Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

87results about How to "Avoid verification process" patented technology

Anti-fake identification system and method capable of automatically connecting to web address

This invention relates to an anti-fake identification system and method capable of automatically connecting to web address, in which an electronic tag of commodity is scanned by a reader device so as to read the identification code into the computer device; the identification code includes a web address of a remote maker to which the computer can automatically connect so as to transmit the identification code to the web address; a verifying device receives and verifies the identification code at the web address, and produce an authentication code according to the identification code after the identification code passes through verification so as to confirm the accuracy of the identification code. The method comprises the following steps of: reading an identification code of commodity; transmitting the identification code to the web address; verifying the identification code and generating an authentication code when the identification code is accurate. When the identification code is verified to be accurate according to the authentication code, the computer can keep consumer informed that the commodity passing through anti-fake verification is genuine, and that the user's manual and service information of the commodity can be understood.
Owner:NAT CHUNG SHAN INST SCI & TECH

Shared secret key generation method and device, computer equipment and storage medium

The invention provides a shared secret key generation method and device, computer equipment and a storage medium, and the method comprises the steps: obtaining an elliptic curve system parameter and asecurity hash function; generating a main public key and a main private key according to the elliptic curve system parameters; receiving first user identity information returned by the first user side and second user identity information returned by the second user side; generating a first user private key for the first user side according to the elliptic curve system parameters, the main privatekey and the first user identity information, and generating a second user private key for the second user side according to the elliptic curve system parameters, the main private key and the second user identity information; And sending the main public key, the elliptic curve system parameter, the security hash function and the first user private key to the first user side, and sending the main public key, the elliptic curve system parameter, the security hash function and the second user private key to the second user side. According to the scheme, the technical problem of high certificate management cost in the prior art is solved.
Owner:JUZIX TECH SHENZHEN CO LTD +1

User passing method and system

The invention provides a user passing method which comprises the following steps: detecting whether a mobile terminal exists in a preset detection range or not by a user passing device; if yes, sending an acquisition request to each mobile terminal so as to obtain the identification information sent by each mobile terminal on the basis of the acquisition request and sending the identification information to a cloud terminal; inquiring the first face information corresponding to the identification information in a cloud database by the cloud terminal, and sending the first face information to user passing equipment so as to form a comparison database, collecting the second face information of the user through a camera shooting device by means of the user passing equipment, matching the second face information with each first face information in the comparison database, and determining whether a matched target face information exists in the comparison database or not; finally, if yes, controlling a gate to be opened by the user passing equipment so as to allow the user to pass through. The invention further provides a user passing system. According to the invention, the verificationaccuracy is improved, and the passing efficiency is improved.
Owner:深圳市靓工创新应用科技有限公司

Monitoring system and monitoring method based on campus network

The invention discloses a monitoring system and a monitoring method based on a campus network. The monitoring system comprises a two-dimensional code, camera modules, a central processor, a campus network management server and a microprocessor, wherein the two-dimensional codes are used for storing related information of students and teachers; the camera modules are used for shooting two-dimensional codes on student cards and teacher cards, and human faces of people walking through campus doors and teaching buildings; the campus network management server is used for storing two-dimensional code pictures on the student cards and teacher cards and related information of the students and the teachers; and the microprocessor is used for receiving the two-dimensional code pictures on the student cards and teacher cards, and matching the two-dimensional code pictures with the two-dimensional code pictures stored in the campus network management server. According to the monitoring system and the monitoring method provided by the invention, the condition of the students and the teachers entering and quitting the campus doors, school buses and apartment buildings can be accurately and efficiently monitored, the safety factor is high, and safety of the students and the teachers in the campus is ensured thoroughly.
Owner:合肥博之泰电子科技有限公司

Intensity checking method of overlaying valve plates of compression valve of vehicle buffer

The invention relates to an intensity checking method of overlaying valve plates of a compression valve of a vehicle buffer, and belongs to the technical field of hydraulic buffers. At present, a reliable calculation method for checking the maximum stress and intensity of the overlaying valve plates of the compression valve is not given at home and aboard, the checking is conducted through numerical simulation by finite element software most of the time, and therefore modern design requirements of the buffers can not be satisfied. The intensity checking method is characterized in that checking of the intensity of the overlaying valve plates of the compression valve is conducted according to the thicknesses, the number of pieces, the allowable stress and the maximum stress of the overlaying valve plates of the compression valve. According to the intensity checking method, not only influences of normal open holes of a rebuilt valve, piston gaps and a circulation valve are considered, but also the stress condition of actual non uniform pressure is considered. The intensity checking method of the overlaying valve plates of the compression valve of the vehicle buffer is capable of calculating the maximum stress of the overlaying valve plates of the compression valve accurately, checking the intensity reliably, guaranteeing the design service life of the buffer, reducing maintenance cost, avoiding repeated testing and modification, reducing the cost of designing and testing, and shortening the development cycle.
Owner:SHANDONG UNIV OF TECH

