Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

35results about How to "Not stolen" patented technology

Security management method and system for vehicular mobile Internet

The invention discloses a security management method and a system for the vehicular mobile Internet. When an application program accesses a vehicular terminal, the vehicular terminal judges the authorization of the application program. When the authorization of the application program is the runtime authorization of a local access, the application program directly accesses the vehicular terminal information. When the authorization of the application program is the remote authorization of a remote access, the vehicular terminal authenticates the access authority of the application program through a server side. If the authorization is passed, the application program accesses the vehicular terminal information. The server side provides register, application, safe key management and application audit service for application developers of a third party, and the application access authority of the third party is saved in the server side. Through the interaction of the vehicular terminal and the server side and the own management of the vehicular terminal, the method and the system adopt a high-efficiency authentication mechanism and an encryption communication mechanism, so that the safety management of vehicular application is easily realized, and the critical data of the vehicular terminal cannot be embezzled by illegal application. Thus, a car accesses the mobile Internet to share the convenience and fast of the network, and while the privacy data of users cannot be stolen.
Owner:SOUTH CHINA UNIV OF TECH

Anti-counterfeiting source tracing system based on block chain

The invention discloses an anti-counterfeiting source tracing system based on a block chain. The system comprises the following functional modules: (1) a verification code generation module which is used for generating the unique verification code of the product; (2) a verification information storage module which stores verification information in the block chain; (3) a verification code readingmodule which reads external anti-counterfeiting information and identifies the corresponding verification code; (4) a verification code verification module which decodes and identifies the verification code; and (5) a commodity information output module which reads product information out of a database after successful matching. The unified and secure anti-counterfeiting verification mode is provided through the block chain technology and can be additive to the existing external anti-counterfeiting means so that the multistep anti-counterfeiting verification process can be simplified and the cost for anti-counterfeiting verification can be saved. New technical support is adopted so that more product information can be provided on the basis of the original anti-counterfeiting information, and the buyer of the commodity is enabled to participate in the source tracing process of the commodity and get more recognition from the commodity buying process.
Owner:HANGZHOU QULIAN TECH CO LTD

Login information encryption method and terminal device

The invention applies to the technical field of the Internet and provides a login information encryption method and a terminal device. Feature codes of a device are obtained; the feature codes are rearranged according to a preset rule and then are converted into a feature character string; position supplement is carried out on the feature character string to generate a position supplemented character string; a feature group digest of each feature group is calculated in sequence according to positions of feature groups in the position supplemented character string; the feature group digest of the last feature group is taken as a device fingerprint; the device fingerprint is converted into an encryption key for encryption; and login information is encrypted through a preset encryption algorithm based on the encryption key obtained according to the device fingerprint, thereby generating a login ciphertext. Different devices are equipped with the encryption keys different from those of theother devices. Even if others obtain the encryption algorithm and the login ciphertext, the login ciphertext cannot be decrypted, and the login information of a user is well prevented from being stolen by the others.
Owner:PING AN TECH (SHENZHEN) CO LTD

A traceability system based on a block chain

The invention discloses a traceability system based on a block chain, and relates to the technical field of blockchain and information traceability. The system comprises an alliance chain management module, a block chain browser module, a traceability code generation module, an information storage module, an information reading module, a caching module, a commodity information reading module and an SDK module, and the alliance chain management module can manage and maintain block chain nodes and newly add consensus nodes for key link manufacturers on a supply chain in the block chain. According to the traceability system based on a block chain, the information security Tamper-resistant properties of the block chain are utilized;, the information can be protected from being stolen and tampered; the product information can be kept transparent and public in front of consumers; the credibility of the traditional traceability system is improved, the anti-counterfeiting traceability system can adapt to the existing external traceability means on the market, the anti-counterfeiting traceability work of the original product is supplemented and updated, and multiple anti-counterfeiting processes adopted by manufacturers are simplified, so that the labor and financial cost of the work is reduced.
Owner:链极智能科技(上海)有限公司

Password setting and verification method based on spatial position code log-in computer system

The invention provides a password setting and verification method based on a spatial position code log-in computer system. Password buttons which need to be input are provided with the number, the area and the space distribution positions of the password buttons according to an arrangement mode of the space positions in a button positioning layer, and the buttons which are input are converted into initial password character strings. Simultaneously, the clicking time limit of the password buttons is set, and a pattern display layer covers a password button display layer. When password verification is conducted, input space password character strings and the time of clicking two adjacent passwords serve as standards of verification password input. Due to the fact that the input passwords have certain concealment, information resources are effectively protected from being changed or stolen, and the confidentiality of the system is greatly improved.
Owner:DEFEI TECH

Control method of virtual scenes and electronic equipment

The invention discloses a control method of virtual scenes and electronic equipment. The method comprises steps as follows: feature information of a target object is acquired through the electronic equipment and is used for distinguishing different users of the electronic equipment; a first user of the electronic equipment is identified on the basis of the feature information; a first virtual scene matched with the feature information is determined from at least one virtual scene created on the basis of the electronic equipment; the first virtual scene is shown through the electronic equipment. With the method and the electronic equipment, the problem of low safety of showing of the virtual scenes in the prior art is solved.
Owner:LENOVO (BEIJING) CO LTD

