CN108183923A - A kind of production traceability system and its method of work - Google Patents
A kind of production traceability system and its method of work Download PDFInfo
- Publication number
- CN108183923A CN108183923A CN201810149436.5A CN201810149436A CN108183923A CN 108183923 A CN108183923 A CN 108183923A CN 201810149436 A CN201810149436 A CN 201810149436A CN 108183923 A CN108183923 A CN 108183923A
- Authority
- CN
- China
- Prior art keywords
- monitor terminal
- key
- key pair
- traceability system
- video data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01D—MEASURING NOT SPECIALLY ADAPTED FOR A SPECIFIC VARIABLE; ARRANGEMENTS FOR MEASURING TWO OR MORE VARIABLES NOT COVERED IN A SINGLE OTHER SUBCLASS; TARIFF METERING APPARATUS; MEASURING OR TESTING NOT OTHERWISE PROVIDED FOR
- G01D21/00—Measuring or testing not otherwise provided for
- G01D21/02—Measuring two or more variables by means not covered by a single other subclass
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1095—Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/18—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
- H04N7/181—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a plurality of remote sources
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Multimedia (AREA)
- Storage Device Security (AREA)
Abstract
The present invention relates to a kind of production traceability system and its method of work, the production traceability system includes:Monitor terminal, server and several monitoring devices for being distributed in workshop;Wherein described monitoring device includes processor module, the video acquisition module being connected with the processor module, context detection module;The processor module is also connected with a communication module, and collected video data and environmental data are sent to server;And the server is suitable for the video data received and environmental data being sent to monitor terminal, to be preserved;The production traceability system and its method of work of the present invention is able to record the environmental data of production process and workshop, and the video data of production process and environmental data are stored in monitor terminal, information back-up subsystem is recycled to back up video data and environmental data, it is ensured that the safety of video data and environmental data.
Description
Technical field
The present invention relates to a kind of production traceability system and its method of works.
Background technology
With the development of the society, extensive manufacturing enterprise is more and more, and product quality is to determine enterprise development and life
One of an important factor for depositing, in addition to promoting quality from five people, machine, material, method, ring links, that occur quality problems when
It waits, how quickly to search out and generate the true because it is also the strength of enterprise that same quality problems is avoided, which to occur again, of quality problems
It embodies, therefore, production process, which is recorded, seems necessary.
Invention content
The object of the present invention is to provide a kind of production traceability system and its method of work, to record production process and life
The environmental data in workshop is produced, and the video data of production process and environmental data are stored in monitor terminal.
In order to solve the above technical problem, the present invention provides a kind of production traceability system, including:Monitor terminal, clothes
Business device and several monitoring devices for being distributed in workshop;Wherein described monitoring device includes processor module, with the processing
Video acquisition module that device module is connected, context detection module;The processor module is also connected with a communication module, will acquire
To video data and environmental data be sent to server;And the server is suitable for the video data and environment that will receive
Data are sent to monitor terminal, to be preserved.
Further, it is described production traceability system further include information back-up subsystem, the information back-up subsystem be suitable for pair
Video data in monitor terminal is backed up.
Further, described information backup subsystem includes:Bound device, Cloud Server, third party authentication server and institute
State monitor terminal;Wherein described monitor terminal is suitable for establishing binding relationship with bound device;The monitor terminal be suitable for obtain by
The first key pair that first public key and the first private key are formed, and using the first public key to video data and environmental data to be backed up
One-time pad encryption is carried out, obtains the first encryption information;The monitor terminal is suitable for obtaining by the second public key and second from Cloud Server
The second key pair that private key is formed;The monitor terminal is suitable for obtaining key modifier from third party authentication server, reuses
The key modifier modifies to the second key pair, obtains the third key pair being made of third public key and third private key;With
And the monitor terminal carries out secondary encryption, and will be in the second obtained encryption information using third public key to the first encryption information
Cloud Server is reached to be backed up.
Further, the monitor terminal is suitable for generation first key pair;And after one-time pad encryption is completed, by first key
It is preserved to being sent to bound device, and deletes the first key pair in monitor terminal.