Admittance identity authentication system based on image identification

The invention discloses an admittance identity authentication system based on image identification. According to the system, an acquisition terminal acquires character information and image information, so as to generate acquired data; a server stores the acquired data in corresponding region classification databases according to regional attributions of the acquired data; an authentication terminal acquires data to be authenticated from the regional attributions; the server compares the data to be authenticated with the acquired data, judges whether the regional attributions are matched with the region classification databases, where the corresponding acquired data are located, or not, generates authentication information according to matching results and sends the authentication information to the authentication terminal, the authentication terminal judges whether authentication permissions can be obtained or not, and then, whether the data to be authenticated pass through the admittance authentication of the regional attributions or not is acquired. The system has the advantages that the anti-counterfeiting performance is good, forgery and theft are difficult, convenience is brought for the arrangement of various types of field services, the admittance efficiency is increased, the staff setting is simplified, then, the effect of getting twice the result with half the effort is achieved, the identity check and authentication among different regional attributions can be prevented, and thus, the confidentiality of identity authentication is improved.
Owner:福建省智慧物联网研究院有限责任公司

Joule-level pulse laser light source

The invention discloses a joule-level pulse laser light source which comprises a laser, a collimating mirror, a beam splitter, an energy monitor meter, a polarizer component, a fixed attenuator component, a reference energy meter, a variable attenuator, a beam expander and a computer. Light emitted by the laser passes through the collimating mirror and is changed into parallel light, the parallel light is split into two beams through the beam splitter, the reflective light beam is received and detected by the energy monitor meter, the computer judges whether the laser emits light stably or not according to the detection value of the energy monitor meter, the transmission light beam passes through the polarizer component and the fixed attenuator component and is changed into attenuate linearly polarized light, and the attenuate linearly polarized light is attenuated to a required energy value through the variable attenuator with transmittance controlled by the computer and is finally output by the beam expander. The joule-level pulse laser light source solves the problem of simulating long-distance diffuse reflection echo signals in a measurement test, and the provided analog light beams have the advantages of being uniform and stable in energy.
Owner:西安应用光学研究所

Access certificate verification method and device, computer equipment and storage medium

The invention relates to the field of identity authentication. An access certificate is generated and verified according to an access code corresponding to a file requested by a client and feature information of the client, and the file is prevented from being accessed through a stolen, tampered or forged access certificate. The invention concretely discloses an access certificate verification method and device, computer equipment and a storage medium. The access certificate verification method comprises the steps of acquiring an access request sent by a client side, wherein the access requestcomprises an access purpose; obtaining an access code corresponding to the access purpose; generating an access certificate according to the access code and the feature information of the client; sending the access certificate to the client; obtaining an access instruction sent by the client, wherein the access instruction comprises an access purpose, feature information of the client and an access certificate; generating a verification certificate according to the access code corresponding to the access purpose and the feature information of the client; and if the verification voucher is consistent with the access voucher in the access instruction, enabling the access instruction to pass the verification.
Owner:PING AN TECH (SHENZHEN) CO LTD

Novel face authentication system for examination

The present invention relates to the technical field of internet-of-things information, in particular to a novel face authentication system for examination. The novel face authentication system comprises a data collection apparatus, a data processing apparatus, a cloud storage server and a plurality of entrance authentication collection apparatuses, wherein the data collection apparatus is in data communication connection with the data processing apparatus through a wired or wireless internet; the data processing apparatus is in data communication connection with the cloud storage server through a wired or wireless local area network; the data collection apparatus collects character information and image information, generates collection data and sends the collection data to the data processing apparatus in real time; the data processing apparatus, according to region attribution of the collection data, stores the collection data into a corresponding region classification database in a remote end database of the cloud storage server; the novel face authentication system is based on a data cloud center and an internet-of-things technology, so that the authentication efficiency is greatly improved and the anti-counterfeiting property is improved.
Owner:福建省智慧物联网研究院有限责任公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products