Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

194results about How to "Avoid illegal operation" patented technology

Voice control method and system for electronic device

The invention discloses a voice control method and system for an electronic device. The voice control method comprises the following steps: voice information of a user is acquired; a voice print feature of the user is extracted from the voice information; the voice print feature of the user is matched with voice print templates prestored in a voice print template base; when the voice print feature of the user is matched with one voice print template, the identity of the user is determined, and a prestored operation instruction base of the user is called; voice content is extracted from the voice information; the voice content is matched with operation instructions in the operation instruction base of the user; when the voice content is matched with one operation instruction in the operation instruction base of the user, the operation instruction is executed. According to the voice control method and system for the electronic device, the identity of a legal user of the electronic device is verified by matching the voice print feature of the user, so that illegal operation by illegal users is effectively prevented, and the safety and the privacy of the electronic device are improved; the operation instructions are executed by matching the voice content of the user, so that voice control is realized.
Owner:SHENZHEN ARATEK BIOMETRICS TECH CO LTD

Content transmission apparatus and content reception apparatus

InactiveUS20050160274A1Avoid creatingData quality of the content hardly deterioratesKey distribution for secure communicationMultiple keys/algorithms usageWireless lanTimer
It is an object of the present invention to protect a copyright of a content by suppressing creation of illegal copies of the content and prevent a content from being transmitted beyond a range of personal use in a process to transmit the content through a wire or wireless LAN. Before transmitting a content from a content transmission apparatus to a content reception apparatus, the content transmission apparatus and the content reception apparatus authenticate each other. In the authentication, a timer measures a time interval between a transmission of an authentication request and a reception of an acknowledgement of a reception of the request or between a transmission of a response to a received authentication request and a reception of an acknowledgement of a reception of the response. If the time interval does not exceed an upper limit, a content encrypted by using a shared key is transmitted from the content transmission apparatus to the content reception apparatus, and the address of the content reception apparatus as well as apparatus information unique to the content reception apparatus are cataloged in the content transmission apparatus. Thus, in order to transmit another content, the content is merely encrypted prior to the transmission without measuring a time interval.
Owner:HITACHI LTD

Internet of Things safety management system

The invention relates to an Internet of Things security management system. A private key center and an application server perform communication authentication data transmission through a soft shield;the application server side performs mutual communication of key distribution, identity authentication and data encryption with the client control terminal and the Internet of Things terminal at the same time; mutual communication of identity authentication and data encryption is carried out between the client control terminal and the Internet of Things terminal, wherein the private key center comprises a KPC key production assembly, a KMC key management assembly and a key authentication assembly, the application server comprises a security edge computing SDK module and a server application module, and the client control terminal comprises an encryption and decryption security module and a client application module, and the Internet of Things terminal comprises an Internet of Things communication module, a security algorithm module and an SE chip. According to the Internet of Things security management system, only the user is completely autonomous and controllable in the Internet of Things system, the cloud system does not have the authority of directly operating the user equipment, and the Internet of Things control security level can be effectively improved.
Owner:深圳前海智安信息科技有限公司

Method of monitoring enterprise false invoice through commodity composition and system thereof

InactiveCN104636973AStandardize normal production and operationAvoid illegal operationFinanceSpecial data processing applicationsData setInvoice
The invention provides a method of monitoring an enterprise false invoice through commodity composition and a system thereof. The method comprises the following steps: input commodity data preparation is carried out, input data query is executed, taxpayers are grouped and calculated according to commodity names, and a composed input commodity data collection is obtained; output commodity data preparation is carried out, output data query is executed, taxpayers are grouped and calculated according to commodity names, and a composed output commodity data collection is obtained; in the obtained output commodity data collection, descending sorting is carried out according to the money sum proportion, calculation of the output commodity composition is carried out, and a main output commodity composition data collection is obtained; and names of commodities in the generated main output commodity composition data collection are sequentially taken out item by item for false issuing analysis. Enterprise false issuing invoice doubts are found, production and operation activities of the enterprise are monitored, normal production and operation of the enterprise are further regulated, and illegal and rule-breaking operation of the enterprise is avoided.
Owner:AEROSPACE INFORMATION

Service locking method, service unlocking method, device and system

The invention discloses a service locking method, a service unlocking method, a device and a system, and belongs to the field of network property safety. The service locking method comprises the following steps: receiving a locking request, wherein the locking request comprises the identification information of a specified service and the identity of an operating terminal, and the specified service is a service for performing sensitive operation on network virtual properties; and transmitting a verification request which comprises the identification information of the specified service and the identity of the operating terminal to a verification server, and locking the specified service after verification success information transmitted by the verification server is received. According to the service locking method, the specified service on the operating terminal is locked after successful verification of the operating terminal by the verification server, so that the problem of illegal operation of the network virtual properties of a legal user in a service operating method in the prior art is solved, any operating terminal cannot directly operate a locked specified service, and the situation of illegal operation of the specified service by an illegal user is avoided.
Owner:TENCENT TECH (SHENZHEN) CO LTD +1

