Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

68results about How to "Fast verification" patented technology

System and method for verifying computer software test results

The invention provides a system and method for verifying computer software test results. The computer software test result verifying method comprises the steps of: storing test element attribute information; generating and storing verification point information; generating and storing a tested object description file; extracting the element attribute and the element attribute value in the tested object description file, and generating verification point set information; obtaining the content information of corresponding verification points; accessing a system to be tested, and obtaining the data before the test of the object to be tested is carried out and the data after the test of the object; generating actual test result information of the object to be tested according to the data before the test, data after the test and a method for verifying the content information of corresponding verification points; matching the actual test result information with an expected result and generating verification result information; and outputting the verification result information. The system and method for testing computer software test results aim at solving the problem that a computer software test result verification point can be used repeatedly in a plurality of test cases, and realize a fully covered combination of computer software test result verification points.
Owner:INDUSTRIAL AND COMMERCIAL BANK OF CHINA

NFC mobile phone terminal anti-fake system and method based on time encryption

The invention discloses an NFC mobile phone terminal anti-fake system and method based on time encryption. The NFC mobile phone terminal anti-fake method comprises the following steps: firstly, transmitting system time to an NFC anti-fake label, after the NFC anti-fake label receives the system time, performing one-way data encryption so as to obtain verification data hash, and subsequently transmitting the ID of a product, other information of the product and the verification data hash to a mobile phone client from the NFC anti-fake label through wireless signals; transmitting the ID of the product and the verification data hash to a background data management system; after the background data management system receives the ID of the product and the verification data hash, acquiring verification data hash 0 according to an identical encryption algorithm, and comparing the obtained result hash 0 with a hash value; verifying, and transmitting the data verification result to the mobile phone client. The NFC mobile phone terminal anti-fake system comprises the NFC anti-fake label and the background data management system. The NFC mobile phone terminal anti-fake system is high in faking cost, large in faking difficulty, small in size, low in cost, high in verification efficiency, applicable to multiple products, and convenient to use.
Owner:HANGZHOU WOPUWULIAN SCI & TECH

Message sending method, message verification method, device and communication system

The invention discloses a message sending method, a message verification method, a message sending device, a message verification device and a communication system, and belongs to the field of communication. The method comprises the steps that a sending end obtains to-be-sent target data, wherein the target data is to-be-sent data after a first piece of data is sent in a current sending period; the sending end obtains nodes corresponding to the target data from a hash chain according to the sending serial number of the target data in the current sending period, wherein the number of the nodesincluded in the hash chain is equal to the number of data allowed to be sent in the current sending period; the sending end performs hash operation on the target data and a node corresponding to the target data to obtain a first verification code, wherein the first verification code is used for verifying the target data by a receiving end; and the sending end sends a first message, wherein the first message comprises the target data, a node corresponding to the target data, the first verification code and a sending serial number of the target data. The message transmission efficiency can be improved.
Owner:HUAWEI TECH CO LTD

Migration data verification method for power dispatching automation system

The invention discloses a migration data verification method for a power dispatching automation system. The migration data verification method comprises the steps of selecting a new master station and an old master station corresponding to service migration of the power dispatching automation system, selecting some to-be-verified substation in the old master station, disconnecting a normal communication channel of the to-be-verified substation and the old master station and establishing a corresponding analog substation, enabling remote control points to be selected in the new master station and the old master station for the analog substation and serve as current remote control points, sequentially issuing a remote control selection command, a remote control execution command or a remote control revocation command according to the current remote control points, collecting original data of issued commands of the current new master station and the current old master station through the analog substation, checking and comparing the original data to finish data verification of every remote control point, and finally restoring the normal communication channel of the to-be-verified substation and the old master station. The migration data verification method can guarantee migration of the power dispatching automation system between the new master station and the old master station, and has the advantages of being quick in verification speed, high in verification efficiency, good in verification accuracy, and simple and practical.
Owner:STATE GRID CORP OF CHINA +1

