Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

34results about How to "High degree of encryption" patented technology

Verification method based on pressure touch control, verification device based on pressure touch control, and terminal

The invention provides a verification method based on pressure touch control, a verification device based on pressure touch control, and a terminal, wherein the verification method based on pressure touch control comprises the following steps of receiving a pressing operation event of at least one preset touch control region in a plurality of touch control regions pre-divided by a user on a terminal touch screen; detecting whether the pressing operation event meets a preset verification condition or not; if the detection result shows that the pressing operation event meets the preset verification condition, passing the verification; and if the detection result shows that the pressing operation event does not meet the preset verification condition, forbidding to pass the verification. By using the technical scheme, the touch screen position and the touch control pressure value are combined to form dual encryption; the verification encryption degree is improved; the security of operations such as terminal unlocking and payment verification is improved; the security of personnel information and properties of the user is ensured; and the user experience is improved.
Owner:YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD

Real-time video sensitive information protection system and method

The invention provides a real-time video sensitive information protection system and method. The real-time video sensitive information protection method comprises the following steps: S1, collecting a real-time video stream; S2, separating the video stream, separating the video stream by an equal interval, adopting a detection algorithm to extract a preset foreground stream in each segment of video stream, and hiding privacy and sensitive information in the foreground stream through a reversible algorithm, wherein the reversible algorithm refers to a public key generated in a corresponding time interval, the detection algorithm comprises target detection and template matching algorithms, the reversible algorithm comprises a scrambling algorithm and a password book translation algorithm, and a scrambling algorithm performs data encryption through image splitting, data expansion and image combination; S3, adopting an irreversible algorithm to erase sensitive information in the video stream so as to obtain a background stream, wherein the irreversible algorithm comprises a mosaic method, a color block covering method and a frosted glass effect; and S4, restoring the original video stream. The encryption degree of the video stream can be improved, encryption is reversible, and the protection degree of personal privacy is greatly improved.
Owner:北京朗达和顺科技有限公司

Micro-service security authentication method and device based on TOKEN, and storage medium

The invention provides a micro-service security authentication method and device based on TOKEN, and a storage medium. According to the scheme, the method comprises: obtaining user login information through input equipment, and the user login information comprising a user account and a user password; reading the user login information by utilizing an identity authentication service, and verifying whether the user login information is correct or not; performing matrix encryption on the user login state, and forming a section of Token user encryption authorization code; storing the Token user encryption authorization code in a request header of an HTTP, and performing encryption transmission on a request link by using https; and the verification micro-service decoding to obtain the Token user encryption authorization code, decrypting the Token user encryption authorization code to judge the Token permission, and returning related resources and data. According to the scheme, the security of the system is improved by designing a complete set of authentication system, and dual encryption measures are used in the process of transmitting and receiving Token user encryption authorization codes, so that the security of account information in the system of the micro-service architecture can be reliably protected.
Owner:光大兴陇信托有限责任公司

Access control system and method based on image recognition technology

The invention discloses an access control system based on an image recognition technology. The access control system comprises a feature acquisition system, a feature verification system and a memorandum system, wherein the feature acquisition system comprises an image capturing module, a fingerprint acquisition module, a height acquisition module, an infrared light source central processing calculation module and a recording and storage module, the feature verification module comprises an input signal module and an output signal module, and the memorandum system comprises a mobile phone APP module, a cloud storage module, a signal conversion module and a display module. By means of an infrared sensing module arranged in the access control system, the access control system can only be opened when sensing the temperature of an object during the opening and closing of the access control system, thus a duplicated fingerprint or a photographed face picture cannot pass the detection of theaccess control system, the safety factor of the access control system is effectively increased, and memorandum events stored in advance on the display screen are observed, so as to remind the staff tohandle the pending events in time and avoid forgetting them.
Owner:彭喆

Water-based fluorescent ink as well as preparation method and application thereof in full-color printing and encryption anti-counterfeiting

