Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

33results about How to "Avoid authentication failures" patented technology

Blockchain copyright protection system and method based on double chains

The invention discloses a blockchain copyright protection system and method based on double chains. The blockchain copyright protection system comprises a user operation module, a work DNA extractionmodule, a work auditing module, an intelligent contract module, a blockchain storage module and a user feedback module. The system combines the blockchain technology with the improved Simhash algorithm to realize a duplicate checking detection function before the work applies for the copyright, provides a manual detection verification service for a user, ensures the originality of the chained work, and solves the problem of low auditing efficiency of a copyright registration institution at the same time. A double-chain storage mode is adopted for work copyright information storage. Different nodes are added into channels of corresponding chains, transparency of work transaction information is guaranteed, privacy of work content information is also guaranteed, the problem that work contentis tampered and work copyright DNA cannot be successfully verified due to database storage is avoided, and double-chain storage guarantees data reading and writing efficiency of a block chain system.
Owner:铭数科技(青岛)有限公司

Identity authentication method, system and device based on block chain and computer equipment

The invention relates to an identity authentication method, system and device based on a block chain, computer equipment and a storage medium. The method comprises the following steps: receiving a login request sent by a user terminal, the login request carrying private key signature data; responding to the login request, obtaining public key data; obtaining equipment identification data of the user terminal when verification of the private key signature data is completed according to the public key data, and generating key data according to the equipment identification data, and sending the key data to the user terminal, receiving authentication data submitted by the user terminal for the key data, and when the authentication data submitted by the user terminal passes the verification, determining that the identity authentication is passed. According to the scheme, decentration is carried out in a blockchain mode, so that authentication failure caused by downtime of the central node is avoided; by introducing a double-authentication mechanism of equipment authentication and key data based on equipment identification data and private key authentication, behaviors such as signaturedenial can be avoided, the identity authentication accuracy is improved, and the data security is guaranteed.
Owner:卓尔智联(武汉)研究院有限公司

IKE authentication method, IKE initiating terminal, IKE response terminal and IKE authentication system

The invention discloses an IKE authentication method, an IKE initiating terminal, an IKE response terminal and an IKE authentication system. The IKE initiating terminal generates a first authentication request containing an authentication type currently used by the IKE initiating terminal, and sends the first authentication request to the IKE response terminal; and the IKE response terminal obtains the authentication type used by the IKE initiating terminal after receiving the first authentication request, then generates a second authentication request according to the authentication type and sends the second authentication request to the IKE initiating terminal. It is obvious that, in the invention, the authentication type adopted by the IKE response terminal when generating the second authentication request is obtained from the first authentication request, that is, the authentication type adopted by the IKE response terminal is consistent with the authentication type adopted by the IKE initiating terminal, and the IKE initiating terminal certainly supports the authentication type. Therefore, by adopting the scheme provided by the invention, the IKE response terminal can adapt to authentication types in an intelligent manner for different IKE initiating terminals, thereby avoiding the problem that the authentication fails because the IKE initiating terminal does not support the authentication type adopted by the IKE response terminal.
Owner:ZTE CORP

Data synchronization verification method and system, computing equipment and storage medium

PendingCN112169340AImprove experienceAccurate verification of operation resultsVideo gamesData synchronizationData pack
The embodiment of the invention provides a data synchronization verification method and system, computing equipment and a storage medium. According to the embodiment of the invention, the method comprises the steps: receiving a first frame data package, executing a first operation instruction, and obtaining a first operation result when the operation frame rate of a client installed at a terminalis greater than the operation frame rate of a server in a preset range in a preset time; storing a corresponding relationship between the first operation result and a first frame packet identifier toa corresponding cache queue; sending the first operation result to a plurality of corresponding terminals through a frame message packet, the frame message packet carrying a second frame packet identifier corresponding to the first frame packet identifier; and after receiving the frame message packet, enabling the terminal to return a second operation instruction and a frame packet identifier corresponding to the operation result in front of the second operation instruction through a second frame data packet so as to verify the second operation instruction. Therefore, the operation result canbe accurately verified for state synchronization.
Owner:CHENGDU PERFECT TIANZHIYOU BUSINESS CONSULTING CO LTD

Block chain-based identity authentication method, system, device and computer equipment

The present application relates to a block chain-based identity authentication method, system, device, computer equipment and storage medium. The method includes: receiving a login request sent by a user terminal, the login request carrying private key signature data, responding to the login request, obtaining public key data, and obtaining the device of the user terminal when the verification of the private key signature data is completed according to the public key data. Identify the data, and generate key data according to the device identification data, send the key data to the user terminal, receive the authentication data submitted by the user terminal for the key data, and when the authentication data submitted by the user terminal passes the verification, it is determined that the identity authentication has passed . The above scheme is decentralized through the blockchain to avoid authentication failures caused by the downtime of the central node; by introducing the dual authentication mechanism of device authentication and key data based on device identification data and private key authentication, it is possible to avoid repudiation of signatures Such behaviors improve the accuracy of identity authentication and ensure data security.
Owner:卓尔智联(武汉)研究院有限公司

Realization method for completely automated public turing test to tell computers and humans apart, and terminal

The embodiment of the invention relates to the technical field of the internet and discloses a realization method for a completely automated public turing test to tell computers and humans apart, and a terminal. According to the method and the terminal, the realization method for the completely automated public turing test to tell computers and humans apart comprises the steps of displaying first screen location information and first pressure information, wherein the first screen location information is used for indicating a to-be-pressed screen location of a pressure sensing screen of a user side, and the first pressure information is the pressed pressure information of the to-be-pressed screen location; obtaining second screen location information and second pressure information, wherein the second screen location information indicates the pressed screen location of the pressure sensing screen, and the second pressure information is the pressed pressure information of the pressed screen location; comparing the first screen location information with the second screen location information, comparing the first pressure information with the second pressure information and carrying out verification according to comparison results. The invention also discloses the terminal. According to the embodiment of the method and the terminal, an identification success rate and identification difficulty can be balanced, and a computer program can be prevented from carry out the verification instead of a person.
Owner:XIAN YIPU COMM TECH

Account information acquisition method for WeChat members

The invention relates to an account information acquisition method for WeChat members. The method comprises steps that step S1, a two-dimensional code pattern displayed on a user terminal MT is scanned by an acquisition terminal, and the scanning time stamp information is further recorded; step S2, a user identifier code and a verification string are acquired through analysis by the acquisition terminal according to the two-dimensional code pattern; step S3, the user identifier code and the verification string are sent by the acquisition terminal to a verification server; and step S4, authorization validity of a user for the two-dimensional code pattern is verified by the verification server according to the verification string and the scanning time stamp information, if authorization is verified to be valid, a corresponding member account is acquired according to the user identifier code and is sent to the acquisition terminal. Compared with the prior art, the method is advantaged inthat through adding the verification string to the two-dimensional code pattern, safety verification can be provided on the condition that data connection only exists between the acquisition terminaland the verification server.
Owner:知而行(上海)企业发展有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products