Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

49results about How to "Efficient authentication" patented technology

Realization method of intelligent equipment system, control methods and system of intelligent equipment

The invention discloses a realization method of an intelligent equipment system, control methods and system of intelligent equipment, and belongs to the technical field of the block chain. The methodcomprises the following steps: a private chain network is constructed for multiple intelligent equipment accessing to a local area network; each set of intelligent equipment acquires an intelligent contract published by a user and provided with multiple functions, and then deploys the intelligent contract on the private chain network after the user confirms; when the intelligent equipment receivesan equipment initialization request of the user, the intelligent equipment acquires user sensitive data in the equipment initialization request, and generates the corresponding first initial information for the user sensitive data; and an adding function of the intelligent contract is called to write the first initial information into the private chain. Through the embodiment of the invention, the user sensitive data acquired by the intelligent equipment is stored on the private chain through the intelligent contract, and the leakage of the user sensitive data can be avoided, thereby sufficiently guaranteeing the privacy and security of the user sensitive data.
Owner:SUNING COM CO LTD

Pronunciation error correction learning method and device, storage medium and electronic equipment

The invention discloses a pronunciation error correction learning method and device, a storage medium and electronic equipment, and relates to the technical field of online learning systems. The method comprises the steps of: acquiring voice information and a corresponding pronunciation error correction feedback result; extracting a speaker feature vector of the voice information by using a speaker model; according to the feature vector of the speaker and a stored feature vector of a target speaker, judging whether the speaker corresponding to the voice information is the target speaker or not by using an identity judgment model of the target speaker; and if yes, generating an identity mark of the target speaker, and storing the identity mark and the pronunciation error correction feedback result together, so as to perform statistical analysis after a preset learning course is ended, and obtain a learning report of the target speaker. According to the invention, the problem that the process of the identity authentication method in the existing online learning system is complex is solved, the identity authentication in the pronunciation error correction process is realized, and the situation that the identity authentication needs to be carried out independently before each pronunciation practice is avoided.
Owner:深圳市声希科技有限公司

Banknote sorter with double-side image scanning function

The invention discloses a banknote sorter with a double-side image scanning function. The upper part of a contact-type image sensor is arranged on the upper module of the sorter. The lower part of the contact-type image sensor is arranged on the lower module of the sorter. The lower end surface of the upper part of the contact-type image sensor is smaller than the upper end surface of the lower part of the contact-type image sensor. Part of the upper end surface is overlapped with the lower end surface. A front side magnet, a side thick sliding wheel and a middle magnet are arranged on the upper module of the sorter. A banknote conveying wheel is arranged on the lower module of the sorter at a position corresponding to the front side magnet, a side thick shaft is arranged on the lower module of the sorter at a position corresponding to the side thick sliding wheel and a coder is arranged on the lower module of the sorter at a position corresponding to the middle magnet. A driving belt is additionally arranged at the front end of the upper module of the sorter. The internal structure of the banknote sorter with the double-side image scanning function is compact and the sorter is smart; and by adopting the image sensor, the sorter has the characteristic of high banknote authentication efficiency.
Owner:SHANGHAI GOOAO ELECTRONIC TECHNOLOGY CORP

Group authentication method and system in asynchronous group communication of LTE network machine type communication equipment

Related technologies of the Internet-of-things are developed rapidly and widely applied. Machine type communication (MTC) can complete data information exchange and sharing between equipment without active participation of a user, has the characteristics of low cost, low power consumption and capability of transmitting information on a large scale, and is one of the most important communication modes in the Internet-of-things. Therefore, the security of the MTC needs to be emphasized, and the data security of the user needs to be protected. The invention provides a group authentication methodand a group authentication system in asynchronous group communication of machine type communication equipment in an LTE network, which construct a group authentication scheme by utilizing a (t, n) secret sharing scheme of Shamir, authenticate m (m is greater than or equal to t) machine type communication equipment (MTCD) at one time, and ensure the legality of MTCD identity of an access network. Meanwhile, in the token transmission process, an ElGamal encryption algorithm is used to ensure the security of the authentication token in the transmission process. By utilizing the method and the system, the group authentication can be completed only by one-time calculation, the confidentiality can reach the calculation security, and each group member only needs to carry one authentication token.
Owner:LANZHOU UNIVERSITY

