Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

30results about How to "Convenient authorization" patented technology

Low-cost NB-IOT (Narrow Band Internet of Things) wireless intelligent lock

The invention discloses a low-cost NB-IOT (Narrow Band Internet of Things) wireless intelligent lock, which comprises a controller, a safety lock, a battery and a communication module, wherein the controller is electrically connected with a biological recognition module, an NFC (Near Field Communication) module, a keyboard module and a storage module; the safety lock comprises a sound and light warning device, a lock body picking detection module and a lock body driving and lock body detection module; the battery is electrically connected with the battery volume detection module; the battery is electrically connected with the controller, the safety lock and the communication module; the communication module also comprises an NB-IOT module and a BLE module. By using the NB-IOT technology, the low-cost NB-IOT wireless intelligent lock has the characteristics that the power consumption is low; the signal coverage range is wide. The BLE module realizes the Bluetooth low energy consumption, so that the electric power is further saved; on one hand, the problem of short service life of the battery power supply equipment such as the intelligent lock is solved; on the other hand, the condition that a gateway needs to be additionally arranged for intelligent lock communication conversion is avoided. The device has the advantages of multifunction, low cost, energy conservation and environment protection.
Owner:INNO ELECTRIC INC

Access control remote authorization method

The invention relates to the field of safety protection, and in particular relates to an access control remote authorization method which comprises the following steps of acquiring information to be authorized by a control unit, and encrypting the information to be authorized by combining information acquisition time to form first encrypted information; sending the first encrypted information into an authorization unit by the control unit; decrypting the first encrypted information by the authorization unit to form first decrypted information, and confirming the first decrypted information; encrypting the first decrypted information by combining the confirmation information by the authorization unit to form second encrypted information, and sending the second encrypted information into the control unit; decrypting the second encrypted information by the control unit to form second decrypted information, and confirming the information by verification; and executing access control remote authorization operation. According to the access control remote authorization method, an encryption module and a communication module are arranged in the control unit and the authorization unit, respectively, so that the safety of the information to be authorized is guaranteed in the communication process, and the remote communication between the control unit and the authorization unit can be realized.
Owner:SHANGHAI PEOPLENET SECURITY TECH

Medicine research and development software warehouse and software package management system thereof

The invention provides a medicine research and development software warehouse and a software package management system thereof. The medicine research and development software warehouse comprises a user authentication module, a software package uploading and index creation module, a baseline release management module, an authorization management module, a software package retrieval and downloadingmodule, an adapter plug-in and a storage layer. The software package management system comprises an authentication module, a package management service module, a web front-end module and a command line tool module. Through a plug-in mode, various object storage services and software warehouses can be docked, so that cross-platform and multi-development-language software package management is realized; an authentication function and a software authorization function are added, so that a user can conveniently authorize software researched and developed in a company to a partner for use, and a software distribution mode is simpler; and a baseline management function is added, so that the software is more concise to publish to the outside, and meanwhile, the cooperation efficiency of internaldevelopers in developing different software packages of the same software system is improved.
Owner:SHENZHEN JINGTAI TECH CO LTD

Video electronic medical record system with internet virus detection component

The invention discloses a video electronic medical record system with an internet virus detection component. The system comprises a first camera, a first microphone, a doctor user terminal, a second camera, a second microphone, a patient user terminal, a video server, a storage server and the internet virus detection component. According to the system, the convenience of electronic medical record information input is improved, the time consumption of electronic medical record information input is decreased and the overall efficiency of doctor visiting is improved; the electronic medical record information is stored on a platform of internet, so that the authorization, share and downloading are convenient; investigation and evidence collection in medical disputes is convenient; the diagnosis and treatment process are really restored, so that great help is provided for the later disease diagnosis of the doctors; and through single recording and later single playing of electronic prescriptions, the subjective illness state judgement, diagnosis results, diagnosis and treatment suggestions and pharmacy explanation provided by doctors for patients can be simply and rapidly obtained, and meanwhile, due to the presence of the internet virus detection component, the device can be prevented from virus infection.
Owner:罗颖莉

Work management method and device based on block chain, and equipment

The embodiment of the invention provides a work management method and device based on a block chain, and equipment. The work management method comprises the steps: responding to the payment success operation of a first user for a target work, and carrying out the use right marking of the target work through the first user information of the first user; broadcasting the mark information reflectingthe use right mark to each node of the block chain; and in response to a downloading request of a second user for the target work, if it is determined that the second user has the permission to download the target work according to the obtained second user information and the mark information of the second user, outputting the target work to the second user. When a user wants to use a certain target work, the use right of the user is marked for the target work, so that authorization of an owner is obtained, and authority verification of a downloader can be completed based on the use right marking information of the target work when the target work is downloaded, and effectiveness of use behaviors of the target work is guaranteed.
Owner:北京果仁宝软件技术有限责任公司

Authentication method, device and system and computer storage medium

The invention discloses an authentication method, device and system and a computer storage medium. The authentication method is applied to local network equipment. The authentication method comprises the following steps: receiving Internet of Things equipment data / network resource data entry; receiving user data entry; configuring a mapping relationship between the data of the user and the Internet of Things equipment / network resources, and authenticating conditions through authentication; judging whether a user authentication request sent by the Internet of Things device / network resource meets the condition of accessing the Internet of Things device / network resource; and if the preset access authentication condition is met, returning an authentication success message to the authentication request source. According to the invention, third-party authentication service can be provided for Internet of Things equipment, internal application service and the like in a local area network. Herein, the ownership and the use authorization of the internet of things equipment main body and the local area network internal resources are separated, and the use authentication authority and the ownership of the equipment are logically separated.
Owner:SICHUAN JIUZHOU ELECTRONICS TECH

