CN113378241A - Safety technology prevention engineering design system and method - Google Patents

Safety technology prevention engineering design system and method Download PDF

Info

Publication number
CN113378241A
CN113378241A CN202110699301.8A CN202110699301A CN113378241A CN 113378241 A CN113378241 A CN 113378241A CN 202110699301 A CN202110699301 A CN 202110699301A CN 113378241 A CN113378241 A CN 113378241A
Authority
CN
China
Prior art keywords
design
user
simulation interval
temporary simulation
temporary
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110699301.8A
Other languages
Chinese (zh)
Other versions
CN113378241B (en
Inventor
张敏
杨宇霆
刘杨
宋洪彬
万长春
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anhui Zhongdian Guangda Communication Technology Co ltd
Original Assignee
Anhui Zhongdian Guangda Communication Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anhui Zhongdian Guangda Communication Technology Co ltd filed Critical Anhui Zhongdian Guangda Communication Technology Co ltd
Priority to CN202110699301.8A priority Critical patent/CN113378241B/en
Publication of CN113378241A publication Critical patent/CN113378241A/en
Application granted granted Critical
Publication of CN113378241B publication Critical patent/CN113378241B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/30Computing systems specially adapted for manufacturing

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a safety technology precaution engineering design system and a method, which relate to the technical field of safety technology precaution engineering, and encrypt the operation content of a user in a temporary simulation interval and the temporary simulation interval by an encryption module; then, the operation content of the user in the temporary simulation interval is marked, and a second encryption key is generated, so that the operation content of the user in the temporary simulation interval is encrypted, the temporary simulation interval used by the user can be directly protected by setting the first encryption key, and the external opening is prevented; meanwhile, the operation content in the temporary simulation interval is protected through the second encryption key, so that the operation content in the temporary simulation interval is prevented from leaking, and the confidentiality of the content designed by a user can be effectively improved through the encryption module.