Further, the bound device is suitable for generation first key pair and the monitor terminal from the bound device
First key is obtained to carrying out one-time pad encryption, and after the completion of one-time pad encryption, delete the first key pair in caching.
Further, it after the monitor terminal completes secondary encryption, is carried out suitable for third key pair is sent to bound device
It preserves, and deletes the third key pair in monitor terminal.
Further, when needing to obtain video data and environmental data, the monitor terminal is downloaded from Cloud Server and is backed up
The second encryption information and the monitor terminal obtain first key pair and third key pair from bound device, then again successively
The second encryption information and the first encryption information are decrypted respectively using third private key and the first private key, to obtain video counts
According to.
Further, it after monitor terminal obtains the second key pair from Cloud Server, is disconnected with Cloud Server;Work as needs
When uploading backup information, Cloud Server is logged in again.
Further, the key modifier is suitable for being previously provided with several set key modification strategies.
Another aspect, the present invention also provides a kind of method of work for producing traceability system, including:Monitor terminal, clothes
Business device and several monitoring devices for being distributed in workshop;Wherein described monitoring device includes processor module, with the processing
Video acquisition module that device module is connected, context detection module;The processor module is also connected with a communication module, will acquire
To video data and environmental data be sent to server;And the server is suitable for the video data and environment that will receive
Data are sent to monitor terminal, to be preserved.
The invention has the advantages that the production traceability system and its method of work of the present invention are able to record production process
And the environmental data of workshop, and the video data of production process and environmental data are stored in monitor terminal, it recycles
Information back-up subsystem backs up video data and environmental data, it is ensured that the safety of video data and environmental data,
It avoids losing video data and environmental data, and the situation of production process can not be traced and rival is avoided to steal production
The video data of process, and cause heavy losses.
Description of the drawings
The present invention is further described with reference to the accompanying drawings and examples.
Fig. 1 is the functional block diagram of present invention production traceability system;
Fig. 2 is the structure diagram of the information back-up subsystem of present invention production traceability system.
Specific embodiment
In conjunction with the accompanying drawings, the present invention is further explained in detail.These attached drawings are simplified schematic diagram, only with
Illustration illustrates the basic structure of the present invention, therefore it only shows composition related to the present invention.
Embodiment 1
Fig. 1 is the functional block diagram of present invention production traceability system.
As shown in Figure 1, the present embodiment 1 provides a kind of production traceability system, including:Monitor terminal, server and point
Cloth is in several monitoring devices of workshop;Wherein described monitoring device includes processor module, with the processor module phase
Video acquisition module even, context detection module;The processor module is also connected with a communication module, by collected video
Data and environmental data are sent to server;And the server is suitable for sending the video data and environmental data that receive
To monitor terminal, to be preserved.
Specifically, the video acquisition module is such as, but not limited to camera, and can according to the size of workshop and
The layout of production equipment carries out distribution setting,;The processor module is such as, but not limited to using MSP430 microcontrollers;It is described logical
Module is interrogated such as, but not limited to using Ethernet;The context detection module is such as, but not limited to temperature and humidity acquisition module, with
Acquire the data of the Temperature and Humidity module of workshop;The temperature and humidity acquisition module is such as, but not limited to using SHT10 Temperature Humidity Sensors.
Due to the development of cloud, the production process information that most enterprises have been accustomed to monitor backs up to cloud service
Device, although this easily, fast, but if relevant information directly is backed up to Cloud Server, once by hacker attack, is caused
The leakage of information, it will serious loss is caused to enterprise.
Therefore, the production traceability system further includes information back-up subsystem, which is suitable for prison
Video data and environmental data in control terminal are backed up.
Fig. 2 is the structure diagram of the information back-up subsystem of present invention production traceability system.