Method of automatically authenticating value-added-tax special invoices

The invention provides a method of automatically authenticating value-added-tax special invoices. The method includes: collecting enterprise information needing to be authenticated; requesting a CA authorization file of an enterprise from the State Administration of Taxation, and saving the same; generating unique ID and Key, which are of the enterprise and are used for enterprise interface butt-joint-connection and CA authorization file identity confirmation, according to the enterprise information and the CA authorization file; calling an API interface, which is provided by the state tax bureau, when a request that the enterprise needs to authenticate the value-added-tax special invoices is received; sending the CA authorization file of the enterprise to the state tax bureau, requestingsending of invoice data which are of the enterprise and a certain time period and need to be authenticated, and saving the same to a database I; quickly and massively scanning the value-added-tax special invoices, which need to be authenticated, through scanners and two-dimensional-code scanning guns; parsing invoice information, and saving the same; retrieving the invoices, which need to be authenticated, one by one in the database I, and setting status thereof to ticked status after the same are found; sending the ticked invoices and the CA authorization file of the enterprise to the state tax bureau to request authentication, and keeping authentication results.
Owner:北京票通信息技术有限公司

Anti-lock USB (universal serial bus) identity authentication system and anti-lock USB identity authentication method by means of recognizing data

The invention provides an anti-lock USB (universal serial bus) identity authentication system and an anti-lock USB identity authentication method by means of recognizing data. The anti-lock USB identity authentication system comprises an equipment source recognizing module, a signal receiving module, a user selection module, a speech module, a recording module, a voiceprint recognizing module, a three-dimensional face recognizing module and a quick starting module. The voiceprint recognizing module comprises a speech module judging module and a recording module judging module. The anti-lock USB identity authentication method includes steps of recognizing equipment sources; receiving signals; enabling users to select authentication modules; recognizing voiceprints; three-dimensionally recognizing faces of the users; matching results with one another. The anti-lock USB identity authentication system and the anti-lock USB identity authentication method have the advantages that a plurality of options for identity authentication can be provided for the users, so that identities of the users can be quickly and efficiently authenticated, system locking due to misoperation or accidents can be prevented, and problems of voiceprint matching failures due to poor personal health or unwell moods and incapability of using systems can be solved; the various authentication modules with authentication functions are built, and accordingly flexible, accurate and efficient identity authentication can be guaranteed.
Owner:HEILONGJIANG UNIV OF CHINESE MEDICINE

Activity management method and system based on instant messaging software

The invention provides an activity management method and system based on instant messaging software. A second server generates a first activity link associated with activity information according to the activity information and sends the first activity link to a client; the second server authenticates the activity information according to a request of the client for having access to the first activity link so as to judge whether the activity information is effective or not, and if not, exiting is conducted; a communication server receives authorization information sent by the second server and conducts verification; if the verification is passed, the second server associates acquired user information with the activity information to form a second activity link; if the verification fails, exiting is conducted; the second server feeds an access result corresponding to the request back to the client through the second activity link according to the request so that the client operation can be conducted. According to the technical scheme, the activity management method and system have the advantages that the activity information can be managed conveniently and authenticated efficiently in time, and a user of the client can have access to the activity information conveniently in time.
Owner:SHANGHAI HANDPAL INFORMATION TECH SERVICE

Encrypted communication method and encrypted communication device based on narrowband internet of things

The invention discloses an encrypted communication method and an encrypted communication device based on the narrowband Internet of Things. The communication method includes the following steps: S1. The server performs identity authentication on the terminal node through the narrowband Internet of Things communication module. If the identity authentication is successful, establish Communication connection; if the identity authentication fails, it ends; S2. The server sends the command to generate the secret key table and the secret key seed to the terminal node through the narrowband Internet of Things communication module, and the terminal node generates the same secret key table as the server after receiving the secret key seed ; S3. The terminal node generates a secret key and encrypts the data; S4. The server decrypts the communication content, and then sends it to the user client. The present invention uses the key seed to enable the terminal node and the server to have the same key table, and uses the random number coordinate method to share the key to improve the security of the key, so that the identity between the NB‑IoT terminal and the server can be efficiently Authentication, thereby improving the security of communication.
Owner:ZHANGJIAGANG INST OF IND TECH SOOCHOW UNIV +1

Blockchain-based identity authentication system, authentication method, medium, and terminal

The invention belongs to the technical field of intelligent authentication, and discloses a blockchain-based identity authentication system, an authentication method, a medium, a terminal, and a data collection module that collects user personal information, and sends the collected relevant information and corresponding data query verification requests to the citizen information database; at the same time, the verified information is sent to the data processing module; the citizen information database verifies the information and the citizen's personal information in the database, and returns the verification result; the data processing module performs Hash processing on the data, and The user's data generates a public-private key pair; at the same time, the processed data is uploaded to the chain; the block chain stores the data processed by the data processing module, including the hash block and the attached ciphertext block; at the same time, the user's identity authentication is performed; The citizen information on the chain is verified; at the same time, the verification result on the chain is returned. The present invention can not only greatly reduce the user's burden and reduce the risk of privacy information leakage, but also achieve efficient identity authentication.
Owner:HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products