Description

Safety technology prevention engineering design system and method
Technical Field
The invention belongs to the technical field of safety technology precaution engineering, and particularly relates to a safety technology precaution engineering design system and a method.
Background
The safety precaution project refers to projects such as alarming, television monitoring, communication, entrance and exit control, explosion prevention, safety inspection and the like for the purposes of maintaining social public safety and preventing disaster accidents. The security technology precaution is a branch of the social public security science and technology, and has relatively independent technical content and professional systems.
The design process of safety protection usually has very strong confidentiality, so the designed content is usually required to be protected after the design process and the design are finished, and the existing design system only has the design function and cannot provide the encryption protection function for the designed content for users.
Disclosure of Invention
The invention aims to provide a safety technology precaution engineering design system and a method.
The technical problem to be solved by the invention is as follows: how to improve the confidentiality in the design process of security technology prevention engineering so as to determine that the designed content and scheme cannot be stolen or tampered.
The purpose of the invention can be realized by the following technical scheme: a safety technology precaution engineering design system comprises a cloud platform, a database, a login verification module, a retrieval module, a platform sharing module, an encryption module and an intelligent analysis module;
the database is used for establishing a design material index sub-library and a design standard sub-library;
the retrieval module is used for a user to input design parameters in the system and establish a temporary simulation interval;
the encryption module is used for encrypting the operation content of the user in the temporary simulation interval and the temporary simulation interval, and the specific process comprises the following steps:
step M1: marking the temporary simulation interval and generating a first encryption key, wherein the first encryption key is used for encrypting the temporary simulation interval;
step M2: the first encryption key and the user personal information are bound, when a user logs in the system through the login verification module, the user personal information used when the user logs in the system is sent to the corresponding temporary simulation interval, and decryption of the temporary simulation interval is completed;
step M3: marking the operation content of the user in the temporary simulation interval, and generating a second encryption key, wherein the second encryption key is used for encrypting the operation content of the user in the temporary simulation interval;
step M4: generating a key input window according to the second encryption key, and inputting the second encryption key through the key input window when a user enters the temporary simulation interval to finish decryption of operation contents of the user in the temporary simulation interval;
and the intelligent analysis module is used for analyzing the operation content of the user in the temporary simulation interval by combining the design standard sub-library according to the operation content of the user in the temporary simulation interval.
As a further scheme of the invention, the establishment process of the design material index sub-library comprises the following steps: firstly, establishing a material storage set, and importing design materials into the material storage set; secondly, marking each design material in the material storage set, generating index sequences, wherein each index sequence corresponds to each design material one by one, each index sequence is independent, and all the index sequences are stored in the index sequence set; and finally, binding the material storage set with the index sequence set, thereby establishing a material index sub-library.
As a further aspect of the present invention, the process of establishing the design criteria sub-library comprises: firstly, establishing a material design mark set, importing material design standards corresponding to each design material, then binding each material design standard with the corresponding design material, and generating a design standard sub-library.
As a further aspect of the present invention, the specific working process of the retrieval module includes the following steps: creating a temporary simulation interval, and performing communication connection on the temporary simulation interval and a database; inputting an index sequence in the temporary simulation interval, and acquiring a corresponding design material according to the index sequence input by a user; and carrying out parameter setting on the acquired design materials, and placing the set design materials in a temporary simulation interval.
As a further aspect of the present invention, the specific analysis process of the intelligent analysis module includes the following steps:
marking all design materials of a user in the temporary simulation interval, and obtaining design parameters set by each design material; matching each obtained material and the design parameters corresponding to each material with the material design standards corresponding to the design standard sub-library; when the design parameters of the design materials in the temporary simulation interval meet the material design standard, the design content in the temporary simulation interval is qualified, and then a matching result is output; when the design parameters of the design materials in the temporary simulation interval do not accord with the material design standard, the design contents in the temporary simulation interval are unqualified; and when the design content in the temporary simulation interval is unqualified, highlighting the part which does not meet the material design standard in the temporary simulation interval, and giving the specific content of the non-conforming item.
