Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

45 results about "Low confidentiality" patented technology

Management method, device and system for scanning operation

The invention discloses a management method, a device and a system of scanning operations and relates to the technical field of the electric numeral data processing, and the invention solves the problems of the low utilization efficiency of scanning devices, the low confidentiality of the scanning operation content and the disordered management of scanning operations in the prior art. The management method of the scanning operations provided by the invention comprises the following steps: creating the information of a user who uses the scanning devices; storing the scanning operations of the user according to the user information; and processing the scanning operations. The invention can improve the utilization efficiency of the scanning devices and the security of the scanning operations, so that the management of the scanning operations can be safe and orderly.
Owner:PEKING UNIV FOUNDER GRP CO LTD +1

Anti-crawling method, device, terminal and readable medium for live broadcast room data

The embodiment of the invention discloses an anti-crawler method, a device, a terminal and a readable medium for the data between live broadcasts. The method comprises the following steps: obtaining the data between live broadcasts; obtaining the data between live broadcasts; obtaining the data between live broadcasts according to the obfuscation rule file; obfuscating the data between live broadcasts. The confusion data with low confidentiality level in the adjacent confidentiality level is used to encrypt the confusion data with high confidentiality level once, the data encrypted once is used to encrypt twice by using the shared key, and the confusion data with the lowest confidentiality level is used to encrypt once by using the preset shared key. Encrypting the file name of the obfuscation rule file by using a shared key. The encrypted confused data and the file name are distributed to the client, so that the client can determine the live broadcast data according to the data distributed by the server. The anti-crawling method, the device, the terminal and the readable medium of the live broadcasting room data provided by the embodiment of the invention improve the data breakingstrength of the live broadcasting room, prevent the crawler from climbing to obtain the correct live broadcasting room data, and ensure the safety of the data of the live broadcasting room.
Owner:WUHAN DOUYU NETWORK TECH CO LTD

Method for implementing optimal confidentiality throughput and high-efficiency energy collection in SWIPT (Simultaneous Wireless Information and Power Transfer) system

The invention discloses a method for implementing an optimal confidentiality throughput and high-efficiency energy collection in a SWIPT (Simultaneous Wireless Information and Power Transfer) system.According to the method for implementing the optimal confidentiality throughput and high-efficiency energy collection in the SWIPT system, a confidentiality throughput of a legal user is calculated, athreshold is set to judge whether confidentiality interruption occurs so as to calculate a confidentiality interruption probability, and by regulating a target confidentiality rate and a power distribution ratio of a transmitting terminal, the optimal confidentiality throughput is obtained; and a receiving terminal adaptively regulates a power distribution coefficient according to received powerand information decoding sensitivity and only provides power which meets the decoding requirement for information decoding, and other power is all used for energy collection. The method solves the problems of low confidentiality throughput and low energy collection efficiency when an eavesdropper exists in an existing SWIPT system.
Owner:NORTHWESTERN POLYTECHNICAL UNIV

FPGA-based IRIG-B(DC) fast decoding method

An FPGA-based IRIG-B(DC) fast decoding method is disclosed and the method comprises an IRIG-B(DC) fast decoding step and a step of sending decoding messages via serial ports after the decoding messages are packeted. According to the FPGA-based IRIG-B(DC) fast decoding method, via use of FPGA technologies, on-line data monitoring technologies, serial port communication technologies and the like, defects of a conventional IRIG-B code time unification system developed via use of discrete elements can be address, wherein the defects of the conventional IRIG-B code time unification system is are circuit complexity, low integration level, difficult-to-debug characteristic, large size, high cost, low confidentiality and the like; most requirements for precision can also be met by the FPGA-based IRIG-B(DC) fast decoding method.
Owner:YUNNAN POWER GRID CO LTD ELECTRIC POWER RES INST +1

Video data protection system and processing method

PendingCN107426628ALow confidentiality requirementsConstruction cost advantageTransmissionSelective content distributionVideo storageLow confidentiality
The invention relates to a video data protection system and a processing method. The video data protection system comprises a video generating module, a video encrypting module, a key module, a video storage module, a permission authenticating module and a video application module. Specific to a personal user scene, the video generating module, the video encrypting module, the key module, the video storage module and the permission authenticating module are encapsulated into a camera with a function of preventing playing without authorization. Specific to a social scene, the video generating module and the video encrypting module are encapsulated into a social video collection agent; and the permission authenticating module, the key module and the video storage module are encapsulated into a social equipment integrating system. The video data protection system has low confidentiality requirement on the storage and transmission of video data; a used key can be updated on time, so that video breaking difficulty is improved; a file access way is adopted, real-time video data are acquired as the access of ordinary files, so that the real-time video data acquiring difficulty is lowered.
Owner:BEIJING GUOCHUANG KESHI TECH

