Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

36results about How to "Reduce the risk of eavesdropping" patented technology

Control method for wearable device operation and the wearable device

An embodiment of the invention relates to the technical field of wearable devices and discloses a control method for wearable device operation and a wearable device. The method includes detecting hand actions of the wearable device when the wearable device utilizes a bone conduction mode to convert audio signals to vibration signals and transmits the vibration signals via bone medium; recognizing a target action command matching with the hand actions from a preset action command set; and performing the target action command on the wearable device. By applying the method provided by the invention, interception risks during audio playing of the wearable device are reduced, so that user privacy is protected. At the same time, simple and convenient operation control of the wearable device is realized, so that user experience is improved.
Owner:GUANGDONG XIAOTIANCAI TECH CO LTD

Physical layer secure transmission method in unmanned aerial vehicle assisted cognitive wireless network

The invention provides a physical layer secure transmission method based on an unmanned aerial vehicle assisted cognitive wireless network, and belongs to the field of wireless communication. The method specifically comprises the following steps: establishing a wireless communication scene comprising an unmanned aerial vehicle, a primary user transmitter, a primary user receiver, a secondary userreceiver and an eavesdropper, and then, in a frequency spectrum sensing time tau of a time slot T, enabling the unmanned aerial vehicle to perform spectrum sensing, wherein the main user may perform data transmission, and calculates the safe transmission rate at the moment; meanwhile, in the data transmission time period Ta of the time slot T, enabling the unmanned aerial vehicle to judge the access state of the current main user channel based on spectrum sensing, selecting the current main user channel as a friendly interference unit or a secondary signal transmitter, and discussing a securetransmission model in four situations; based on this, formulating an optimization model of the total secure transmission rate; performing solving by using a particle swarm optimization algorithm; andenabling the unmanned aerial vehicle to perform signal physical layer safety transmission according to the obtained optimal parameters. According to the invention, the secure transmission of the primary and secondary users is considered, so that the secure transmission performance of the system is improved.
Owner:BEIJING UNIV OF POSTS & TELECOMM

Wearable equipment call reminding method and wearable equipment

The embodiment of the invention relates to the technical field of wearable equipment, and discloses a wearable equipment call reminding method and wearable equipment. The method comprises the steps that when the wearable equipment plays the call reminder of a call by using a loudspeaker mode, whether the wearable equipment receives a play mode switching instruction is detected; if the wearable equipment receives the play mode switching instruction, the playing mode of the wearable equipment is switched to a bone conduction mode from the loudspeaker mode; and using the loudspeaker mode to play the call reminder of the call is stopped, and real-time voice signals used for playing call information of the call are converted into vibration signals by using the bone conduction mode and the vibration signals are transmitted through the bone medium. With application of the wearable equipment call reminding method and the wearable equipment, the user is enabled to timely know the call information of the call to avoid missing the call, and the risk of interception of the call information can also be reduced so as to achieve the effect of protecting the privacy of the user.
Owner:GUANGDONG XIAOTIANCAI TECH CO LTD

Full duplex cognitive multiple-input-multiple-output relay cooperation method in non-ideal channel state

The invention discloses a full duplex cognitive multiple-input-multiple-output relay cooperation method in a non-ideal channel state, and belongs to the technical field of multi-antenna full duplex wireless transmission. Firstly, according to a channel estimation model in a first time slot non-ideal channel state, a secondary user transmitter selects and configures an optimal antenna to send a signal to a secondary user relay node under a primary user interference temperature constraint condition, and a full duplex destination node transmits a directional interference signal to an eavesdropping user in a zero-forcing beamforming mode; then, according to a channel estimation model in a second time slot non-ideal channel state; and the secondary user relay node forwards data to the full-duplex destination node under the constraint condition of the interference temperature of the primary user, any LB antenna in the full-duplex destination node receives signals, and the remaining NB-LB antenna of the full-duplex destination node transmits artificial interference to an eavesdropping user. According to the method, the physical layer security transmission performance of the full duplex cognitive wiretapping network under the non-ideal channel is effectively improved, and the risk that the whole network system is wiretapped is reduced.
Owner:ZUNYI MEDICAL UNIVERSITY

Anti-peeping secret key input method for mobile phone

The invention provides an anti-peeping secret key input method for a mobile phone, which aims to avoid secret key leakage caused by peeping when a mobile phone user uses the mobile phone to input a secret key in a public occasion. The method comprises the following implementation steps: dividing keys on a mobile phone keyboard into a plurality of set keys; the mobile phone user selecting a set keyaccording to a secret key which needs to be input by himself / herself; representing a Morse code of a random character of the set key selected by the user through mobile phone vibration; the user determining the number of character position cyclic backward movement times according to the number of mobile phone vibration times and inputs a secret key; and judging whether the secret key reaches themaximum digit or not, if so, completing secret key input, and otherwise, inputting the next secret key. The mobile phone keys are rearranged and the mobile phone vibration prompt is used for assistingthe user to input the secret key, so that the secret key is prevented from being leaked due to peeping of the keyboard when the secret key is input, any additional auxiliary equipment is not needed,and the safety and convenience are ensured.
Owner:XIDIAN UNIV

Audio signal processing method, device and system

The embodiment of the invention relates to the field of audio signal processing, and discloses an audio signal processing method, device and system. The method comprises the following steps of: dividing an audio signal to be played by first wearable equipment into a left channel signal and a right channel signal; controlling a bone conduction module in the first wearable equipment to convert the left channel signal into a first vibration signal and transmit the first vibration signal through a bone medium; and, transmitting the right channel signal into second wearable equipment in communication connection with the first wearable equipment, so that the second wearable equipment controls the bone conduction module in the second wearable equipment to convert the right channel signal into a second vibration signal and transmit the second vibration signal through the bone medium. By means of the embodiment of the invention, sound can be listened conveniently; the risk that sound is eavesdropped by people around can be reduced; and the stereophonic effect is obtained.
Owner:GUANGDONG XIAOTIANCAI TECH CO LTD

Block chain industrial data encryption method and device based on national secret and storage medium

The invention relates to a block chain industrial data encryption method and device based on national secret and a storage medium, and the method comprises the steps: carrying out the key negotiation through employing a key exchange method based on an elliptic curve, and determining a shared key; negotiating and determining the current shared salt of the current round of data transmission; generating a current round transaction key based on the shared key and the current shared salt; the initiator encrypts the current round of to-be-delivered data by using the current round of transaction key and the SM4 national secret algorithm, and simultaneously uploads the current round of salted encrypted data and the current round of delivery hash value of the current round of to-be-delivered data to the block chain; and progressively increasing the current shared salt to obtain a next round of shared salt, generating a next round of transaction key according to the next round of shared salt and the shared key, and applying the next round of transaction key to a next round of data transmission process of the two communication parties. According to the method, the repudiation resistance, anonymity and integrity of the transaction can be enhanced, the continuous encryption delivery of the data on the block chain is realized, and the key leakage hazard can be reduced.
Owner:HKUST TIANGONG INTELLIGENT EQUIP TECH (TIANJIN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products