As shown in Fig. 2, described information backup subsystem includes:Bound device, Cloud Server, third party authentication server and
The monitor terminal;Wherein described monitor terminal is suitable for establishing binding relationship with bound device;The monitor terminal is suitable for obtaining
The first key pair being made of the first public key and the first private key, and using the first public key to video data to be backed up and environment number
According to one-time pad encryption is carried out, the first encryption information is obtained;The monitor terminal is suitable for obtaining by the second public key and the from Cloud Server
The second key pair that two private keys are formed;The monitor terminal is suitable for obtaining key modifier from third party authentication server, then make
It is modified with the key modifier to the second key pair, obtains the third key pair being made of third public key and third private key;
And the monitor terminal carries out the first encryption information secondary encryption, and the second encryption information that will be obtained using third public key
Cloud Server is uploaded to be backed up.
Specifically, the monitor terminal is such as, but not limited to mobile phone, computer, PAD etc.;The bound device is for example but not
Mobile phone, computer, PAD or wearable device etc. are limited to, the bound device may be the same or different with monitor terminal;
Monitor terminal and bound device establish binding relationship in advance.
Specifically, monitor terminal logs in third party authentication server, key is obtained from the third party authentication server
Modifier;Key modifier is positioned in third party authentication server by user in advance, and the key modification strategy of permission is added
It is downloaded in key modifier, so that user can timely obtain key modifier as needed.
Specifically, can have more set key modification strategies in key modifier, different information uses different modifications
Strategy, optionally, key modification strategy can be when needed adjusted by user.
The monitor terminal is suitable for generation first key pair;And after one-time pad encryption is completed, by first key to sending
It is preserved to bound device, and deletes the first key pair in monitor terminal.
Specifically, first key thereby guarantees that first key can to only having one people of user to can be generated by monitor terminal
Know, after the completion of encryption, monitor terminal preserves first key to being sent to bound device, and monitor terminal is then close by first
Key, wherein no longer preserving first key to information, even if user monitoring terminal is lost as a result, can also ensure information to deleting
It is not leaked, and then ensure that the safety of information.
The bound device is suitable for generation first key pair and the monitor terminal and obtains first from the bound device
Key pair carries out one-time pad encryption, and after the completion of one-time pad encryption, deletes the first key pair in caching.
Specifically, first key, to can also be generated by bound device, monitor terminal is obtained by the interaction with bound device
Take first key pair, be used to implement the encryption to information, after the completion of encryption, monitor terminal by first key to delete, thus, it is possible to
Leakage of the first key to information is enough prevented, so as to improve the safety of information.
After the monitor terminal completes secondary encryption, preserved suitable for third key pair is sent to bound device, and
Delete the third key pair in monitor terminal.
Specifically, monitor terminal preserves third key pair into bound device after secondary encryption is carried out, and delete slow
Third key pair in depositing;The information of first key pair and third key pair is maintained in bound device, even if the prison of enterprise
Control terminal is lost or damage, enterprise can still interact with Cloud Server according to the cipher key pair information in bound device, obtain
Take video data and environmental data.
When needing to obtain video data and environmental data, the monitor terminal is downloaded second backed up from Cloud Server and is added
Confidential information and the monitor terminal obtain first key pair and third key pair from bound device, then use third successively again
Private key and the first private key are respectively decrypted the second encryption information and the first encryption information, to obtain video data and environment number
According to.
Specifically, when needing to obtain video data and during environmental data, monitor terminal downloads the of backup from Cloud Server
Two encryption information;Monitor terminal is decrypted successively using third private key and the first private key, obtains video data and environmental data.
Wherein, it when first key pair and third key pair are stored in bound device, after the download for completing information, disconnects and being taken with cloud
The connection of business device;Then corresponding key pair is obtained from bound device again, information is decrypted, obtain video data and environment
Data so that Cloud Server is in encryption process in the environment being relatively isolated, further improve the safety of information.
After monitor terminal obtains the second key pair from Cloud Server, disconnected with Cloud Server;It is standby when needing to upload
During part information, Cloud Server is logged in again.
Specifically, the obtaining step of key modifier can be after the second key pair be obtained, i.e., from cloud from Cloud Server
After server obtains the second key pair, the connection with Cloud Server is disconnected, then performs the obtaining step of key modifier again,
It is possible thereby to so that for server side, the operation to the second key pair can not be known, further improve the safety of key
Property.