The invention relates to the technical field of water-based fluorescent ink, and provides water-based fluorescent ink as well as a preparation method and application thereof in full-color printing and encryption anti-counterfeiting. The water-based fluorescent ink provided by the invention comprises the components: polystyrene nanoparticles, a surfactant, water, ethanol, glycerol and a UV-cured fluorescent dye, wherein the fluorescent dye is a red, green or blue fluorescent dye. The fluorescent ink with three colors of red, green and blue is prepared by adopting an instantaneous nano precipitation method, the high-viscosity fluorescent dye is dispersed and transferred from an oil phase to a water phase, and the obtained water-based fluorescent ink takes water as a main continuous phase, is good in safety and relatively low in viscosity, can be used for a high-flux civil ink-jet printer and can realize diversification and high efficiency of printed patterns. Patterns printed by the ink are completely invisible under natural light, different colors are displayed under ultraviolet light with different wavelengths, the ink can be used for full-color printing, the pattern quality is good, and the ink has wide application prospects in fluorescent color-changing encryption and anti-counterfeiting.
Owner:HARBIN INST OF TECH SHENZHEN GRADUATE SCHOOL

Three-dimensional image encryption method and system based on computer-generated hologram

InactiveCN111767562AReduced edge retention characteristicsReduce smoothnessImage enhancementImage analysisAlgorithmEdge maps
The invention relates to the technical field of three-dimensional image encryption, and discloses a three-dimensional image encryption method based on a computer-generated hologram, which comprises the following steps of acquiring a three-dimensional image to be encrypted, and layering the three-dimensional image by using a tomography method to obtain a cross section of each layer, detecting section edge points by using an edge distance algorithm based on an edge graph, connecting the edge points into candidate line segments based on a linear support area method, decomposing the cross sectioninto a plurality of plane waves with different spatial frequencies by using a plane angular spectrum method, calculating each layer of sub-hologram of the three-dimensional image based on angular spectrum diffraction, and superposing the sub-holograms corresponding to the layers to obtain a complete computer-generated hologram of the three-dimensional image, and encoding the computer-generated hologram into the three phase plates through phase plate iteration, so that the encryption of the three-dimensional object image is realized. The invention further provides a three-dimensional image encryption system based on the computer-generated hologram. Thus, encryption of the three-dimensional image is realized.
Owner:汪金玲

Long-afterglow nanoparticle with fluorescence encryption anti-counterfeiting characteristics, and preparation method thereof

The invention provides a long-afterglow nanoparticle with fluorescence encryption anti-counterfeiting characteristics, and a preparation method thereof. The long-afterglow nanoparticle is composed oftwo nanoparticles, namely a ZnAlxGeyO(2+3x+4y)/2 nanoparticle serving as interference information and a ZnAlx-zCrzGeyO(2+3x+4y)/2 nanoparticle serving as anti-counterfeiting information, wherein x isgreater than 0 and less than or equal to 2, y is greater than 0 and less than or equal to 1, z is greater than 0 and less than or equal to 0.3, and z is less than x; the ZnAlx-zCrzGeyO(2+3x+4y)/2 nanoparticle emits visible light under the excitation of ultraviolet light, and emits near-infrared light under the stop of the excitation of the ultraviolet light; and the ZnAlxGeyO(2+3x+4y)/2 nanoparticle emits visible light under the excitation of ultraviolet light, and does not emit light when the excitation of the ultraviolet light is stopped. A fluorescent anti-counterfeiting ink can be preparedby utilizing different optical characteristics of the two nanoparticles, digital anti-counterfeiting and two-dimensional code anti-counterfeiting application of fluorescent encryption is realized, the encryption and anti-counterfeiting processes are easy to operate, the encryption degree is high, the encryption stability is high, the anti-counterfeiting concealment is strong, and the identification degree is high.
Owner:HANSHAN NORMAL UNIV

A computer encryption system adopting an RFID identification system

The invention discloses a computer encryption system adopting an RFID identification system, and relates to the technical field of computers. The system comprises a security encryption system unit, anRFID identification system unit and an alarm system unit; the inner side of the security encryption system unit comprises a primary verification module and a secondary password input module; the output end of the secondary password input module is electrically connected with a verification processing module; the output end of the verification processing module is electrically connected with a central processing unit module; the RFID identification system unit is electrically connected to the output end of the central processing unit module; the output end of the RFID identification system unit is electrically connected with a central database module, the output end of the central database module is electrically connected with a display terminal, and the inner side of the RFID identification system unit comprises a radio receiving module. The computer encryption system has the beneficial effects that the data encryption device can effectively perform double encryption on the data through verification setting of the primary verification module and the secondary verification module.
Owner:LAIWU VOCATIONAL & TECHNICAL COLLEGE

