Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

41results about How to "Convenient identity verification" patented technology

Vehicle identity authentication method and apparatus, and computer readable storage medium

The invention provides a vehicle identity authentication method and apparatus, and a computer readable storage medium. The vehicle identity authentication method comprises the following steps: when a vehicle authentication request sent by a terminal is received, generating vehicle authentication information of a current vehicle according to the vehicle authentication request; sending the vehicle authentication information to a block chain, so that the block chain judges whether the current vehicle is a legal vehicle according to pre-stored legal vehicle information; and receiving a judgment result returned by the block chain according to the vehicle authentication information so as to accomplish the identity authentication of the current vehicle. By adoption of the manner, the identity authentication of the vehicle can be accomplished securely and conveniently, the vehicle identity authentication precision is improved, the information sent by illegal vehicle is not received, thereby improving the anti-interference ability of the communication between the vehicles in the system, and the technical problem that the communication between the vehicles in the CACC is interfered easily is solved.
Owner:SHENZHEN ECHIEV AUTONOMOUS DRIVING TECH CO LTD

Authentication method, authentication device, authentication system and treatment equipment

ActiveCN105871857AAvoid same-identity situationsPrevent peepingTransmissionData transmissionAuthentication system
The invention discloses an authentication method, an authentication device, an authentication system and treatment equipment. The authentication method comprises the steps of reading server information which is preset by a local machine, automatically establishing communication connection according to the server information in a wireless communication manner; and initiating self authentication by the treatment equipment, wherein self authentication comprises reading a global unique identification code and a product serial number which are pre-stored by the local machine; encrypting the global unique identification code and the product serial number which are stored in the treatment equipment, and transmitting the encrypted global unique identification code and the product serial number to a server for requesting self authentication; confirming a self authentication result according to information which returns from the server; if self authentication passes, starting data transmission with the server; and if self authentication fails, disconnecting communication connection with the server. The authentication method, the authentication device, the authentication system and the treatment equipment reduce operation difficulty and complexity in identity authentication.
Owner:BMC MEDICAL

Method, devices and system for user identity authentication

The invention provides a method, devices and a system for user identity authentication. A mobile terminal obtains a current expression image, taken by a camera of the mobile terminal, of a user to be authenticated, a current expression feature value of the current expression image of the user to be authenticated is extracted, and the current expression feature value and the expression type of the user to be authenticated are sent to an identity authentication server. The identity authentication server receives the current expression feature value and the expression type of the user to be authenticated, obtains a preset expression feature value of the expression type corresponding to user information of the user to be authenticated from a preset expression database and judges whether the current expression feature value is matched with the preset expression feature value, and if yes, identity authentication passing information is returned. By the adoption of the method for achieving user identity authentication by obtaining the current expression image of the user to be authenticated, no extra equipment such as a dynamic password card needs to be carried, user identity authentication is achieved conveniently and rapidly, no extra cost consumption is generated, and safety is high.
Owner:CHINA CONSTRUCTION BANK

Fingerprint identification-based driver identity authentication system and method

The invention discloses a fingerprint identification-based driver identity authentication system and method. The system comprises a vehicle-mounted driving terminal and a driver management background, wherein the vehicle-mounted driving terminal comprises a fingerprint collection module and a terminal processing module; the driver management background comprises a background processing module and a driver information library; the fingerprint collection module is connected with the terminal processing module; the terminal processing module is connected with the background processing module through network communication; and the background processing module is connected with the driver information library. According to the fingerprint identification-based driver identity authentication system and method provided by the invention, an authentication fingerprint image of a driver is collected and the collected image is compared with a standard fingerprint image provided by the driver management background to realize driver identity authentication, so that comprehensive management of a transportation company is facilitated, identity authentication of drivers before vehicle driving is facilitated, and the working efficiency of the drivers is improved.
Owner:CHENGDU YIMENG HENGXIN TECH

Mobile terminal-based access control management information processing method and device

The invention discloses a mobile terminal-based access control management information processing method and device aiming at solving the technical problem of a complicated access control management program in the prior art. The mobile terminal-based access control information processing method comprises the following steps: a mobile terminal receives a first access control application installation file transmitted by an access control management system, wherein the access control application installation file is generated according to visitor information of the mobile terminal; the access control application installation file obtains a mobile phone number of the mobile terminal and an international mobile equipment identity code of the mobile terminal after running, and carries out binding of the mobile phone number of the mobile terminal and the international mobile equipment identity code of the mobile terminal on the side of the access control management system; an authorization message of the current mobile terminal in the access control management system is set; and the access control application interacts with the access control management system according to the set authorization message for achieving access control management.
Owner:QIKU INTERNET TECH SHENZHEN CO LTD

CRM system anti-unauthorized implementation method and device and storage medium

ActiveCN111526143AAvoid illegal callsAvoid doing business illegallyData switching networksAuthorizationEngineering
The invention relates to a CRM system anti-unauthorized implementation method and device and a storage medium, and the method comprises the steps: obtaining a service name of a to-be-called service ina CRM system, and obtaining a service configuration table corresponding to the to-be-called service according to the service name; obtaining an authorization module code set corresponding to the to-be-called service according to the service configuration table, and judging whether the operation job number has the module permission or not according to the authorization module code set; if so, judging whether the to-be-called service has an identity authentication anti-detour identifier or not according to the service configuration table: if so, obtaining a user number corresponding to the to-be-called service, and judging whether the user number passes the identity authentication or not: if so, calling the to-be-called service, and if not, not allowing to call the to-be-called service. According to the invention, double security reinforcement is carried out on the CRM system, services without functional module permission are prevented from being illegally called, illegal business handling by bypassing customer identity authentication is avoided, unauthorized and illegal access is prevented, and the security of the CRM system is greatly improved.
Owner:北京思特奇信息技术股份有限公司

Identity authentication system based on block chain technology

The invention discloses an identity authentication system based on a block chain technology, and belongs to the field of identity authentication. The identity authentication system based on the block chain technology comprises a user terminal, an alliance chain platform, a CA authentication module and a plurality of bank servers. The user terminal is used for generating a user secret key and storing the user secret key and a digital certificate; and the bank server is used for collecting related data such as personal information and secret keys of users according to banking business, and performing digital signature on the secret keys of the users to form digital certificates. According to the invention, when a user needs to handle services in different banking institutions, identity authentication can be carried out in a plurality of different banks by using the digital certificate without filling personal information again, and meanwhile, the system supports binding of a plurality of login modes and the digital certificate of the user, so that the identity authentication of the user is facilitated; and the business handling efficiency of the user and the security of private information secrecy are improved.
Owner:深圳华数云计算技术有限公司

Identity authentication method and system based on block chain

The invention discloses an identity authentication method and system based on a block chain. The method includes the steps of a terminal device sending an identity authentication request including an authentication factor to an application server, an application server receiving the identity authentication request and generating first transaction information according to the authentication factor in the identity authentication request, the application server broadcasting the first transaction information to a block chain network, the application server sending the first transaction number information of the first transaction information to the terminal device, the terminal device receiving the first transaction number information, generating second transaction information according to the first transaction number information and the authentication factor and broadcasting the second transaction information to the block chain network, and the block chain network conducting identity authentication for the terminal device according to the first transaction information and the second transaction information to obtain the authentication result. According to the technical scheme of the invention, identity authentication for a terminal device can be safety and conveniently carried out through a block chain network.
Owner:JIANGSU PAYEGIS TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products