Patents
Literature
Eureka-AI is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Eureka AI

142results about How to "Guaranteed legality" patented technology

Identity verification method and system

The invention discloses an identity verification method and system. The method comprises: a cash collecting device receiving cash collecting information, according to the cash collecting information and payee identity information, obtaining payee electronic identification for outputting, and associating the payee identity information with a payee account, the payee electronic identification comprising an electronic identification expiration date; a payment device obtaining payee electronic identification, and verifying payee identity validity according to the payee electronic identification; the payment device, according to the payer identity information and current time information, obtaining a payer electronic identification for outputting, and associating the payer identity information with a payment account, the payer electronic identification comprising an electronic identification expiration date; and the cash collecting device obtaining the payer electronic identification, and verifying payer identity validity and according to the payer electronic identification. According to the invention, payee and/or payer identity validity are verified by use of a dynamic electronic identification, such that cheating of a phishing website is prevented; and each identity is bound with an account, and payment can be carried out without inputting a password and exposing an account medium, such that the security of the password and the account medium is ensured.
Owner:INDUSTRIAL AND COMMERCIAL BANK OF CHINA

Method for traffic monitoring and business service quality guarantee strategy based on SDN

The invention discloses a method for a traffic monitoring and business service quality guarantee strategy based on SDN. The method comprises the following steps: a. creating a network topology under the SDN architecture, configuring an Openflow switch, and establishing a connection between the switch and an SDN controller; b. providing an open northbound API interface on the SDN controller; c, obtaining, by an application system program, complete device information and link information; d, inputting the business to be guaranteed according to the business requirements; e, according to a sourcedestination address of the service flow, transmitting an algorithm class to calculate a scheduling path, and generating the optimal scheduling path of the current network; f. transmitting the scheduling path in e into a strategy generation class, generating a scheduling flow table in combination with the business guarantee strategy in d, and issuing the scheduling flow table into the switch; and g. adding a data transmission queue to a switch port according to the scheduling flow table in f. By adoption of the method disclosed by the invention, the stable operation of the network business, theefficient use of the link bandwidth and the maximum optimization of the whole network performance are maximally guaranteed.
Owner:CHINA UNIV OF PETROLEUM (EAST CHINA)

Computer remote security control method

The invention discloses a computer remote security control method, which belongs to a method for managing and controlling a computer network and aims to solve the problem that in the conventional control method, identity authentication and authority control of involved nodes and security control of an information transmission process are absent, and also to provide a complete set of security mechanism for remote control in an Internet environment. The computer remote security control method is used for a network information processing system consisting of a client node and a server node, which orderly comprises a step A of initialization, a step B of node authentication, a step C of verification and a step D of data transmission. The computer remote security control method has the advantages of effectively verifying the identities of the nodes and users involved in a remote control network and control authorities thereof, providing the security control for the access of the users, providing secure socket links for the encrypted transmission of various information and data, and greatly enhancing the confidentiality and security of the data transmission in the network environment, and is applied to remote control systems in the current complex, open and remote Internet environment.
Owner:HUAZHONG UNIV OF SCI & TECH

Identity verification method, device and system

The invention discloses an identity verification method, device and system, and belongs to the technical field of wireless networks. The identity verification method comprises the steps that user identification for a terminal to log into a specific application and access point information of a target access point are acquired; a verification request is sent to an access point server so that the access point server can verify the verification request, wherein the verification request carries the user identification and the access point information; if the verification request passes the verification, a verification result fed back by the access point server is received and sent to the target access point, and the target access point establishes communication connection with the terminal after receiving the verification result. According to the identity verification method, device and system, the target access point sends the user identification and the access point information to a specific application server, the specific application server sends the verification request to the access point server, the user identification is verified, and therefore the legality of users can be guaranteed, the probability of intrusion of illegal users is lowered, the operation efficiency of the target access point is improved, and the operation cost of the target access point is lowered.
Owner:TENCENT TECH (SHENZHEN) CO LTD

System and method for sharing cross-regional medical image information

The invention discloses a system and method for sharing cross-regional medical image information. The system is mainly composed of three major components as follows: a regional medical image sharing platform, a short message authentication system and a medical image information storage device, wherein the regional medical image information sharing platform is composed of a document registration library, a distributed document storage library, a patient cross-indexing manager, an audit trail and node verification manager and a current medical mechanism PACS (Picture Archiving and Communication System) all of which are built in a special network; and an agent server is used for the calling outside the region. The medical image information storage device mainly comprises shared document submission collections, shared documents, key images, a shared document editor, a digital certificate and an image browsing software. The short message authentication system is used for guaranteeing legality of reading the medical image information outside the region. The system and method for sharing cross-regional medical image information, disclosed by the invention, have the advantages of avoiding printing of check reports and photographic films, saving examination cost for patients and avoiding repeated examination as the medical image information can be carried by a patient per se to be used in other medical mechanisms.
Owner:HANGZHOU DIANZI UNIV