Separated intelligent electronic safety equipment

The invention relates to the separated intelligent electronic safety equipment preventing lock decryption through separating keys and building-in lock body codes; all instructions are issued and executed by the mobile phone internet, thus ensuring smooth unlocking and correct payment; key internal code verification is realized so as to keep the information from being stolen; the equipment employs the instruction distribution password remote replacement technology, thus ensuring account safety even if the key is lost or copied, and maintaining interests.
Owner:王升

Embedded system

The present invention discloses an embedded system. The embedded system comprises a flash memory controller, a CPU and a flash memory chip. The flash memory controller is respectively connected with the CPU and the flash memory chip, and the flash memory controller comprises a flash memory system bus interface; a main control unit, which is connected with the flash memory system bus interface; and a flash memory control unit, which is respectively connected with the flash memory system bus interface, the main control unit and the flash memory chip, is used for encrypting program data corresponding to a data write instruction to obtain the program data ciphertext and writing the program data ciphertext to the flash memory chip according to the received data write instruction and the corresponding address, and is further used for, according to the received data write instruction and the corresponding address, reading the program data ciphertext stored in the flash memory chip, decrypting the program data ciphertext to obtain the corresponding program data, and providing the program data for the CPU to execute. According to the technical scheme of the present invention, the program data can be effectively protected from being stolen, so that safe storage of the program data can be realized fundamentally.
Owner:GIGADEVICE SEMICON (BEIJING) INC

Starting protection system for portable execution program and method thereof

The invention relates to a starting protection system for a portable execution program and a method thereof. Before the portable execution program is executed by an executable platform of a loading computer, by verifying a manufacturer verification code and a model verification code of a portable storage device, and verifying disk drive codes of a data read-write area and a data read-only area required by the portable execution program, verification results are acquired. When the verification programs pass, the portable execution program can be normally started. By solving the problem that the portable execution program cannot prevent unauthorized execution in the prior art, the technical effect of preventing the portable execution program from being embezzled is reached.
Owner:徐州英弗森电子科技有限公司

Network storage device for multi-terminal synchronization

The invention relates to the technical field of Internet, in particular to a network storage device for multi-terminal synchronization. Comprising a network memory; the network memory comprises a cylindrical shell, a PCB mainboard and a plurality of hard disks; a connecting plug is detachably arranged on one side of each hard disk; a front panel is fixedly arranged on one side of the cylindrical shell; a through hole is formed in one side of the front panel; a U-shaped sliding frame is slidably connected to the inner side of the through hole. A guide limiting device is arranged on one side of the U-shaped sliding frame; and a push-pull plate is fixedly arranged on one side of the U-shaped sliding frame. Through the arrangement of the U-shaped sliding frame, the push-pull plate positioning bottom frame, the pressing frame, the fixing box, the bevel edge clamping head, the U-shaped connecting frame, the T-shaped connecting frame, the tension spring, the storage battery, the CPU module, the power failure prompting module and the charging module, the invention can have the functions of rapid installation, rapid disassembly, poor contact prevention, backup, power failure prevention, power failure prompting and the like, and have high reliability.
Owner:深圳市图美电子技术有限公司

Data security safekeeping equipment and method

The invention discloses a data safekeeping device which comprises a terminal connection device that is provided with an interface connected with an external processing terminal; a data storage device that is used for the user to access to read and write the data; a read-write control device that controls the reading and writing of the data storage device; an equipment shielding device that shields the storage device in the external processing terminal connected with the terminal connection device; and a system management device that is provided with an operating system, a driver program and an application program, and the operating system is guided and operated after the external processing terminal is connected with the terminal connection device. The invention further discloses a data safekeeping method. A self-operating system is used when the data safekeeping device is operated, and shields the original storage device of the external processing terminal, thus avoiding data interaction with the external and achieving high data security requirements. The data safekeeping device can be loaded various identification algorithms and data self-destruction mechanisms, and the data security protection is further enhanced by loading the algorithms such as fingerprint, iris identification and the like.
Owner:SHENZHEN GRADUATE SCHOOL TSINGHUA UNIV

A security management method and system for vehicle-mounted mobile interconnection

The invention discloses a security management method and a system for the vehicular mobile Internet. When an application program accesses a vehicular terminal, the vehicular terminal judges the authorization of the application program. When the authorization of the application program is the runtime authorization of a local access, the application program directly accesses the vehicular terminal information. When the authorization of the application program is the remote authorization of a remote access, the vehicular terminal authenticates the access authority of the application program through a server side. If the authorization is passed, the application program accesses the vehicular terminal information. The server side provides register, application, safe key management and application audit service for application developers of a third party, and the application access authority of the third party is saved in the server side. Through the interaction of the vehicular terminal and the server side and the own management of the vehicular terminal, the method and the system adopt a high-efficiency authentication mechanism and an encryption communication mechanism, so that the safety management of vehicular application is easily realized, and the critical data of the vehicular terminal cannot be embezzled by illegal application. Thus, a car accesses the mobile Internet to share the convenience and fast of the network, and while the privacy data of users cannot be stolen.
Owner:SOUTH CHINA UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products