Commodity package and two-dimensional code anti-counterfeiting method thereof

The invention relates to a commodity package and a two-dimensional code anti-counterfeiting method thereof. The commodity package and the two-dimensional code anti-counterfeiting method thereof settletechnical problems of low confidentiality, inconvenient searching and complicated production management. The commodity package comprises one or more first packages, one or more second packages and athird package. The two-dimensional code anti-counterfeiting method comprises the steps of utilizing a randomly generated two-dimensional code; generating a first package anti-counterfeiting code and asecond package anti-counterfeiting code according to the two-dimensional code; arranging the two-dimensional code on the external surface of the second package; spraying the second package anti-counterfeiting code on the external surface of the second package, spraying the first package anti-counterfeiting code on the external surface of the first package, randomly generated a third package anti-counterfeiting code, and correlating the third package anti-counterfeiting code with the second package anti-counterfeiting code on the external surfaces of all second packages in the third package; and arranging the third package anti-counterfeiting code on the third package. The commodity package and the two-dimensional code anti-counterfeiting method thereof have advantages of improving counterfeiting difficulty and improving confidentiality grade. The commodity package and the two-dimensional code anti-counterfeiting method thereof can be used in commodity two-dimensional code anti-counterfeiting operation.
Owner:GUIZHOU MOUTAI WINERY GRP XIJIU CO LTD

Wireless communication method and system

The invention relates to a wireless communication method and system, and aims to solve the technical problems of low confidentiality and low efficiency. A transmitter comprises a baseband coding unitfor converting data into a baseband coding signal, a central processing unit connected with the baseband coding unit, a modulation module connected with the central processing unit, at least two lasermodules, a timing unit and a temperature detection unit, wherein each laser module is provided with an identification code; the central processing unit selects one of the laser modules according to timing parameters of the timing unit and temperature parameters of the temperature detection unit to serve as a laser transmitting module; the laser transmitting module is controlled to transmit a laser signal according to a coding result from the modulation module; the modulation module comprises a plurality of modulation sub-units; each modulation sub-unit corresponds to one modulation method; and the modulation module chooses a corresponding modulation sub-unit according to a modulation identification code of the central processing unit. Through adoption of the wireless communication methodand system, the problem is well solved. The wireless communication method and system can be applied to wireless communication.
Owner:广西奕兴信息科技有限公司

Paper medium destroying system

PendingCN110935533AAvoid the problem of real-time cleaning due to small capacityEffective control of water levelGrain treatmentsLow confidentialityProcess engineering
The invention provides a paper medium destroying system and relates to the paper medium destroying technology field. Technical problems that a paper shredding effect of an existing paper shredding device can only satisfy occasions with a low confidentiality level and the device cannot be applied to the occasions with high confidentiality levels; the existing paper shredding device can automatically shut down for cooling after continuously working for a period of time and is low in working efficiency; and a volume of a paper shredding barrel is limited so that the volume of shredded paper is small in the prior art are solved. The device comprises a shell, a first-stage destroying module and a second-stage destroying module, wherein the first-stage destroying module and the second-stage destroying module are successively arranged in the shell. The first-stage destroying module is located at a top of the second-stage destroying module, the first-stage destroying module comprises a cuttercomponent, and the second-stage destroying module comprises a water inlet control device, a paper liquid adjusting device and a discharging pipeline which are successively arranged. The system is usedfor thoroughly destroying a paper medium.
Owner:ANFANG HI TECH ELECTROMAGNETIC SAFETY TECHN BEIJING

A low temperature storage box

The invention discloses a novel low-temperature storage box, which belongs to the technical field of storage boxes. It solves the problems that the existing low-temperature storage box can be opened and closed at will, the items in the box are easy to move and extract at will, and the security is low. The new low-temperature storage box includes a door body and a box body, the door body is locked with the box body, and a face recognition system is provided on the door body. The face recognition system includes an image recognition processing module, an electromagnetic switch module and a power supply module; the power supply module and The image recognition processing module and the electromagnetic switch module are connected separately to supply power to the image recognition processing module and the electromagnetic switch module; the image recognition processing module matches the acquired sample image with the image information in the database, and if the matching is successful, the unlocking signal is transmitted to the electromagnetic switch module , the electromagnetic switch module includes a first electromagnetic pole and a second electromagnetic pole that attract each other, and the first electromagnetic pole is located on the door body.
Owner:QINGDAO AUCMA ULTRA LOW TEMPERATURE FREEZING MACHINES

Fusion encryption image information hiding method

The invention discloses a fusion encryption image information hiding method, and relates to the technical field of image information encryption (communication technology), and the method comprises the steps: S1, preparing original to-be-hidden information; s2, encrypting the hidden information; s3, embedding a hidden file; s4, encrypting an original carrier image; s5, decoding the hidden information; s6, extracting hidden information; the method has the beneficial effects that firstly, by using a multi-layer encryption technology, information with a relatively high confidentiality level is placed in a deep layer, and information with a relatively low confidentiality level is placed in a surface layer, so that authorized personnel of different levels can see encrypted information of corresponding levels, and the security of the encrypted information is improved; compared with the prior art, the method has the advantages that the information transmission safety is improved, meanwhile, the freedom and applicability of watching objects during information encryption are improved, the effective time and the failure time of the information and the key can be set according to the use requirement by adopting the dynamic encryption technology, so that the method is suitable for part of special scenes, and the timeliness of information transmission is improved.
Owner:NORTHEASTERN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products