Face acquisition system based on edge intelligent perceptron and privacy protection method

The invention relates to a face acquisition system and privacy protection method based on an edge intelligent perception body, and the method comprises a face encryption process and a face decryption process, and the face information encryption process comprises the steps: obtaining a face image through the edge perception body, and obtaining a plurality of face regions in the face image; performing noise processing by using the feature extraction result of the face reference image, and performing superposition to protect the semantic features of the face; carrying out fuzzy processing on the face region and then storing the face region; in the face information decryption process, the visual terminal recognizes the face semantic features of a terminal user to form a decryption key, the face feature cloud database is traversed through a spatial-temporal index to carry out key matching, face feature self-decryption face pairing is achieved, then the encrypted video is presented through the generative adversarial network associated with the semantic features, and the face information is decrypted through the generated adversarial network associated with the semantic features. And multi-face targeted decryption in the image is realized. Compared with the prior art, the method has the advantages of image localization distributed storage, face feature cloud edge collaborative encryption, low-delay semantic transmission and the like.
Owner:TONGJI UNIV

Frequency electromagnetic lockset

The invention discloses a frequency electromagnetic lockset comprising a key contact and a matched encryption lock end. The key contact includes a stepped segment selection crystal array, selected insertion electrodes, a segmented frequency output head, a segment code signal synthesizer and a lap joint contact. The matched encryption lock end includes a segment code signal frequency-to-voltage converter, an electromagnetic driving source selector and an elastic code switch. The selected insertion electrodes are inserted into different position segments of the stepped segment selection crystalarray; the segment frequency output head is connected to the selected insertion electrodes by a segmented joint; and a signal output terminal of the segmented frequency output head is connected to thesegment code signal synthesizer. The key contact is connected to a power output terminal and a signal input terminal of the matched encryption lock end through a lap joint; a signal input terminal isconnected to the segment code signal frequency-to-voltage converter; the segment code signal frequency-to-voltage converter is connected to the electromagnetic driving source selector; the electromagnetic driving source selector is connected to the elastic code switch by an electromagnetic head. The frequency electromagnetic lockset has advantages of high safety and low energy consumption; and repeatability of a mechanical lock and insecurity of the electronic access control lock are overcome.
Owner:HANGZHOU ZHIHUI TECH CO LTD

Multi-anti-counterfeiting method and multi-anti-counterfeiting element based on structural color

The invention discloses a multi-anti-counterfeiting method and a multi-anti-counterfeiting element based on structural colors. The anti-counterfeiting method comprises the steps that a photonic crystal layer is formed on the surface of an object to be subjected to anti-counterfeiting, the photonic crystal layer at least comprises a first preset pattern and a second preset pattern which are invisible under visible light irradiation, and the first preset pattern serves as a first anti-counterfeiting mark and is composed of a first photonic crystal displaying a first reflection wavelength; the second preset pattern is composed of a second photonic crystal displaying a second reflection wavelength, the second preset pattern and the first preset pattern are complementary to each other and jointly serve as a second anti-counterfeiting mark, and the first reflection wavelength and the second reflection wavelength are different from each other; external stimulation is applied to the photonic crystal layer so that the first preset pattern and the second preset pattern can be sequentially converted into a visible state from an invisible state, the first anti-counterfeiting mark and the second anti-counterfeiting mark can be sequentially displayed, and complete encrypted information can be read after integration. According to the invention, multiple anti-counterfeiting is realized, the imitation difficulty is increased, and the encryption degree is improved.
Owner:ZHEJIANG SCI-TECH UNIV