As a further scheme of the present invention, the platform sharing module is used for a user to share the design content or design process of the user with other users in the system, and an online communication area is disposed in the platform sharing module, and communication modes of the online communication area include text communication, voice communication, and video communication.
As a further aspect of the present invention, the login verification module is used for a user to perform online registration of personal information and login to a system, where the registration of the personal information includes: the user enters a login verification module, personal information of the user is input, the personal information of the user comprises the name, the sex, the age, the mobile phone number of real-name authentication and the front face photo of the user, then user registration is carried out, and the mobile phone number of the real-name authentication is automatically bound with the system; after the user registration is completed, sending the personal information of the user to a cloud platform for storage; the user verifies and logs in through the login verification module so as to enter the system, and the process of logging in the system specifically comprises the following steps: and inputting the mobile phone number authenticated by the real name into a login verification module, and then inputting a verification code received by the mobile phone, so as to perform face recognition verification on the user, and entering the system after the verification is successful.
A safety technology protection engineering design method comprises the following steps:
the method comprises the following steps: the registration of personal information is carried out through a login verification module, and a login system is carried out after the registration is finished;
step two: creating a temporary simulation interval, inputting an index sequence in the temporary simulation interval to further obtain a design material stored in a database, and then performing parameter setting on the design material;
step three: encrypting the temporary simulation interval and the operation content in the temporary simulation interval through an encryption module;
step four: and the user shares the design process with other users in the system through the platform sharing module.
The invention has the beneficial effects that: through the encryption module, the operation content of a user in the temporary simulation interval and the encryption of the temporary simulation interval are encrypted, the temporary simulation interval is marked at first, and a first encryption key is generated, so that the encryption of the temporary simulation interval is completed; then, the operation content of the user in the temporary simulation interval is marked, and a second encryption key is generated, so that the operation content of the user in the temporary simulation interval is encrypted, the temporary simulation interval used by the user can be directly protected by setting the first encryption key, and the external opening is prevented; meanwhile, the operation content in the temporary simulation interval is protected through the second encryption key, so that the operation content in the temporary simulation interval is prevented from leaking, and the confidentiality of the content designed by a user can be effectively improved through the encryption module.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic block diagram of a security engineering design system and method.
Detailed Description
As shown in fig. 1, a security engineering design system includes a cloud platform, a database, a login verification module, a retrieval module, a platform sharing module, an encryption module, and an intelligent analysis module;
the login verification module is used for the user to perform online registration of personal information and login system, and the registration of the personal information comprises the following steps: the user enters a login verification module, personal information of the user is input, the personal information of the user comprises the name, the sex, the age, the mobile phone number of real-name authentication and the front face photo of the user, then user registration is carried out, and the mobile phone number of the real-name authentication is automatically bound with the system; after the user registration is completed, sending the personal information of the user to the cloud platform for storage; the user verifies and logs in through the login verification module so as to enter the system, and the process of logging in the system specifically comprises the following steps: and inputting the mobile phone number authenticated by the real name into a login verification module, and then inputting a verification code received by the mobile phone, so as to perform face recognition verification on the user, and entering the system after the verification is successful.
The database is used for establishing a design material index sub-library and a design standard sub-library, and the specific process comprises the following steps:
step S1: establishing a material storage set, and introducing design materials into the material storage set;
step S2: marking each design material in the material storage set, generating index sequences, wherein each index sequence corresponds to each design material one by one, each index sequence is independent, and all the index sequences are stored in the index sequence set;
step S3: binding the material storage set with the index sequence set so as to establish a material index sub-library;
step S4: and establishing a material design mark set, importing material design standards corresponding to each design material, binding each material design standard with the corresponding design material, and generating a design standard sub-library.
In the actual use process, the user can re-edit the index sequence according to own use habits and preferences, and the re-edited index sequence automatically replaces the original index sequence.
The retrieval module is used for a user to input design parameters in the system and establish a temporary simulation area, and the specific process comprises the following steps:
step X1: creating a temporary simulation interval, and performing communication connection on the temporary simulation interval and a database;
step X2: inputting an index sequence in the temporary simulation interval, and acquiring a corresponding design material according to the index sequence input by a user;
step X3: and carrying out parameter setting on the acquired design materials, and placing the set design materials in a temporary simulation interval.
In the actual operation process, all operations of the user in the temporary simulation interval are generated into an operation log according to the operation sequence, when the user needs to trace the operation content, the operation log can be used for inquiring the operation record, and the operation record directly enters the state of the temporary simulation interval corresponding to the operation record.
The encryption module is used for encrypting the operation content of the user in the temporary simulation interval and the temporary simulation interval, and the specific process comprises the following steps:
step M1: marking the temporary simulation interval and generating a first encryption key, wherein the first encryption key is used for encrypting the temporary simulation interval;
step M2: the first encryption key and the user personal information are bound, when a user logs in the system through the login verification module, the user personal information used when the user logs in the system is sent to the corresponding temporary simulation interval, and decryption of the temporary simulation interval is completed;
step M3: marking the operation content of the user in the temporary simulation interval, and generating a second encryption key, wherein the second encryption key is used for encrypting the operation content of the user in the temporary simulation interval;
step M4: and generating a key input window according to the second encryption key, and inputting the second encryption key through the key input window when the user enters the temporary simulation interval to finish the decryption of the operation content of the user in the temporary simulation interval.
In the actual use process, the encryption module can be selectively used according to the requirements of a user, when the user needs to encrypt a temporary simulation interval in use, the encryption module can encrypt the temporary simulation interval and the operation content of the user in the temporary simulation interval, and when the temporary simulation interval is not operated within a certain time threshold, the encryption module starts a second encryption key to encrypt the operation content in the temporary simulation interval, so that the design content is protected from leaking; when a user selects to disclose the temporary simulation interval in use, connecting the temporary simulation interval with the platform sharing module;
the intelligent analysis module is used for analyzing the operation content of the user in the temporary simulation interval by combining a design standard sub-library according to the operation content of the user in the temporary simulation interval, and the specific process comprises the following steps:
step F1: marking all design materials of a user in the temporary simulation interval, and obtaining design parameters set by each design material;
step F2: matching the data obtained in the step F1 with the material design standard corresponding to the design standard sub-library;
step F3: when the design parameters of the design materials in the temporary simulation interval meet the material design standard, the design content in the temporary simulation interval is qualified, and then a matching result is output; when the design parameters of the design materials in the temporary simulation interval do not meet the material design standard, indicating that the design contents in the temporary simulation interval are unqualified, and performing the next step;
step F4: and when the design content in the temporary simulation interval is unqualified, highlighting the part which does not accord with the material design standard in the temporary simulation interval, and giving the specific content of the non-conformity item, wherein the specific content of the non-conformity item comprises the name and the deviation amount of the non-conformity item.
The platform sharing module is used for sharing the design content or the design process of a user with other users in the system, an online communication area is arranged in the platform sharing module, and communication modes of the online communication area comprise character communication, voice communication and video communication.
A safety technology protection engineering design method comprises the following steps:
the method comprises the following steps: the registration of personal information is carried out through a login verification module, and a login system is carried out after the registration is finished;
step two: creating a temporary simulation interval, inputting an index sequence in the temporary simulation interval to further obtain a design material stored in a database, and then performing parameter setting on the design material;
step three: encrypting the temporary simulation interval and the operation content in the temporary simulation interval through an encryption module; the encryption module encrypts the temporary simulation interval and the operation content in the temporary simulation interval by generating a first encryption key and a second encryption key, when a user needs to encrypt the temporary simulation interval in use, the encryption module can encrypt the temporary simulation interval and the operation content of the user in the temporary simulation interval, and when the temporary simulation interval is not operated within a certain time threshold, the encryption module starts the second encryption key to encrypt the operation content in the temporary simulation interval;
step four: and the user shares the design process with other users in the system through the platform sharing module.
The foregoing is illustrative and explanatory of the structure of the invention, and various modifications, additions or substitutions in a similar manner to the specific embodiments described may be made by those skilled in the art without departing from the structure or scope of the invention as defined in the claims. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In the description of the present invention, "a plurality" means at least two, e.g., two, three, etc., unless specifically limited otherwise.

Claims (8)

1. A safety technology precaution engineering design system is characterized by comprising a cloud platform, a database, a login verification module, a retrieval module, a platform sharing module, an encryption module and an intelligent analysis module;
the database is used for establishing a design material index sub-library and a design standard sub-library;
the retrieval module is used for a user to input design parameters in the system and establish a temporary simulation interval;
the encryption module is used for encrypting the operation content of the user in the temporary simulation interval and the temporary simulation interval, and the specific process comprises the following steps:
step M1: marking the temporary simulation interval and generating a first encryption key, wherein the first encryption key is used for encrypting the temporary simulation interval;
step M2: the first encryption key and the user personal information are bound, when a user logs in the system through the login verification module, the user personal information used when the user logs in the system is sent to the corresponding temporary simulation interval, and decryption of the temporary simulation interval is completed;
step M3: marking the operation content of the user in the temporary simulation interval, and generating a second encryption key, wherein the second encryption key is used for encrypting the operation content of the user in the temporary simulation interval;
step M4: generating a key input window according to the second encryption key, and inputting the second encryption key through the key input window when the user enters the temporary simulation interval to finish decryption of the operation content of the user in the temporary simulation interval;
and the intelligent analysis module is used for analyzing the operation content of the user in the temporary simulation interval by combining the design standard sub-library according to the operation content of the user in the temporary simulation interval.
2. The safety engineering design system of claim 1, wherein the process of building the index repository of design materials comprises: firstly, establishing a material storage set, and importing design materials into the material storage set; secondly, marking each design material in the material storage set, generating index sequences, wherein each index sequence corresponds to each design material one by one, each index sequence is independent, and all the index sequences are stored in the index sequence set; and finally, binding the material storage set with the index sequence set, thereby establishing a material index sub-library.
3. The system of claim 1, wherein the process of creating the design criteria sub-library comprises: firstly, establishing a material design mark set, importing material design standards corresponding to each design material, then binding each material design standard with the corresponding design material, and generating a design standard sub-library.
4. The system of claim 1, wherein the specific operation process of the search module comprises the following steps: creating a temporary simulation interval, and performing communication connection on the temporary simulation interval and a database; inputting an index sequence in the temporary simulation interval, and acquiring a corresponding design material according to the index sequence input by a user; and carrying out parameter setting on the acquired design materials, and placing the set design materials in a temporary simulation interval.
5. The safety engineering protection engineering design system according to claim 1, wherein the specific analysis process of the intelligent analysis module comprises the following steps:
marking all design materials of a user in the temporary simulation interval, and obtaining design parameters set by each design material; matching each obtained material and the design parameters corresponding to each material with the material design standards corresponding to the design standard sub-library; when the design parameters of the design materials in the temporary simulation interval meet the material design standard, the design content in the temporary simulation interval is qualified, and then a matching result is output; when the design parameters of the design materials in the temporary simulation interval do not accord with the material design standard, the design contents in the temporary simulation interval are unqualified; and when the design content in the temporary simulation interval is unqualified, highlighting the part which does not meet the material design standard in the temporary simulation interval, and giving the specific content of the non-conforming item.
6. The system of claim 1, wherein the platform sharing module is configured to enable a user to share their design content or design process with other users in the system, and an online communication area is disposed in the platform sharing module, and communication modes of the online communication area include text communication, voice communication, and video communication.
7. The system of claim 1, wherein the login verification module is configured to perform online registration of personal information and login to the system, and the registration of personal information comprises: the user enters a login verification module, personal information of the user is input, the personal information of the user comprises the name, the sex, the age, the mobile phone number of real-name authentication and the front face photo of the user, then user registration is carried out, and the mobile phone number of the real-name authentication is automatically bound with the system; after the user registration is completed, sending the personal information of the user to the cloud platform for storage; the user verifies and logs in through the login verification module so as to enter the system, and the process of logging in the system specifically comprises the following steps: and inputting the mobile phone number authenticated by the real name into a login verification module, and then inputting a verification code received by the mobile phone, so as to perform face recognition verification on the user, and entering the system after the verification is successful.
8. A safety technology protection engineering design method is characterized by comprising the following steps:
the method comprises the following steps: the registration of personal information is carried out through a login verification module, and a login system is carried out after the registration is finished;
step two: creating a temporary simulation interval, inputting an index sequence in the temporary simulation interval to further obtain a design material stored in a database, and then performing parameter setting on the design material;
step three: encrypting the temporary simulation interval and the operation content in the temporary simulation interval through an encryption module;
step four: and the user shares the design process with other users in the system through the platform sharing module.
CN202110699301.8A 2021-06-23 2021-06-23 Safety technology protection engineering design system and method Active CN113378241B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110699301.8A CN113378241B (en) 2021-06-23 2021-06-23 Safety technology protection engineering design system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110699301.8A CN113378241B (en) 2021-06-23 2021-06-23 Safety technology protection engineering design system and method

Publications (2)

Publication Number Publication Date
CN113378241A true CN113378241A (en) 2021-09-10
CN113378241B CN113378241B (en) 2023-07-28

Family

ID=77578709

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110699301.8A Active CN113378241B (en) 2021-06-23 2021-06-23 Safety technology protection engineering design system and method

Country Status (1)

Country Link
CN (1) CN113378241B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001091403A2 (en) * 2000-05-23 2001-11-29 V. N. Hermes, Inc. Secured electronic mail system and method
CN101977190A (en) * 2010-10-25 2011-02-16 北京中科联众科技有限公司 Digital content encryption transmission method and server side
CN102281291A (en) * 2011-07-18 2011-12-14 李建成 Log-in method and system
KR20120028111A (en) * 2010-09-14 2012-03-22 표세진 Authentication method using two communication terminals
CN106302312A (en) * 2015-05-13 2017-01-04 阿里巴巴集团控股有限公司 Obtain the method and device of e-file
CN106453052A (en) * 2016-10-14 2017-02-22 北京小米移动软件有限公司 Message interaction method and apparatus thereof
CN110221852A (en) * 2019-05-15 2019-09-10 深兰科技(上海)有限公司 A kind of firmware upgrade method and device
AU2020100734A4 (en) * 2019-05-24 2020-06-18 Medikey Australia Pty Ltd Systems and methods for secure digital file sharing and authenticating

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001091403A2 (en) * 2000-05-23 2001-11-29 V. N. Hermes, Inc. Secured electronic mail system and method
KR20120028111A (en) * 2010-09-14 2012-03-22 표세진 Authentication method using two communication terminals
CN101977190A (en) * 2010-10-25 2011-02-16 北京中科联众科技有限公司 Digital content encryption transmission method and server side
CN102281291A (en) * 2011-07-18 2011-12-14 李建成 Log-in method and system
CN106302312A (en) * 2015-05-13 2017-01-04 阿里巴巴集团控股有限公司 Obtain the method and device of e-file
CN106453052A (en) * 2016-10-14 2017-02-22 北京小米移动软件有限公司 Message interaction method and apparatus thereof
CN110221852A (en) * 2019-05-15 2019-09-10 深兰科技(上海)有限公司 A kind of firmware upgrade method and device
AU2020100734A4 (en) * 2019-05-24 2020-06-18 Medikey Australia Pty Ltd Systems and methods for secure digital file sharing and authenticating

Also Published As

Publication number Publication date
CN113378241B (en) 2023-07-28

Similar Documents

Publication Publication Date Title
CN110555029B (en) Ticket management method, device and storage medium based on block chain
TWI764037B (en) Interaction method and system across blockchain, computer equipment and storage medium
CN107169374B (en) Encryption and decryption system and method based on voiceprint and voice recognition technology
CN100533456C (en) Security code production method and methods of using the same, and programmable device therefor
CN109688133B (en) Communication method based on account login free
CN103457733B (en) A kind of cloud computing environment data sharing method and system
CN110177088B (en) Temporary identity authentication method, device and system
CN113011632B (en) Enterprise risk assessment method, device, equipment and computer readable storage medium
CN112673600A (en) Multi-security authentication system and method between mobile phone terminal and IoT (Internet of things) equipment based on block chain
US11403380B2 (en) Method for managing fingerprint and system thereof
CN106023382B (en) A kind of method and system realizing dynamic code electronic lock two-way authentication and unlocking
CN115118419B (en) Data transmission method of security chip, security chip device, equipment and medium
EP2835997A1 (en) Cell phone data encryption method and decryption method
CN111415443A (en) Remote unlocking method and device
CN113360936A (en) Data analysis system based on block chain
CN102821110B (en) A kind of password method for retrieving for audio/video storage device
CN113726515A (en) UKEY-based key processing method, storage medium and electronic device
CN103685743A (en) Voice-control authentication unlocking system and unlocking method thereof
CN106254226A (en) A kind of information synchronization method and device
CN113378241B (en) Safety technology protection engineering design system and method
CN114676455B (en) Information security monitoring system based on project management
CN112702743B (en) Network data monitoring and protecting method based on artificial intelligence
CN108390753A (en) A kind of application program account logon method and system based on the retrieval of ciphertext Hash
CN110830252B (en) Data encryption method, device, equipment and storage medium
CN104794598A (en) Method and equipment for querying user information through intelligent express box

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant