Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

50results about "Internal/peripheral component protection" patented technology

Portable information processing device having data evacuation function and method thereof

A processor means is connected with other individual means, and controls those individual means. Storage means stores data to be processed by the processor means and the resultant data after the process. An important data in the storage means is transmitted to other devices for evacuation by using a wireless communication means, when a situating condition of a portable information-processing device is judged abnormal (e.g., when being stolen) based on an output of a status detector means. The data in the storage means is deleted, when the transmission is completed or the transmission is interrupted. Protection of the data and the confidentiality are thus achieved even if the portable information-processing device is stolen, since the data can be evacuated, and the data is erased after completion of the data evacuation or if the data evacuation becomes not attainable.
Owner:PANASONIC CORP

Automated monitoring, detection, and reporting of unauthorized movement and/or theft of vehicles and cargo

A method and an enhanced electronic logging device (ELD) enable a load lock feature of a vehicle that assists with automated theft detection, reporting, and tracking of stolen vehicles / cargo. The processor of the ELD enables the ELD to register the operator MCD to receive notifications generated by a load lock module and present on a display of the ELD at least one selectable option for activating a load lock of the vehicle, the load lock identifying that the operator has parked the vehicle and has triggered the ELD to report any movement of the vehicle that occurs while the load lock is activated. The processor generates and transmits a notification of unauthorized movement or a potential theft of the vehicle in response to receiving an input from the movement detection device indicating that the vehicle is moving or being moved from a parked location while the load lock is activated.
Owner:OVERHAUL GRP INC

Physical no-cloning technology based RFID card type intelligent door lock

The invention discloses a physical no-cloning technology based RFID card type intelligent door lock. The physical no-cloning technology based RFID card type intelligent door lock comprises RFID cards,a door lock and a database, wherein the database is arranged on a background server; while ID which corresponds to the RFID cards is received, data is compared with data in the database through an internet; the database is used for storing ID which corresponds to each RFID card; a door lock inner chip comprises a PUF circuit; the RFID chip comprises an RFID module which is used for generating motivation; after receiving the motivation, the PUF circuit generates a corresponding secret key; and the database provides a matching source and is compared with the secret key generated by the PUF circuit, so that authentication is realized, and therefore, unlocking is performed based on a door lock password authentication mode. The PUF circuit can resist probe attack and physical attack, and is not stored with the secret key information, so that other people cannot read a chip secret key through a probe and the like to steal inner information, and therefore, safety of the door lock is greatlyimproved.
Owner:HOHAI UNIV CHANGZHOU

System and method for device authorization and remediation

ActiveUS20150281190A1Digital data processing detailsUser identity/authority verificationDiagnostic dataRestoration device
A method is provided for authorizing a device for consuming content. In method includes the steps of generating an authorization request, the authorization request for authorization data including device diagnostic data (instructions) an device remedial data (instructions), transmitting the authorization request from the device to an authorizing service, and authorizing or remediating the device according to an authorization response to the authorization request received from an authorization server.
Owner:ARRIS ENTERPRISES LLC

Intelligent anti-theft alarm computer hardware protection device with locking function

The invention relates to the technical field of network information security, and discloses an intelligent anti-theft alarm computer hardware protection device with a locking function, which comprisesa hardware main body, a computer component is inserted into the inner side of the hardware main body, and a second connecting rod is arranged on the lower side of a first connecting rod; a first rotating block is rotatably connected to the lower side of the second connecting rod, a first moving rod is rotatably connected to the lower side of the first rotating block, a second spring is arranged on the outer side of the first moving rod, a first metal block is fixedly connected to the lower side of the first moving rod, and a second metal block is arranged on the left side of the first movingrod. According to the computer hardware protection device with the intelligent anti-theft alarm function and the locking function, through the action of a second spring and a key groove in a first moving rod, the first moving rod is driven to rotate, a first metal block makes contact with a second metal block, and therefore an external alarm device is connected; by means of the structure, the effects of intelligent anti-theft alarm and high safety are achieved.
Owner:朱诵伟

Method, system and device for enhancing security of storage media and medium

The invention discloses a method, system and device for enhancing security of storage media and a medium, and relates to the field of data security; the method includes determining the number A of participating users, and wherein each participating user generates a corresponding key; deploying a multi-signature smart contract, obtaining a secure private key string corresponding to the private key of each participating user under the multi-signature smart contract, and signing each secure private key string to obtain a key set; sending the key set to a storage medium, and encrypting according to a multi-threshold encryption method to obtain encrypted data; according to the multi-signature smart contract, obtaining a decryption private key string corresponding to a private key of a decryption user, and signing each decryption private key string according to the multi-signature smart contract to obtain solution densification; sending the solution density to a storage medium to obtain decrypted data; and comparing the decrypted data with the encrypted data to judge whether decryption succeeds or not. According to the invention, the problem that the keys are difficult to manage due to too many keys in a large-scale network environment can be effectively solved.
Owner:湖北央中巨石信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products