Graphic code structure with mirror surface and scanning method thereof

The invention discloses a graphic code structure with a mirror surface. The structure comprises a two-dimensional graphic code pattern, an auxiliary verification pattern and at least one mirror surface, the two-dimensional graphic code pattern and the auxiliary verification pattern are formed on the same plane, and the two-dimensional graphic code pattern provides data information which can be shot and analyzed by terminal equipment; the auxiliary verification pattern is used for providing decryption features for the two-dimensional graphic code pattern; and the mirror surface is connected with the plane forming the two-dimensional graphic code pattern and forms an angle with the plane, so that clear mirror surface mapping can be realized. The invention also provides a method for scanningthe graphic code structure, which comprises the following steps of: shooting the graphic code structure by using terminal equipment so as to obtain spatial relationship data of the auxiliary verification pattern and the pattern printed on the plane in mirror reflection, judging whether the spatial relationship is consistent with a preset value or not, and if so, indicating that the verification succeeds, and further extracting data information of the two-dimensional graphic code to finish scanning. Three-dimensional space information is added to the two-dimensional graphic code, the anti-counterfeiting effects of difficult copying, effective identification and on-site code scanning are achieved, and compared with an existing three-dimensional graphic code structure, the method has the advantages of being easy and convenient to operate and easy to popularize.
Owner:江苏楠睿科技有限公司

Enterprise intellectual property patent submission and incoming text intelligent management system

The invention relates to the technical field of intelligent management, and discloses an enterprise intellectual property patent submission and incoming text intelligent management system, and the comprises terminal equipment and a database; the output end of the terminal equipment is connected with a file uploading module and authority management equipment, and the file uploading module is used for uploading and processing intellectual property data; the authority management device is used for managing various authorities of the intelligent management system, the other end of the file uploading module is arranged at the input end of the database, and the database is used for storing uploaded intellectual property data files. According to the enterprise intellectual property patent submission and incoming text intelligent management system, it is guaranteed that when intellectual properties are accessed, authority management setting is high in encryption degree and not prone to being attacked, the situation that confidential intellectual property files are stolen is eradicated, the information safety performance is improved, an intellectual property detection module is arranged instorage equipment, and the expired intellectual properties or intellectual properties with unqualified formats can be removed conveniently.
Owner:江苏云标科技有限公司

A communication encryption method between vehicle antenna and set-top box

ActiveCN105827396BIncreased encryption cracking difficultyRandomEncryption apparatus with shift registers/memoriesHigh intensitySet top box
The invention provides a vehicle-mounted antenna and a set top box communication encryption method, belongs to the communication encryption technology field and solves a problem that communication between a vehicle-mounted set top box and the vehicle-mounted antenna can be easily copied and monitored. The method comprises steps that A, a same set of plain text segments is commonly taken by the antenna and the set top box as a fixed code on the basis of mutual agreement; B, a random code containing a self ID number is sent and read by the set top box to the vehicle-mounted antenna, the random code and the fixed code are received by the vehicle-mounted antenna and are combined to form a corresponding plain text, a query code is calculated, and the query code acquired through calculation is returned to the set top box; C, according to the random code and the fixed code, the set top box carries out calculation and combination in the same mode to form a corresponding plain text, and a check code is calculated; and D, the query code is compared with the check code, if the two are completely identical, the set top box is activated and starts normal operation, if not, waiting continues. Through high-intensity encryption behaviors of the set top box and the antenna, communication can not be copied or monitored, and the set top box can be effectively prevented from being illegally used for other purposes.
Owner:ZHEJIANG CHINASTAR ELECTRONICS SCI & TECH

Multi-stage magnetic control mechanism of mechanical lock

The invention discloses a multi-stage magnetic control mechanism of a mechanical lock. The multi-stage magnetic control mechanism of the mechanical lock is characterized by comprising a lock cylinderbody, wherein the lock cylinder body comprises a lock hole arranged in a cylindrical structure and a rotating groove for embedding a key and communicating with the lock hole, a plurality of magnetic control switches are arranged in the lock cylinder body in the depth direction of the lock hole and are arranged in different radial directions of the lock hole, an encryption included angle is arranged between the connected magnetic control switches, when the magnetic control switches and magnets in a key are in same-pole correspondence, the magnetic control switches are in an unlocking state, a reset part for resetting the magnetic control switches is arranged in the lock cylinder body, the reset part resets the magnetic control switches one by one when the key leaves the lock cylinder body,the lower end face of the lock cylinder body is connected with a lock bolt, the lock bolt is arranged at a position far away from the lock hole, and the lock bolt is opened in the rotating process ofthe lock cylinder body. The multi-stage magnetic control mechanism of the mechanical lock has the advantages of multi-stage encryption and high encryption degree and is not easily pried.
Owner:ZHEJIANG MAKEPOWER ELECTRONICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products