Method for sharing satellite information data

The invention provides a method for sharing satellite information data. The method comprises a method for safe storage of the satellite information data and a method for safe access of the satellite information data, wherein the method for safe storage of the satellite information data includes the following steps of: (1) carrying out safety verification on an identity of a storage user; (2) preprocessing the satellite information data; (3) encoding the preprocessed satellite information data; (4) abstracting and centralizing hardware storage resources, mapping the abstracted and centralized hardware storage resources to a completely uniformed resource pool, and virtualizing an operation system of a user; and (5) storing the satellite information data in the resource pool in a form of a final code; and the method for safe access of the satellite information data includes the following steps of: (1) carrying out the safety verification on an identity of an accessing user; and (2) reading the satellite information data stored in the resource pool. According to the method, the obstacle free sharing can be realized, the memory usage is reduced, the data calling speed is boosted and the safety of sharing the satellite information data is improved on the premise of guaranteeing the convenience.
Owner:吴本刚

Scenario-based processor system-level verification completeness measurement method

The invention discloses a scenario-based processor system-level verification completeness measurement method. The method includes 1), constructing typical application scenarios according to the application field of a processor; 2), constructing scenario testing environment for each application scenario to allow a scenario testing case to test the processor, generating scenario reliability according to test completion state, and taking a weighted average of scenario reliability of all the application scenarios as a system-level verification completeness measurement value; determining whether the completeness of the processor meets the processing requirements of the processor or not according to the system-level verification completeness measurement value; if not, returning to step 2) to test low-reliability application scenarios continuously; and if so, completing test and exiting. According to the scenario-based processor system-level verification completeness measurement method, basis is provided for processing through quantitative description of related verification reliability of the processor, and the scenario-based processor system-level verification completeness measurement method has the advantages of high verification speed, high verification efficiency, high testing environment utilization rate, and short verification time.
Owner:NAT UNIV OF DEFENSE TECH

Information operation and maintenance service knowledge sharing method based on trusted computing of big data

The invention provides an information operation and maintenance service knowledge sharing method based on trusted computation of big data. According to the method, a trusted degree assessment mechanism and a trusted relationship transfer mechanism are built on the basis of characteristics such as protective function, authentication, integrity measurement and the like; the method comprises steps as follows: secure storage of information operation and maintenance knowledge, secure access of information operation and maintenance knowledge as well as trusted evaluation, wherein the secure storage of the information operation and maintenance knowledge comprises following steps: (1), performing security verification on an identity of a stored user; (2), preprocessing information operation and maintenance service knowledge data; (3), performing encoding; (4), performing abstract concentration on hardware storage resources, mapping the resources to an integrated and unified resource pool, and virtualizing a user operating system; (5), storing the information operation and maintenance service knowledge data into the resource pool in a final code form; the secure access of the information operation and maintenance knowledge comprises following steps: (1), performing security verification on an identity of an access user; (2), reading the information operation and maintenance service knowledge data stored on the resource pool. With the adoption of the method, barrier-free sharing can be realized, memory footprint is reduced, the data calling speed is increased, and the security of information operation and maintenance service knowledge sharing is improved on the premise that the convenience is guaranteed.
Owner:广州同构信息科技有限公司

Method and device for equipment model checking, computer equipment and storage medium

The invention relates to a method and a device for equipment model checking, computer equipment and a storage medium. The method comprises the following steps: determining a first device number, a first device type and first position information corresponding to each piece of equipment according to an equipment model; identifying at least one piece of equipment from an equipment drawing corresponding to the equipment model through a pre-trained equipment shape identifier; determining a second equipment number corresponding to each piece of equipment according to the lead corresponding to eachpiece of equipment; determining a second equipment type and second position information corresponding to each piece of equipment in the equipment drawing; when the first equipment number is consistentwith the second equipment number, obtaining a first matching result of the first equipment type and the second equipment type, and a second matching result of the first position information and the second position information; and based on the first matching result and the second matching result, determining a checking result for checking the equipment model. By adopting the method, the equipmentchecking efficiency of the equipment model can be improved.
Owner:深圳市万翼数字技术有限公司