Third-party riding and driving safety automatic alarm method based on image processing

The invention discloses a third-party riding and driving safety automatic alarm method based on image processing, and the method comprises two stages: a multi-task deep learning body behavior detection model training stage and a body behavior testing stage. The body behavior testing stage comprises the steps: performing the detection of a dangerous behavior of a body based on a multi-task deep learning body behavior detection model, and calculating a body behavior loss function, a body behavior attitude loss function, a loss function of other feature points of the body and a total loss function according to the multi-task deep learning body behavior detection model. When an online car-hailing service order is generated, a riding and driving safety automatic alarm device installed in a vehicle can be automatically excited, and a built-in wide-angle high-definition camera starts to work: firstly collecting a face image of a driver, comparing with the driver image data stored in an onlinecar-hailing platform, checking the identity information of the driver, and entering the body behavior testing stage. The method can perform the automatic early warning when a driver has an abnormal behavior, can effectively reduce the illegal criminal activities of the online car-hailing services and enables the risk of the life and property safety to be minimized.
Owner:深圳市尼欧科技有限公司

Method and system for identity authentication and encryption of industrial user

The invention relates to the field of industrial information security technologies, in particular to a method and a system for identity authentication and encryption of an industrial user. The method comprises the following steps that an electronic key is connected to user terminal equipment through a USB interface and login of a client is realized through the user terminal equipment; a client compares a hardware feature code of the user terminal equipment and a hardware feature code bound with the electronic key, if the hardware feature code of the user terminal equipment and the hardware feature code bound with the electronic key are consistent and an authentication server verifies that a user certificate has legality, the client obtains industrial control command information and carries out encryption and packaging processing to obtain an encrypted data packet; the client transmits the data packet to an encryption gateway; and the encryption gateway carries out unpacking and decryption processing on the data packet to obtain decrypted industrial control command information and transmits the industrial control command information to an OPC server. According to the method and the system, a problem that the truth of the data packet cannot be guaranteed due to the low data transmission security of the industrial information system at the present stage is solved.
Owner:SEATECH TIANYU TECH BEIJING

Electronic lock and emergency unlocking method thereof

ActiveCN106522679AEmergency unlock implementationEasy to operateNon-mechanical controlsLocking mechanismEngineering
The invention provides an electronic lock and an emergency unlocking method thereof and relates to the field of locks. The electronic lock is simple in structure and reliable in performance, emergency unlocking can be conducted on the locked lock, and meanwhile, illegal operation of emergency unlocking under the non-emergency situation also can be effectively prevented, so that unified management and monitoring of the lock is ensured. The electronic lock comprises a locking pin and a lock tongue base of a main lock body. An electronic locking mechanism comprises a blocking shaft and a locking block matched with the blocking shaft in a contact mode. The telescopic motion of the blocking shaft drives the locking block to lock or loosen the locking pin. An emergency unlocking mechanism comprises a sliding block and an anti-push mechanism. The sliding block is slidably arranged on the lock tongue base and provided with a locking block hole. The locking block is arranged in the locking block hole. When the locking block locks the locking pin, the sliding block can push the locking block to be away from the blocking shaft. The anti-push mechanism is arranged in a lock tongue base containing cavity and can lock the sliding block, limit sliding of the sliding block and release locking of the sliding block during emergency unlocking.
Owner:ZHUHAI UNITECH POWER TECH CO LTD

Secure communication method and system of secure server

The invention discloses a secure communication method of a secure server. The secure communication method of the secure server comprises the following steps of (1) registering information through an information verification terminal, and binding a user ID and a business system operation terminal internet protocol (IP); (2) checking biological characteristics of a user; (3) registering through the business system operation terminal IP which is bound with the user, and checking the state of the user in the information verification terminal through a proxy server; (4) the business system operation terminal IP accessing the secure server through the proxy server; (5) logging off verification information of the user. The invention further discloses a system which is used for implementing of the communication method, and the system comprises the proxy server, a business system operation terminal, the information verification terminal and the secure server. The business system operation terminal, the information verification terminal and the secure server are respectively connected with the proxy server in a communication mode. The proxy server conducts data forwarding between the business system operation terminal and the secure server, so that the secure server is invisible in the business system operation terminal and illegal operation of the secure server is avoided.
Owner:THE FIRST RES INST OF MIN OF PUBLIC SECURITY +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products