The second encryption information is decrypted specifically, the second key pair can also be realized, and is obtained and backup information class
The identical fake information of type.
It can be seen that in above process, secondary add is carried out using the third key pair being converted to through the second key pair
Close, which thereby enhance hacker breaks close difficulty, and can also be decrypted due to the use of the second key pair, even if thus cloud service
Device information leakage, what other people obtained is also fake information, can not obtain true information, however steal information side is not due to knowing
The true and false of information, then when it carries out illegal activity using fake information, it is easier to be found, it can be seen that, the present invention is not only
The safety of information is improved, while assists in and finds using illegal activities caused by the information of leakage, it is effective to ensure
User equity.
Specifically, bound device communicates with monitor terminal channel safe to use, and escape way is based on the second net
Network realizes, optionally, the second network can be short distance communication network, such as bluetooth, NFC;Monitor terminal and Cloud Server base
It communicates in the first network different from the second network;Different network environments causes at the acquisition of key and the transmission of data
Under different network environments, mutually isolated network environment improves the safety of data.
The information back-up subsystem of the present embodiment is encrypted information by first key pair and third key pair, and
And first key pair and third key pair are unknown for Cloud Server, only monitor terminal can obtain, so that i.e.
Make the information leakage of Cloud Server, other people can not also obtain original information, ensure that the safety of backup information;Moreover,
The present invention is based on multiple networks to communicate, and cipher key acquisition process is in from data transmission procedure in different networks, further
Improve the safety of network.
The production traceability system of the present invention is able to record the environmental data of production process and workshop, and will production
The video data and environmental data of process are stored in monitor terminal, recycle information back-up subsystem to video data and environment number
According to being backed up, it is ensured that the safety of video data and environmental data avoids losing video data and environmental data, and can not
It traces the situation of production process and rival is avoided to steal the video data of production process, and cause heavy losses.
Embodiment 2
On the basis of embodiment 1, the present embodiment 2 provides a kind of method of work for producing traceability system, including:Monitoring is eventually
End, server and several monitoring devices for being distributed in workshop;Wherein described monitoring device includes processor module, with this
Video acquisition module that processor module is connected, context detection module;The processor module is also connected with a communication module, will
Collected video data and environmental data are sent to server;And the server be suitable for the video data that receives and
Environmental data is sent to monitor terminal, to be preserved.
Wherein, operation principle, method of work and the course of work and reality of the production traceability system described in the present embodiment
The production traceability system applied in example 1 is identical, and details are not described herein again.
Using above-mentioned desirable embodiment according to the present invention as enlightenment, by above-mentioned description, relevant staff is complete
Various changes and amendments can be carried out without departing from the scope of the technological thought of the present invention' entirely.The technology of this invention
Property range is not limited to the content on specification, it is necessary to determine its technical scope according to right.
Claims (10)
1. a kind of production traceability system, which is characterized in that including:
Monitor terminal, server and several monitoring devices for being distributed in workshop;Wherein
The monitoring device includes processor module, the video acquisition module being connected with the processor module, context detection module;
The processor module is also connected with a communication module, and collected video data and environmental data are sent to service
Device;And
The server is suitable for the video data received and environmental data being sent to monitor terminal, to be preserved.
2. production traceability system according to claim 1, which is characterized in that
The production traceability system further includes information back-up subsystem, which is suitable for in monitor terminal
Video data and environmental data are backed up.
3. production traceability system according to claim 2, which is characterized in that
Described information backup subsystem includes:
Bound device, Cloud Server, third party authentication server and the monitor terminal;Wherein
The monitor terminal is suitable for establishing binding relationship with bound device;
The monitor terminal is suitable for obtaining the first key pair being made of the first public key and the first private key, and use the first public key pair
Video data to be backed up and environmental data carry out one-time pad encryption, obtain the first encryption information;
The monitor terminal is suitable for the second key pair being made of from Cloud Server acquisition the second public key and the second private key;
The monitor terminal is suitable for obtaining key modifier from third party authentication server, reuses the key modifier to second
Key pair is modified, and obtains the third key pair being made of third public key and third private key;And
The monitor terminal carries out the first encryption information secondary encryption, and the second encryption information that will be obtained using third public key
Cloud Server is uploaded to be backed up.