Remote authorization method and device in abnormal state, equipment and medium

The invention provides a remote authorization method and device in an abnormal state, equipment and a medium, is applied to a self-service terminal, and comprises the following steps: when a camera of the self-service terminal is abnormal, selecting one or more monitors in an idle state according to the state of a monitor associated with the self-service terminal; verifying the idle state monitor, and if the verification is passed, calling the idle state monitor to position and monitor a user using the self-service terminal; and according to the user certificate of the user, sending the verification request to the APP corresponding to the mobile terminal of the user, so that after the mobile terminal passes the verification request, the mobile terminal is utilized to collect the biological data, and the user certificate and the biological data are sent to the remote end, thereby realizing data collection and remote authorization under the abnormal condition of the self-service terminal. And the self-service terminal calls the monitor to monitor the user, so that cheating of the user can be prevented, and the risk of remote authorization is reduced.
Owner:BANK OF JILIN

Drug research and development software warehouse and its software package management system

The invention provides a drug research and development software warehouse and its software package management system, a drug research and development software warehouse, a user authentication module, a software package upload and index creation module, a baseline release management module, an authorization management module, a retrieval and download software package module, and an adapter Plugins, storage layers. Software package management system, including authentication module, package management service module, web front-end module, command line tool module. The present invention can be connected to various object storage services and software warehouses through plug-in methods, thereby realizing cross-platform, multi-language software package management; adding authentication and software authorization functions, so that users can use the software developed by the company It is convenient to authorize the use of partners, making the way of software distribution more concise; adding the baseline management function, making the software release easier, and improving the collaboration efficiency of internal developers in the development of different software packages of the same software system.
Owner:SHENZHEN JINGTAI TECH CO LTD

drm-q digital copyright protection method and system

The invention relates to the field of communication, in particular to a DRM-Q digital right management method and system. The system comprises a DRM user management module, a right issue module, a DRM-Q system server module, a digital certificate, a right content management module and a payment module, wherein the DRM user management module can store and manage information of a DRM user and send registration information of the DRM user to the DRM-Q system server module; the right issue module receives and manages information filled up by a right issuer and a right issued by the right issuer and generates a right protection object; the DRM-Q system server module receives a request of the DRM user and generates the digital certificate according to the information of the registered DRM user; the digital certificate can provide a secret key for encryption and / or decryption of the right object; the right content management module receives, stores and manages the encrypted right object; and the payment module is used for receiving cost paid by the registered DRM user for the ordered right objet. The system can be seamlessly compatible with a mainstream media player and an electronic reader on the market; and when encrypted data is opened, interception, authentication and authorization are completed in one step, so that comprehensive protection is effectively provided for the digital right.
Owner:创元网络技术股份有限公司

A remote authorization method for access control

The invention relates to the field of safety protection, and in particular relates to an access control remote authorization method which comprises the following steps of acquiring information to be authorized by a control unit, and encrypting the information to be authorized by combining information acquisition time to form first encrypted information; sending the first encrypted information into an authorization unit by the control unit; decrypting the first encrypted information by the authorization unit to form first decrypted information, and confirming the first decrypted information; encrypting the first decrypted information by combining the confirmation information by the authorization unit to form second encrypted information, and sending the second encrypted information into the control unit; decrypting the second encrypted information by the control unit to form second decrypted information, and confirming the information by verification; and executing access control remote authorization operation. According to the access control remote authorization method, an encryption module and a communication module are arranged in the control unit and the authorization unit, respectively, so that the safety of the information to be authorized is guaranteed in the communication process, and the remote communication between the control unit and the authorization unit can be realized.
Owner:SHANGHAI PEOPLENET SECURITY TECH

Rotary dial type self-generating combination lock

The invention discloses a rotary dial type self-generating combination lock. The combination lock comprises a locking bar, an upper lock formed by a locking tongue connected with a motor as well as an unlocking assembly, wherein two ends of the locking bar are mounted at two ends of the top of a casing respectively; the combination lock further comprises a dial assembly, a generating assembly, a gear potentiometer, a control circuit board and a rechargeable battery, a round dial of the dial assembly is mounted right below the casing, and the generating assembly, the gear potentiometer, the control circuit board and the rechargeable battery are fixed in the casing respectively. Unlocking code input and a generating process are integrated; the combination lock can be remotely connected with a cloud service center through family wifi or GPRS (general packet radio service) directly to facilitate authorization, monitoring and management; by means of a logical operation function of a low-power-consumption single chip microcomputer in the control circuit board, a dynamic password unlocking mode and a virtual-position password unlocking mode can be supported, and the combination lock can also be matched with a fingerprint unlocking module, a magnetic card unlocking module and the like through a single chip microcomputer serial port and the like; the combination lock can be applied to residence buildings and private or shared vehicles such as bicycles, storage battery cars and the like.
Owner:ZHEJIANG UNIVERSITY OF SCIENCE AND TECHNOLOGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products