Automobile navigation information data sharing method

The invention provides an automobile navigation information data sharing method. The method comprises a step of secure storage of automobile navigation information data and a step of secure access of the automobile navigation information data, wherein the step of secure storage of the automobile navigation information data comprises the following sub-steps of: (1) carrying out security verification on the identity of a storage user, (2) pre-processing the secure storage of automobile navigation information data, (3) carrying out coding, (4) abstractly and intensively mapping hardware storage resources into a complete and uniform resource pool and virtualizing a user operation system, and (5) storing the navigation information data in the resource pool in a final code form; and the step of secure access of the automobile navigation information data comprises the following sub-steps of: (1) carrying out security verification on the identity of an access user, and (2) reading the automobile navigation information data stored in the resource pool. According to the automobile navigation information data sharing method, the barrier-free share can be realized, the memory usage is decreased, the data calling speed is improved, and the security of sharing the automobile navigation information data is improved under the premise of ensuring the convenience.
Owner:吴本刚

Ticket booking and checking system and ticket booking and checking method thereof

A ticket booking and checking system comprises a user ticket booking terminal, a ticket booking server, and a ticket checking terminal. The user ticket booking terminal is used for issuing a ticket booking request to the ticket booking server, prompting a user to input ticket booking data and a checking password according to the response of the ticket booking server and sending the ticket booking data and the checking password to the ticket booking server. The ticket booking server is used for responding to the ticket booking request from the user ticket booking terminal, generating an electronic ticket according to the ticket booking data and the checking password from the user ticket booking terminal and sending the electronic ticket to the user ticket booking terminal, wherein the electronic ticket is provided with plaintext information corresponding to the ticket booking data and a checking code generated by the checking password. The ticket checking terminal is used for prompting the user to input the checking password, scanning and identifying the checking code on the electronic ticket or a paper ticket printed based on the electronic ticket and matching the checking code with the checking password currently input by the user. The ticket booking and checking system is not affected by the condition of network, is quick in checking, safe and efficient.
Owner:SHANGHAI MINXING SECOND MIDDLE SCHOOL

Intelligent access control system with short message validation and validation method of intelligent access control system

The invention discloses an intelligent access control system with short message validation. The intelligent access control system comprises a processor, a memory, a bluetooth communication unit, a mobile phone terminal, an alarm unit, a signal search unit, a validation unit, a random number generation unit, a digital keyboard, a door control unit and a power supply unit; a validation method of the intelligent access control system comprises the following steps: setting a matched password, matching the mobile phone terminal of personnel allowed to enter with the intelligent access control system through the bluetooth communication unit and the set password; transmitting a search signal by the signal search unit of the intelligent access control system; searching the matched mobile phone terminal, generating a random number validation code by the random number generation unit and transmitting to the mobile phone terminal; inputting the received validation code by the personnel requesting to enter through the digital keyboard; and validating whether the input number is correct or not by the validation unit. The access control system is controlled through the validation code in a bluetooth communication manner; the validation speed is high; the jammed condition does not easily appear; and the validation code is generated through the random number generation unit, so that the intelligent access control system is high in safety performance and small in error.
Owner:天津瑞为拓新科技发展有限公司

Generation and verification method for visual digital identity of article

The invention relates to a generation and verification method for the visual digital identity of an article, and belongs to the field of digital signature technologies and computer technologies. The method comprises key configuration, visual digital identity generation and identity verification. An article production or distribution unit has two keys, namely, one is the private key, and the other is the public key. The private key can be only owned by the unit and used for generating the visual digital identity of the article; the private key is composed of 16 characters. The public key can be disclosed and is stored on a unified verification platform and used for allowing a consumer to verify the visual digital identity of the article. According to the generation and verification method for the visual digital identity, neither an electronic chip nor a special card reader is required; the method has the advantages that cost is low, counterfeiting cannot be achieved, verification is convenient, the calculating speed is high, and error codes will not occur; besides, the method can be used for counterfeiting prevention and tracing of foods, medicines, agricultural products, cosmetics, crafts, bills, certificates, documents and the like and can also be used for establishing lightweight Internet of things in a cloud computing mode.
Owner:苏盛辉 +2
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products