Intelligent security chip signature information transmission method and system based on 2-dimensional bar code

The invention relates to an intelligent security chip signature information transmission method and system based on a 2-dimensional bar code. The 2-dimensional bar code is generated by the following steps: an intelligent security chip is inserted into a terminal device; the intelligent security chip is used to put a signature on the original data and thus signature value information is obtained; and the terminal device assemblies the original data, the signature value information and a message verification code to generate a 2-dimensional bar code, and displays the 2-dimensional bar code. Scanning authentication of the 2-dimensional bar code comprises the following steps: an application scans the 2-dimensional bar code, parses the data of the 2-dimensional bar code so as to obtain the to-be-authenticated data, and then sends the to-be-authenticated data to an application background; an authentication center verifies the to-be-authenticated data, and sends a verification result back to the application through the application background. With application of the intelligence security chip signature information transmission method and system based on a 2-dimensional bar code, in an intelligent card identity authentication application system, the problem of poor data communication between an intelligent card and a background system due to unavailable card reading devices is solved, so that comparative transmission of the signature information of the intelligent card is fulfilled without using a particular intelligent card reading device.
Owner:THE THIRD RES INST OF MIN OF PUBLIC SECURITY

Non-center dot product computing method achieving privacy protection

The invention provides a non-center dot product computing method achieving privacy protection. The non-center dot product computing method achieving privacy protection includes the following steps that 1, a first participant and a second participant are connected with a trusted third party, so that corresponding privacy vector certificates of the first participant and the second participant are obtained, wherein the certificates comprise privacy vector ciphertext; 2, the first participant sends the certificate of the first participant to the second participant; 3, the second participant carries out ciphertext homomorphic dot product computation on the basis of the privacy vector ciphertext in the certificate of the first participant, and sends the dot product ciphertext and the certificate of the second participant to the first participant; 4, the first participant decodes the dot product ciphertext to obtain the privacy vector dot product of the first participant and the privacy vector dot product of the second participant. Safety multi-party dot product computation is achieved without participation of a center server, input and output verifiability is ensured for users, and the requirements of the users for personal data privacy protection and the reliability of dot product computing results in a not credible environment are met.
Owner:TSINGHUA UNIV

Method, device and system for transaction by mobile phone

The invention discloses a method, a device and a system for transaction by a mobile phone. The encryption method for the transaction by the mobile phone comprises the following steps: A, an operator side binds the international mobile subscriber identity (IMSI) and the mobile phone number of a terminal, and then, generates authentication information, the operator side receives a transaction message sent by the terminal, then, encrypts the transaction message and the authentication information by using pre-generated dynamic encryption keys, and sends the encrypted transaction message and authentication information to a bank side; and B, the bank side decrypts the received encrypted transaction message and authentication information, carries out authentication by using the authentication information, and executes corresponding operation according to the transaction message after the authentication is successful. With the adoption of the method, the device and the system for the transaction by the mobile phone, the transactions of users can be safer and more reliable; and the whole transaction process does not need a third-party payment platform actually, so that the transaction process can be simpler and safer and is convenient to maintain.
Owner:中国移动通信集团宁夏有限公司

City service intelligent shared outdoor media information release platform and release method

The invention discloses a city service intelligent shared outdoor media information release platform and release method. The release platform comprises an information service platform, an intelligentdisplay robot and a client; the intelligent display robot is mounted outdoors and communicates with an information service platform through the internet; the client communicates with the information service platform and the intelligent display robot to realize functions of user registration, login, viewing, bidding, editing, release and the like; the intelligent display robot comprises a control host, and an interactive system and a display system connected with the control host; the interactive system comprises a human body movement identification module, a human body orientation perception control module and a human body approach and departure perception module, which realize remote interaction, human body rotation following and short-distance voice touch comprehensive interaction functions respectively; the display system comprises an advertisement window and an interactive window; different information is pushed by a media information pushing module and is displayed by the advertisement window and the interactive window; in combination with application of an innovative commercial mode and a self-adaptation function of the intelligent display robot, a good media information release and query mode is provided for city services and elements around, and the attraction, interactivity and management controllability of outdoor products are improved; and the release platform is used online for advertisement invitation, also can bring huge benefits for cities, and has wide market prospects and promotional values.
Owner:山东依鲁光电科技有限公司

Terminal identifier parsing and service transmission method, system and device in integrated network