4. production traceability system according to claim 3, which is characterized in that
The monitor terminal is suitable for generation first key pair;And
After one-time pad encryption is completed, first key is preserved to being sent to bound device, and delete in monitor terminal
One key pair.
5. production traceability system according to claim 3, which is characterized in that
The bound device be suitable for generation first key pair and
The monitor terminal obtains first key to carrying out one-time pad encryption from the bound device, and after the completion of one-time pad encryption,
Delete the first key pair in caching.
6. production traceability system according to claim 4 or 5, which is characterized in that
After the monitor terminal completes secondary encryption, preserved suitable for third key pair is sent to bound device, and delete
Third key pair in monitor terminal.
7. production traceability system according to claim 6, which is characterized in that
When needing to obtain video data and environmental data, the monitor terminal downloads the second encryption letter of backup from Cloud Server
Breath and the monitor terminal obtain first key pair and third key pair from bound device, then use third private key successively again
The second encryption information and the first encryption information are decrypted respectively with the first private key, to obtain video data.
8. production traceability system according to claim 7, which is characterized in that
After monitor terminal obtains the second key pair from Cloud Server, disconnected with Cloud Server;Letter is backed up when needing to upload
During breath, Cloud Server is logged in again.
9. production traceability system according to claim 8, which is characterized in that
The key modifier is suitable for being previously provided with several set key modification strategies.
10. a kind of method of work for producing traceability system, which is characterized in that including:
Monitor terminal, server and several monitoring devices for being distributed in workshop;Wherein
The monitoring device includes processor module, the video acquisition module being connected with the processor module, context detection module;
The processor module is also connected with a communication module, and collected video data and environmental data are sent to service
Device;And
The server is suitable for the video data received and environmental data being sent to monitor terminal, to be preserved.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810149436.5A CN108183923B (en) | 2018-02-13 | 2018-02-13 | Production traceability system and working method thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810149436.5A CN108183923B (en) | 2018-02-13 | 2018-02-13 | Production traceability system and working method thereof |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108183923A true CN108183923A (en) | 2018-06-19 |
CN108183923B CN108183923B (en) | 2020-11-10 |
Family
ID=62552802
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810149436.5A Active CN108183923B (en) | 2018-02-13 | 2018-02-13 | Production traceability system and working method thereof |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108183923B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109218290A (en) * | 2018-08-13 | 2019-01-15 | 常州轻工职业技术学院 | Industrial product quality management platform and its working method based on big data |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101404574A (en) * | 2008-11-19 | 2009-04-08 | 北京握奇数据系统有限公司 | Method and system for handling service through mobile sale point terminal |
US8321688B2 (en) * | 2009-06-12 | 2012-11-27 | Microsoft Corporation | Secure and private backup storage and processing for trusted computing and data services |
CN103729730A (en) * | 2013-12-13 | 2014-04-16 | 武汉方南科技有限公司 | Visual monitoring traceability system and method for animal husbandry products |
CN103973713A (en) * | 2014-05-29 | 2014-08-06 | 华翔腾数码科技有限公司 | Transfer method, extraction method and processing system for electronic mail information |
CN203950418U (en) * | 2013-12-25 | 2014-11-19 | 北京星河易达科技有限公司 | A kind of various dimensions Internet of Things alarm monitoring system |
CN104333545A (en) * | 2014-10-26 | 2015-02-04 | 重庆智韬信息技术中心 | Method for encrypting cloud storage file data |
CN104580208A (en) * | 2015-01-04 | 2015-04-29 | 华为技术有限公司 | Identity authentication method and device |
CN105208028A (en) * | 2015-09-30 | 2015-12-30 | 北京金山安全软件有限公司 | Data transmission method and related device and equipment |
