high embedded capacity, and the application and development of a steganography technology in various fields are facilitated.
Owner:QINGDAO UNIV

Confidential information transmission method in P2P network based on BitTorrent protocol

The invention belongs to the computer network and information safety technology field, and discloses a confidential information transmission method in a P2P network based on a BitTorrent protocol. A covert transmission channel is established based on Handshake information transmission in the P2P network, and by adopting the established covert transmission channel, confidential information is embedded in BT key words of Handshake information in an information coding way, which is not sensitive to case, for transmission. The covert transmission is carried out by introducing the information coding way, which is not sensitive to the case, to the BT key words of the handshake information. The confidential information transmission method provided by the invention is simple and effective, is low in realization cost, is safer and more reliable, and is not easy to crack.
Owner:JIANGSU UNIV OF SCI & TECH

Method for carrying out secret communication by using word document

The invention provides a method for carrying out secret communication by using a word document. The method mainly comprises the following three steps of: manufacturing secret characters by using a True Type character-formation program and generating a secret key; embedding the secret characters into the word document; and extracting the secret characters by using the secret key. According to the method disclosed by the invention, the True Type character-formation program in the conventional general windows operation system, display characters of a window word base and certain functions of word character processing software are designed and integrated so as to realize a function of performing the secret communication by using the word document. The method disclosed by the invention has the advantages of smart conception, simple method, low cost, good commonality and easiness of operation. Therefore, the method can be accessibly used by any operator familiar with windows.
Owner:XIAN UNIV OF SCI & TECH

Anti-plug-in method, device and system

The invention provides an anti-plug-in method, device and system, and the method comprises the steps: monitoring a preset detection point in a game application, and obtaining plug-in feature information detected at the preset detection point in a current game stage; when the game stage is finished, generating anti-plug-in game data information corresponding to the game stage according to the plug-in feature information and normal game data information corresponding to the game stage; and sending the anti-plug-in game data information corresponding to the game stage to a first server, so that the first server determines whether plug-in feature information exists in the anti-plug-in game data information or not by comparing the anti-plug-in game data information with normal game data information corresponding to the game stage from a game server. According to the scheme of the invention, a confused and hidden anti-plug-in mechanism is adopted, so that the difficulty in counterfeiting a data packet by a plug-in developer can be greatly increased.
Owner:PERFECT WORLD ZHENGQI SHANGHAI MULTIMEDIA TECH CO LTD

Concealed protective anti-theft anti-riot casement window without guardrail

The invention discloses a concealed protective anti-theft anti-riot casement window without a guardrail. The concealed protective anti-theft anti-riot casement window without the guardrail is characterized in that an anti-theft frame is arranged at the periphery of a window frame, a protective convex edge is arranged at the inner edge of an outdoor side of the anti-theft frame, and the window frame is embedded in the anti-theft frame and is mutually fastened and connected with the anti-theft frame by using bolts. The concealed protective anti-theft anti-riot casement window with the guardrail has the advantages that the anti-theft frame can be accurately fixed, when in use, firstly the anti-theft frame is arranged in a window of a wall, then the embedded window frame is fixed by the anti-theft frame, and the anti-theft frame and the window frame are sequentially and successfully arranged and do not need to rework, thereby greatly increasing the operating efficiency and installing accuracy; a gap between the anti-theft frame and the window frame is covered by the protective convex edge arranged at the inner edge of the outer side of the anti-theft frame, and therefore, the protective convex edge has the pry-proof effect; the strength and the anti-impact property of the window frame are increased through steel pipes and energy absorption materials in the window frame; a glass film composite layer is used for effectively preventing thieves from breaking up or gashing glass to enter a room and has the functions of anti-theft, temperature preservation and heat insulation; and stoppers and hinges of window sashes are also used for increasing the strength and anti-theft performance.
Owner:高林

A road sign recognition attack defense method based on multi-objective road optimization

The invention discloses a street sign recognition confrontation defense method based on multi-objective road optimization, comprising: (1) constructing a training set, a test set and a confrontation set; (2) constructing a street sign classifier, and using the training set and the test set to compare The classifier is trained to obtain the street sign recognition model; (3) Construct the street sign attack model according to the particle swarm optimization algorithm, and use the street sign attack model to generate confrontation samples; (4) Correct the confrontation samples, apply the confrontation samples to the physical scene, and then collect the confrontation samples. The physical image of the sample; (5) Input the physical image of the adversarial sample into the street sign recognition model, and screen high-quality adversarial samples; (6) Add the high-quality adversarial samples to the training set, and use the training set to retrain the street sign recognition model , to realize the optimization of the adversarial defense of the street sign recognition model; (7) use the street sign recognition model optimized by the adversarial defense to recognize the street sign image, so as to realize the adversarial defense of the street sign recognition.
Owner:ZHEJIANG UNIV OF TECH

A method for displaying a dark watermark at a moving end

The invention discloses a method for displaying a dark watermark at a mobile end, which comprises the following steps: 1, after the watermark content is encoded and converted, the watermark content isplaced in a matrix; Step 2: the matrix is drawn onto the application interface. By adopting the method, the invention can avoid interfering with the normal reading of the user, ensure the user experience, prevent the illegal elements from forging the watermark content, and bring the safe experience to the user.
Owner:北京指掌易科技有限公司

Hidden information transmission method and transmission system based on biological sound

The invention discloses a concealed information transmission method and transmission system based on biological sound, and the method comprises the steps: 1, enabling a transmitting end to collect a biological sound pulse signal x(t), and extracting an envelope es(t); 2, acquiring the time range of each biological sound pulse in es(t); 3, when an i-th code element to be sent is B1, embedding an identification signal into an i-th biological sound pulse signal xi(t) in the x(t), and when the i-th code element to be sent is B2, performing no processing on the xi(t) signal; 4, enabling the transmitting end to send out the processed biological sound signal; 5, extracting an enveloper(t) from a received biological sound signal y(t) by the receiving end, and obtaining the time range of each biological sound pulse; 6, judging whether embedded information exists or not for each biological sound pulse yj(t) in the y(t): if the embedded information exists, determining that the j-th code element sent by the sending end is B1. According to the method, the requirement for transmitting the hidden information in a specific occasion can be met, and the probability that the secret information is intercepted and captured is reduced through the hidden communication behavior.
Owner:JIANGSU UNIV OF SCI & TECH +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products