Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

79results about How to "Implement authentication" patented technology

Control apparatus and method for household appliances, and household appliances

The invention discloses a control apparatus for household appliances. The control apparatus comprises an obtaining module, a processing module, an iris comparison module, a control module, an infrared detection module and a heart rate comparison module, wherein the obtaining module is used for controlling a camera to shoot an iris of a user and obtaining a corresponding authenticated iris image; the processing module is used for extracting the feature information of the authenticated iris image; the iris comparison module is used for comparing the feature information extracted by the processing module with the feature information of an original iris; the control module is used for opening the household appliances when the user passes the identity authentication; the infrared detection module is used for obtaining a heart rate value of the user in a detection region according to a preset period; the heart rate comparison module is used for comparing the obtained heart rate value with a preset heart rate threshold value; and the control module is also used for closing the household appliances when the obtained heart rate value is lower than the preset heart rate threshold value. Correspondingly, the invention also discloses the control apparatus for the household appliances, and the household appliances. By adoption of the invention, identity authentication for the user can be realized, and electric energy can be saved.
Owner:YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD

Unmanned aerial vehicle safety certifiable information communication processing method based on cloud platform

The invention belongs to the technical field of unmanned aerial vehicle communication, and discloses an unmanned aerial vehicle safety certifiable information communication processing method and system setting based on a cloud platform. The method includes: setting a system; extracting a part of secret keys; generating a full key; generating a ciphertext through a signcryption algorithm when a message is sent; generating a plaintext through an unsigncryption algorithm by taking the receiver identity label and the parameters thereof as input; enabling the authorization mechanism to execute a corresponding algorithm so as to check and supervise the communication content of the unmanned aerial vehicle and the ground console; and enabling different nodes to aggregate a plurality of signatureson different messages into one signature for aggregation authentication, so as to reduce the authentication overhead. According to the invention, confidentiality, authentication, non-repudiation and unforgeability are realized; public key encryption and digital signature are combined, and confidentiality and identity authentication can be achieved at the same time. The authorization mechanism provides part of the key through the secure channel, and can check the access command and the location information. The control command and the position information cannot be forged under the condition ofno other part of private keys.
Owner:XIDIAN UNIV

Head-mounted online examination machine

The invention provides a head-mounted online examination machine and belongs to the technical field of computer education and network. The examination machine comprises a shell, a head-mounted frame, observation mirrors, an observation mirror bracket, a light inductor, a distance inductor, a control board, an iris recognition and eye monitoring camera set, an earphone cover, a playing trumpet and a microphone, wherein the examination machine is provided with a connector connected with a PC (Personal Computer) side; the observation mirror bracket is fixedly connected with the shell; the two observation mirrors are mounted on the observation mirror bracket; the light inductor is arranged at the lower part of the observation mirror bracket; the distance inductor is mounted on the observation mirror bracket; the control board is fixedly connected with the shell; the iris recognition and eye monitoring camera set is used for photographing irises of examiners; and the earphone cover is internally provided with the playing trumpet and the microphone. With the adoption of the device provided by the invention, online closed-book exams can be realized, and identity verification of the examiners can be realized; and a condition that the examiners pick off the device to cheat in an examination process can be prevented and a condition that the examiners cheat by hearing sounds can be prevented.
Owner:SHENZHEN HUAYI MEDICAL TECH CO LTD

Method and system for guiding airplane docking and identifying airplane type based on machine vision

The invention discloses a method and a system for guiding airplane docking and identifying an airplane type based on machine vision. The method comprises the steps of S1, setting an airplane docking scene, dividing a monitored scene into different information processing functional areas; S2, image pre-processing for performing preprocessing on a photographed image; S3, capturing the airplane, confirming a fact that the airplane appears in the image through identifying the engine and the front wheel of the airplane in the image; S4, tracking the airplane, performing continuous tracking real-time updating on the captured images of the engine and the front wheel of the airplane; S5, positioning the airplane, realizing real-time positioning on the airplane and accurately determining the deviation degree of the airplane relative to a guiding line and a distance between the airplane and a stopping line; and S6, displaying information, outputting and displaying the deviation degree of the airplane relative to the guiding line and the distance between the airplane and the stopping line in the step S5. The method and the system have advantages of realizing airplane docking guiding in a visual manner and effectively accuracy in an airplane docking process.
Owner:SHENZHEN CIMC TIANDA AIRPORT SUPPORT

Service handling method based on electronic certificate, government affair self-service terminal and storage medium

The invention discloses a service handling method based on an electronic certificate, a government affair self-service terminal and a storage medium. The method comprises the following steps: generating and displaying a two-dimensional code according to an electronic certificate card package use request initiated by a user, the two-dimensional code being used for being scanned by a user terminal to enable the user terminal to send authorization information to an electronic certificate library; receiving an electronic identity card or a Hong Kong Australian/Taiwan pass of the user pushed by theelectronic certificate library according to the authorization information; acquiring a current face image of the user through an image collection unit, and performing face comparison on the face image and the head portrait of the electronic identity card or the Hong Kong Australian/Taiwan pass to judge whether people and certificates are consistent or not; and if so, entering a service handling operation page. According to the method, the corresponding electronic certificate is acquired through the authorization information of the user, so that the electronic certificate is compared with theacquired current face image to realize identity authentication of the user, the user does not need to carry an identity card or input an identity card number, and the method is more convenient and quicker.
Owner:GUANGDONG KAMFU TECH CO LTD

Access control device and verification method thereof, verification device and verification method thereof, verification system and verification method thereof