The invention discloses a terminal identification analyzing method in an integrated network, comprising the following steps that; A. a demand message sent to a source terminal is received and comprises a service identifier demanded by the source terminal; B. a destination terminal identifier corresponding to the service identifier demanded by the source terminal is found out in the correspondenceof the terminal identifier stored in advance and the service identifier supported by the terminal; C. a reply report is sent back to the source terminal and comprises the destination terminal identifier. The terminal identification analyzing method realizes the process of analyzing the terminal identifier and provides the good support for gaining access to the integrated network for the source terminal of an external network; in addition, the method realizes the effective authentication of the identifier and guarantees the validity and the authority of the identifier as well as guarantees thesecurity of the network data transmission. The invention also discloses a terminal identification analyzing system in the integrated network and a device as well as a method for transmitting the service in the integrated network and a system and a device.
Owner:HUAWEI TECH CO LTD +1

Network-based voting method and network-based voting system

Disclosed are a network-based voting method and a network-based voting system. The network-based voting system comprises an information input module, both the information input module and an image acquisition and analysis module are connected with a network transmission module, the network transmission module is connected with a voting server through a network, the voting server is further connected with a fingerprint authentication module, the information input module is used for receiving fingerprint feature information and voting information of a user intending to vote, the image acquisition and analysis module is used for acquiring the fingerprint feature information of the user intending to vote, the network transmission module is used for network transmission of the information, the voting server pre-stores initial fingerprint feature information of all users capable of voting and is used for receiving identity information, voting information and the acquired fingerprint feature information, and the fingerprint authentication module is used for comparing the invoked initial fingerprint feature information of one declared user with the acquired fingerprint feature information of the user intending to vote and feeding a comparison result to the voting server, so that legality of voters is guaranteed, and voting fairness is also guaranteed.
Owner:SHAANXI UNIV OF SCI & TECH

Information obtaining method and system, and computer readable storage medium

The invention discloses an information obtaining method, which is applied to an information processing platform. The method comprises the steps of sending a query authorization request to a personal information subject according to an information query request when the information query request sent by a query demand subject is received; after query authorization information returned by the personal information subject is received, obtaining personal information data corresponding to the personal information subject; and according to the obtained personal information data, generating personalinformation corresponding to the personal information subject. The invention furthermore discloses an information obtaining system and a computer readable storage medium. A passive query of an existing personal credit information query method is changed to an active authorization query, so that the personal information subject can be ensured to judge the legality of the query demand subject and the reasonability of a query demand, and the knowing right of the personal information subject to the query demand and the authorization confirmation right of the personal information subject to personal information query operation are guaranteed.
Owner:深圳忠信信息技术有限公司

Second-generation ID card data verification system and method based on NFC (near field communication) technology

The invention provides a second-generation ID card data verification system and method based on the NFC (near field communication) technology. The system comprises an ID recognition device, an authentication server and an ID information base, wherein the ID recognition device comprises an NFC module and an ID information acquisition module which are connected with a first transmission module jointly, and the first transmission module is in wired or wireless connection with a second transmission module connected with the authentication server. The system submits information in a second-generation ID card and feature information of a card holder to a database together, real information of the second-generation ID card holder is compared with submitted new information, and authenticity, validity and consistency judgment of data of the second-generation ID card can be realized. With the adoption of the system and method, the condition that a user uses a counterfeit or false ID card to conduct illegal activities is effectively avoided, the effective real-name authentication means in internet and mobile applications is provided, and legality and safety of ID information during usage is guaranteed.
Owner:江苏买卖网电子商务有限公司

Digital forensic method based on blockchain privacy protection and fine-grained access control

The invention discloses a digital forensic method based on blockchain privacy protection and fine-grained access control, comprising the following steps: a first supervisor creates a digital forensictransaction, initiates a digital forensic transaction request to a second supervisor, and transmits important information of the digital forensic transaction to the second supervisor; the second supervisor generates an attribute encryption intermediate parameter through an encryption module, and authorizes and publishes the attribute encryption intermediate parameter in the blockchain; after obtaining authorization, the first supervisor obtains the fragmentation secret key from the secret key management mechanism module through authorization information and combines the fragmentation secret key to generate a decryption secret key, and the data collection module collects data in the storage system through the decryption secret key; the first supervisor analyzes the data after acquiring thedata to obtain a data analysis result; an evidence obtaining digital report is generated, and evidence obtaining is completed; according to the invention, the potential of the block chain and the intelligent contract is utilized, and the encryption primitive is designed to construct the Internet of Vehicles digital evidence obtaining scheme based on the block chain, and the scheme has auditability, privacy protection and fine-grained data access control.
Owner:JINAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products