WO2016093837A1 (en) * | 2014-12-11 | 2016-06-16 | Hewlett Packard Enterprise Development Lp | Determining term scores based on a modified inverse domain frequency |
CN107437185A (en) * | 2016-05-26 | 2017-12-05 | 天津牧耘科技有限公司 | A kind of agricultural material product quality safety monitoring system based on Internet of Things |
-
2018
- 2018-02-13 CN CN201810149436.5A patent/CN108183923B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101404574A (en) * | 2008-11-19 | 2009-04-08 | 北京握奇数据系统有限公司 | Method and system for handling service through mobile sale point terminal |
US8321688B2 (en) * | 2009-06-12 | 2012-11-27 | Microsoft Corporation | Secure and private backup storage and processing for trusted computing and data services |
CN103729730A (en) * | 2013-12-13 | 2014-04-16 | 武汉方南科技有限公司 | Visual monitoring traceability system and method for animal husbandry products |
CN203950418U (en) * | 2013-12-25 | 2014-11-19 | 北京星河易达科技有限公司 | A kind of various dimensions Internet of Things alarm monitoring system |
CN103973713A (en) * | 2014-05-29 | 2014-08-06 | 华翔腾数码科技有限公司 | Transfer method, extraction method and processing system for electronic mail information |
CN104333545A (en) * | 2014-10-26 | 2015-02-04 | 重庆智韬信息技术中心 | Method for encrypting cloud storage file data |
WO2016093837A1 (en) * | 2014-12-11 | 2016-06-16 | Hewlett Packard Enterprise Development Lp | Determining term scores based on a modified inverse domain frequency |
CN104580208A (en) * | 2015-01-04 | 2015-04-29 | 华为技术有限公司 | Identity authentication method and device |
CN105208028A (en) * | 2015-09-30 | 2015-12-30 | 北京金山安全软件有限公司 | Data transmission method and related device and equipment |
CN107437185A (en) * | 2016-05-26 | 2017-12-05 | 天津牧耘科技有限公司 | A kind of agricultural material product quality safety monitoring system based on Internet of Things |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109218290A (en) * | 2018-08-13 | 2019-01-15 | 常州轻工职业技术学院 | Industrial product quality management platform and its working method based on big data |
Also Published As
Publication number | Publication date |
---|---|
CN108183923B (en) | 2020-11-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106686008B (en) | Information storage means and device | |
CN104144049B (en) | A kind of encryption communication method, system and device | |
CN104852925B (en) | Mobile intelligent terminal anti-data-leakage secure storage, backup method | |
JP2018500843A (en) | Cloud storage method and system | |
CN104348914B (en) | A kind of tamper resistant systems file syn chronizing system and its method | |
CN108540479B (en) | Intelligent charging spot management system and its working method based on Cloud Server | |
CN107454590A (en) | A kind of data ciphering method, decryption method and wireless router | |
WO2013112187A1 (en) | Secure peer discovery and authentication using a shared secret | |
CN107172001B (en) | Control method and device of website proxy server and key proxy server | |
CN105101183A (en) | Method and system for protecting private contents at mobile terminal | |
AU2016269390A1 (en) | System and method for secure communications between a computer test tool and a cloud-based server | |
CN107993073A (en) | A kind of face identification system and its method of work | |
Kravets et al. | Mobile security solution for enterprise network | |
CN102882851B (en) | The generation method of address list and server | |
CN108512860B (en) | The working method of intelligent charging spot management system based on Cloud Server | |
CN106357678A (en) | Cloud encryption storage method for intelligent terminal and intelligent terminal | |
CN103530581A (en) | Hard disk encrypting method and operation system | |
CN108471371A (en) | A kind of intelligent domestic system and its working method | |
CN102970228A (en) | Message transmission method and equipment based on IPsec (Internet Protocol Security) | |
CN108206738B (en) | Quantum key output method and system | |
CN109218290A (en) | Industrial product quality management platform and its working method based on big data | |
CN108183923A (en) | A kind of production traceability system and its method of work | |
CN110324374A (en) | A kind of mobile device and its working method for information security backup | |
CN111181905B (en) | File encryption method and device | |
KR102219018B1 (en) | Blockchain based data transmission method in internet of things |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |