Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

220results about How to "Authentication is convenient" patented technology

Method and apparatus for efficient package delivery and storage

A method and system for the efficient bulk package delivery for recipients. Items ordered by different customers from different retailers, suppliers or manufacturers can be organized by common item identifiers and shipped in bulk from retailers or manufacturers, to an origination regional distribution center. The items can be sorted at the origination regional distribution center in bulk based on the location of destination regional distribution centers that can serve destination centralized pickup locations chosen by the customers placing the orders for those items. Ordered items can be sorted by recipient and the destination centralized pickup location specified in the customer's order and packed into recipient-specific packages at the destination regional distribution center. The packages can be transported in bulk to the destination centralized pickup locations where they can be randomly loaded into any available locker bins in an automated system of stationary and moveable, configurable storage locker bins. During loading, an association can be made between an identifier of the locker bin and an identifier of the bulk delivered package for subsequent self service identification and retrieval. An electronic notification of the delivery can be automatically dispatched to the recipient by the automated system of storage locker bins to alert the recipient of the delivery.
Owner:BREAKTHROUGH LOGISTICS CORP

Electronic contract security system and method based on biological information identification

The invention discloses an electronic contract security system and method based on biological information identification, and relates to the technical field of computer information processing. In the prior art, electronic contracts can be tampered when the electronic contracts are handed to a third party to be saved, secrete keys generated by individual biological characteristics cannot be exactly the same, and exposure of characteristic information can be caused easily due to information matching and information extraction of different ways and methods. According to the electronic contract security system based on the biological information identification, encryption is carried out in the generated electronic contracts by using the biological information of applicants, identification card information of users are further overlaid to serve as the only authentication marks of the electronic contracts, time stamps are added to the electronic contracts, the electronic contracts are sent to a third party electronic security center for being saved and when clients need to have related services again or contract disputes appear, the secured electronic contracts are extracted from the electronic security center only by checking the biological characteristic information of the users and logging in an identification authentication server.
Owner:重庆信科通信建设监理咨询有限公司

User authentication method, intelligent gateway and authentication server

The embodiment of the invention provides a user authentication method, an intelligent gateway and an authentication server. In the embodiment of the invention, after receiving a first service access request sent by a user through a terminal, the intelligent gateway sends a first user authentication request including a gateway identifier and the service identifier of a target service to the authentication server; the authentication server generates an authentication token according to the gateway identifier and the service identifier, and feeds back the authentication token to the intelligent gateway; the intelligent gateway sends a second service access request carrying the authentication token, the gateway identifier, the service identifier and user login information to a third-party service system, so that the third-party service system sends a second user authentication request to the authentication server; the authentication server performs authentication processing of the user, and feeds back the authority information that the user accesses the target service to the third-party service system; thereby, the authentication server uniformly authenticates users initiating third-party service access requests; and thus, the process that the users access the third-party service system is relatively convenient and rapid.
Owner:CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products