Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

77results about How to "Won't steal" patented technology

Method and device for reinforcing application program

The embodiment of the invention provides a method and a device for reinforcing an application program. The method comprises the following steps of receiving a reinforcing request of the application program, wherein the reinforcing request comprises an installation package of the application program and multi-channel information for reinforcing the application program, the installation package comprises code files and resource files, and release channel names and corresponding channel values are configured in the resource files; analyzing to obtain corresponding code files and resource files from the installation package of the application program; executing reinforcing operation on the code files obtained through analysis; executing retouching operation on the resource files obtained through analysis according to each piece of channel information to obtain a new resource file corresponding to each piece of channel information; executing packaging operation on the reinforced code files and the new resource file corresponding to each piece of channel information to obtain a reinforced installation package corresponding to each piece of channel information. According to the method and the device, the safety of the application program can be improved and the efficiency of reinforcing multiple release channels is improved.
Owner:BEIJING QIHOO TECH CO LTD

Security distributed data management method based on public cloud

The invention discloses a security distributed data management method based on a public cloud. The security distributed data management method comprises the following steps: assuming that m public cloud spaces exist, extracting a storage directory structure on a local computer, encrypting all files in a directory, dividing each encrypted file into m blocks, sharing and dividing key secrets into m blocks, respectively sending the files and the key blocks into the m public cloud spaces, and sharing directory tree secrets into the m public cloud spaces. In the event of searching a specific file and downloading a file, a directory tree is fetched and restored from any n public cloud spaces at first, wherein n is less than m; the file is searched from the directory tree; then, sub-file blocks and sub-key blocks are continuously fetched from the n public cloud spaces according to the searching result; the file blocks are combined; simultaneously, a key is recovered; and finally, an original file is obtained by decrypting the file. By means of the technical scheme provided by the invention, data information in any insufficient n public cloud spaces is insufficient to recover the original file; therefore, the data information security is increased; and the risk in leaking user data information is reduced.
Owner:SOUTH CHINA AGRI UNIV

Online payment method and online payment system based on IC bank card

The invention relates to an online payment method and online payment system based on an IC bank card. The online payment method based on the IC bank card comprises a binding activating step and a payment step. The payment step comprises: a first sub step that a payment application initiates a dynamic token generating request to an accepting application; a second sub step that the accepting application verifies whether the dynamic token generating request is valid and initiates a dynamic token acquiring request to the IC bank card if yes; a third sub step that the IC bank card generates dynamic token abstract data according to the dynamic token acquiring request and returns the dynamic token abstract data to the accepting application; a fourth sub step that the accepting application generates a dynamic token according to the acquired dynamic token abstract data and returns the dynamic token to the payment application; a fifth sub step that the payment application transmits a payment request including the dynamic token to a payment system; and six sub step that the payment system authenticates the payment request and completes payment if authentication succeeds.
Owner:CHINA UNIONPAY

High temperature resistant rubber base composite material used for chip packaging and application thereof

The invention discloses a high temperature resistant rubber base composite material used for chip packaging and an application thereof, and belongs to the technical field of the high temperature resistant chip packaging material. The invention aims to provide a high temperature resistant, moisture-proof and damp-proof chip packaging composite material. The high temperature resistant rubber base composite material used for the chip packaging adopts the technical scheme that the high temperature resistant rubber base composite material used for the chip packaging comprises the following raw materials in parts by weight: 100 parts of silicon rubber, 0.1-2 parts of plasticizer, 1-10 parts of reinforcing agent, 50-100 parts of heat insulation microsphere and 1-15 parts of vulcanizing agent. The plastic rubber base composite material related by the invention has a high temperature resistant characteristic, a radio frequency identification device (RFID) chip can be comprehensively protected to normally work in the high temperature environment, the chip is free from being damaged due to overheat at the temperature of 300DEG C, and the packaged chip has an excellent moisture-proof and damp-proof performance.
Owner:NO 33 RES INST OF CHINA ELECTRONICS TECHNOOGY GRP

File storage intelligent backup system based on big data

The invention discloses a file storage intelligent backup system based on big data. The file storage intelligent backup system comprises a login registration module, a login verification module, a user information acquisition module, a data real-time receiving module, a data processing module, a data storage module, a data comparison module, a data transfer module, a cloud backup module and a coverage backup module, wherein the login registration module is in communication connection with the login verification module; the login and registration module is also in communication connection withthe user information acquisition module; the user information acquisition module is in communication connection with the data real-time receiving module, the data real-time receiving module is in communication connection with the data processing module, the data storage module is in communication connection with the data analysis module, and the data comparison module is in communication connection with the data storage module; in addition, the file storage security of the system can be better guaranteed, and meanwhile file storage can be better and more conveniently carried out.
Owner:LIUZHOU RAILWAY VOCATIONAL TECHN COLLEGE

Instant messaging information verification code protection method and device

The invention provides an instant messaging information verification code protection method and device, and relates to the field of communication. The method includes the steps: identifying whether to-be-processed instant messaging information includes a preset verification code identifier or not; determining an application program associated with the to-be-processed instant messaging informationif the to-be-processed instant messaging information includes the preset verification code identifier; receiving a verification code reading request sent by the server, wherein the verification code reading request includes an application identifier; enabling the server to send the verification code information in the to-be-processed instant messaging information if the application identifier indicates the application program associated with the to-be-processed instant messaging information or a default authorization application program. Compared with the prior art, the method guarantees the security of a mobile phone application or a personal account, and guarantees that the SMS verification code c not stolen by the rogue software.
Owner:XIAMEN MEITU MOBILE TECH CO LTD

Secure communication method and device based on identity authentication

The invention discloses a secure communication method and device based on identity authentication, and the method and device can achieve the flexible and efficient verification of identity informationof two communication sides through electronic seals of two forced authentication sides under the condition that there is no need to apply for a digital certificate from a CA mechanism, and guaranteesthe safety of communication data. The method comprises the following steps that: a request node and a response node respectively manufacture respective electronic seals; the request node and a response node report fingerprint information in electronic seals of the opposite side; the request node encrypts plaintext data by using a random factor to generate ciphertext data, encrypts the random factor by using a public key of the electronic seals of an opposite side to obtain a communication key, and then packages and sends the ciphertext data, the communication key and the fingerprint information to the response node; and the response node compares the fingerprint information in the file package with the reported fingerprint information, decrypts the encrypted private key of the electronicseals to which the response node belongs after successful comparison, decrypts the communication key through the private key to restore the random factor, and analyzes the ciphertext data to obtain plaintext data.
Owner:SUNING CLOUD COMPUTING CO LTD

Physical layer security methods based on non-optimal user cascading scheme in heterogeneous network

The invention discloses physical layer security methods based on a non-optimal user cascading scheme in a multilayer heterogeneous network and belongs to the technical field of wireless communication.According to the methods, a multilayer heterogeneous network model in a passive eavesdropping scene is analyzed through description of node distribution density, a base station transmitting power, path loss indexes and a bias factor of each layer. The problem that the optimal base stations are difficult to connect is solved by the provided method based on the non-optimal user cascading scheme. According to the scheme, network nodes are modeled into a homogeneous Poisson point process through utilization of stochastic geometry. On the basis of a stochastic geometry mathematical tool, a physical layer security probability expression of the multilayer cellular heterogeneous network is inferred. Influence of the transmitting powers, security thresholds and eavesdropper density on a system security probability is compared and analyzed according to obtained security probabilities. The method has obvious advantages in the aspect of improving physical layer security of the system. A network coverage probability and average user capacity are improved. Throughput and spectral efficiency of the network are also improved.
Owner:NORTHWEST NORMAL UNIVERSITY

Mechanical anti-theft charging bin

The invention discloses a mechanical anti-theft charging bin. The charging bin comprises a strip-shaped base, a buckle mechanism and an electromagnetic lock mechanism; insertion slots are formed in the upper side face of the strip-shaped base at intervals; the buckle mechanism comprises buckle units the number of which correspond to that of the insertion slots; each buckle unit comprises a lock hook swing arm, a torsion spring, a tension spring, a thrust jacking plate, a fixing shaft and a mounting base; the electromagnetic lock mechanism is mounted on the strip-shaped base, and each telescopic lock lever conducts blocking and limiting on a locking position of the corresponding lock hook swing arm. According to the mechanical anti-theft charging bin, the lock hook swing arms, the torsion springs, the tension springs, the thrust jacking plates, the fixing shafts and the mounting bases are adopted for constituting all the buckle units; by means of a pure mechanical structure, insertion locking and automatic ejection of a charging pal are achieved. The mechanical anti-theft charging bin has excellent reliability, and the power consumption of a power supply can be reduced.
Owner:海南小魔科技有限公司

System and method for verifying authenticity of financial self-service terminal

InactiveCN103268676AWon't stealEliminate the disadvantages of unreliabilityComplete banking machinesTelecommunications linkPassword
The invention discloses a system and a method for verifying the authenticity of a financial self-service terminal. The system comprises a self-service apparatus, a communication device and a bank server device; the self-service apparatus can be financial self-service terminal equipment capable of providing deposit, withdrawal deposit or account transfer service for users, or terminal equipment capable of providing financial services by requiring password entry and card insertion operation; the communication device can be communicated with a bank host instantly to finish the financial self-service for users, and the communication device is used for connecting a customer and the communication links of a bank service host; and the bank server device is a service system capable of managing user account information and deposit of the user. According to the system and the method for verifying the authenticity of the financial self-service terminal, the operation is simple, the verification is convenient, no extra communication channels are needed, the cost is lower, the verification can be realized only by utilizing the existing communication links of the self-service terminal and the bank host, more importantly, the defects caused by the second communication link such as a mobile device and unreliable information source are completely eradicated.
Owner:GUANGZHOU KINGTELLER TECHNOLOGY CO LTD

Key management-based access control method suitable for pay television system

The invention discloses a key management-based access control method suitable for a pay television system, which comprises the following steps of: forming a group by all users of the same video website, dividing the users into different user subsets according to the preferences of the users, wherein television programs subscribed by the users in the same user subset are the same. And the website manager encrypts the television program and the session key, and sends the ciphertext of the program and the ciphertext of the session key to the cloud server and the corresponding user respectively. And the cloud server updates the data storage table according to the data uploaded by the website manager and judges whether the request of the user is legal or not according to the data storage table.Only legal users can obtain the session key and the ciphertext of the television program at the same time, and the plaintext of the television program is further obtained through decryption. According to the invention, the privacy data of the user can be ensured not to be stolen, and the dynamic operation of the user and the service provider on the television program is supported; and computing and communication overheads of the user and the service provider are saved.
Owner:NANJING UNIV OF INFORMATION SCI & TECH

Electronic payment system and method, intelligent terminal and storage medium

The invention relates to an electronic payment system and method, an intelligent terminal and a storage medium, and is applied to the technical field of electronic payment, and the electronic paymentsystem comprises a currency conversion module which is used for dynamically generating a conversion relation between an actual payment amount and virtual currency; a virtual currency generation moduleused for generating virtual currency representing the actual payment amount from the actual payment amount according to the conversion relation; a virtual currency payment module used for transferring the virtual currency from a payer virtual account to a payee virtual account and storing transaction information based on a block chain technology; an auditing module used for auditing the virtual currency to obtain an auditing result; and an actual payment module used for carrying out actual payment according to the actual payment amount after the audit result is passed.
Owner:篱笆墙科技集团有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products