The invention discloses an access control device and verification method thereof, a verification device and verification method thereof, a verification system and verification method thereof. The verification method of the access control verification device comprises the following steps that: to-be-verified information of a to-be-verified access control device is received; device verification information and feature verification information in the to-be-verified information are verified by using preset legal verification information; and when the device verification information and feature verification information in the to-be-verified information are verified successfully, the to-be-verified access control device is determined to be verified successfully. Therefore, the access control device is verified and the identity verification of the access control user is realized; and thus a problem that the identity verification of the card reader is done successfully illegally by counterfeiting the access control card easily because the existing access card reader only verifies the access control card instead of the identity of the card user in the existing access control verification process is solved.
Owner:NATIONZ TECH INC

System and method of group real name verification based on handset binding and WEB mode

A group real-name verification system and method based on the cell-phone bonding and WEB, it can achieve the verification to the IM software group administrator identification. The system includes: the group server, the authentication information server, the logging server, and the cell-phone bonding server. Firstly, the group server verifies the user authority, and allocates an un-activated group number to the competent user, and then, sends the request whether user information is complete to the authentication information server, and the authentication information server verifies the user's information or prompts the user to input information, and verifies whether the group application number of the user bonding the cell-phone or prompts the user to bond the cell-phone. The authentication information server feeds back to the group server the information whether the user information is incomplete, and if fully, the group server activates the group number, otherwise, not activates the group number. Using the system and method in the invention, it can effectively achieve the identification verification of the group's administrator, in favor of finding and restraining the group administrator, to achieve effectively managing the group and network environment.
Owner:TENCENT TECH (SHENZHEN) CO LTD

Identity verification method and system

ActiveCN105336020AEasy to losePrevent identity impersonationIndividual entry/exit registersTime limitIdentity theft
The invention provides an identity verification method and system. The method comprises the following steps: acquiring entry and exit information; examining and verifying the entry and exit information; generating a time-limited two-dimension code after the entry and exit information passes examination and verification; determining a verification message; sending the verification message to a receiving terminal; receiving the time-limited two-dimension code send by a person coming in or going out; verifying whether the identity of the person coming in or going out is valid according to identity identification included in the time-limited two-dimension code so as to obtain a first verification result; verifying whether the received two-dimension code is valid according to entry time and departure time included in the time-limited two-dimension code so as to obtain a second verification result; and determining the identity verification results of the person coming in or going out according to the first verification result and the second verification result. The identity verification method and system provided by the invention prevent identity theft caused by loss or theft of verification information of clients; and the valid time of the time-limited two-dimension code is so precise that the code can only be used once, so fine-grained identity verification based on frequency and time is realized.
Owner:CHINA MOBILE GRP HEILONGJIANG CO LTD

Electronic voting method and device based on block chain and storage medium

The embodiment of the invention provides an electronic voting method and device based on a block chain and a storage medium. The method comprises: an electronic voting initiator node broadcasting a voting qualification condition, identification information of a supervision node and to-be-voted information in a block chain network; the supervision node auditing the voting qualification of the voting node; if the voting qualification of the voting node is approved, the supervision node sending voting permission information to the voting node; the voting node voting by adopting the permission information signed by the supervision node private key; after the electronic voting initiator node receives the voting content which is sent by the voting node and carries the permission information, sending the permission information to the voting node; verifying the private key signature of the supervision node in the permission information; and if the verification is passed, determining that the identity verification of the voting node is passed, so that the voting node can perform anonymous voting, and meanwhile, the identity verification of the voting node by the electronic voting initiatornode is also realized, and the safety of the voting node and the safety of electronic voting are improved.
Owner:全链通有限公司

Identity recognition keyboard and method of performing identity authentication according to identity recognition keyboard

The invention discloses an identity recognition keyboard and a method of performing identity authentication according to the identity recognition keyboard. A fingerprint recognition area is used for inputting fingerprints of a user to generate an intact fingerprint image of all fingers; a blue light induction plate is used for collecting palm information, wherein the palm information comprises basic radians and fingering of both hands working on keys; a data acquisition unit for collecting key information is arranged on each key, wherein the key information comprises the fingerprints of the fingers tapping the keys, keying strength and stay time; a learning unit performs training and learning on the palm information and the key information, and an identity authentication model for the user tapping the keyboard is established in combination with the intact fingerprint image. By arranging the fingerprint recognition area, the blue light induction plate and the data acquisition units on the keyboard, input and matching of the fingerprints of the user are realized; according to the input fingerprints of the user, encryption of a computer can be realized through the keyboard, and only when the fingerprints of the user tap the keyboard can opening of a computer coded lock, normal use of the keyboard and identity authentication of the user be realized.
Owner:BEIJING UNIV OF TECH

Fingerprint processing method and device and storage medium

The invention discloses a fingerprint processing method and device and a storage medium, relates to the field of fingerprint processing, and is used for solving the problem that fingerprints of children (such as children aged five years or less) with unshaped fingerprints are difficult to identify by a fingerprint lock on the market at present. The method comprises the following steps: acquiring auser fingerprint, and extracting respective widths of a ridge and a valley in the user fingerprint; Determining the type of the fingerprint of the user according to the respective widths of the ridgeand the valley; If it is determined that the type of the user fingerprint is an adult fingerprint, performing identity verification by adopting a fingerprint verification method corresponding to theadult fingerprint; And if it is determined that the type of the user fingerprint is the child fingerprint, performing identity verification by adopting a fingerprint verification method correspondingto the child fingerprint. Thus, classification of adult fingerprints and child fingerprints is achieved through the width of the ridge and the width of the valley in the fingerprints of the user, andidentity verification of the child fingerprints is achieved.
Owner:GREE ELECTRIC APPLIANCES INC OF ZHUHAI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products