Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

197results about How to "Improve authentication accuracy" patented technology

Authentication techniques in a monitoring system

An Electronic House Arrest Monitoring (EHAM) system of the present invention includes a transmitter attached to a monitored offender and a receiver positioned in the vicinity of the desired monitoring location. The transmitter and the receiver each have a pattern stored or generated therein for determining the interval of time between signal transmissions and receptions. The pattern is pseudo-random to offer improved protection against imposter transmitters, in other words the time intervals are selected to be unequal and randomly varying but the pattern is repeated or cycled to allow continuing signal transmission by the transmitter. The transmitter transmits signals at varying time intervals according to this pattern, and the receiver authenticates signals it receives as coming from the monitored transmitter based on the expected time intervals from the pattern. The pattern may include any number of time intervals and, in one embodiment, includes more than one subpattern to extend the length of the repeat cycle to increase the difficulty of defeating the monitoring system. As further protection against imposter devices, the receiver may verify the signals based on information unique to the transmitter included in each signal. The receiver may further use the received signals and unique time interval patterns to determine a number of operating states, including New Transmitter ID Received, Transmitter In Range and Locked to Transmitter, Transmitter In Range and Not Locked, Transmitter Out of Range, and Imposter Likely. The monitoring system may also include a remote host computer linked to the receiver or receivers to enable these operating states to be monitored remotely by enforcement personnel.
Owner:BI

Design method of safety face verification system based on CNN (convolutional neural network) feature extractor

The invention provides a design method of a safety face verification system based on a CNN (convolutional neural network) feature extractor, belongs to the field of biological feature identification, and particularly relates to a method of utilizing the CNN to extract face features and using a Paillier algorithm and an oblivious transfer technique to encrypt. Compared with the SCiFi (secure computation of face identification) system, the method has the advantages that the manually extracted feature is converted into the CNN self-learning feature, and the CNN self-learning feature is performed with binarization to remove the noise effect, so that the identification accuracy is higher; the testing identification rate is 91.48% on a view 2 of an LFW (labeled face wild) base; in the whole identification process, a server will not obtain any feature information of a requester, and only receive the feature ciphertext information, but not decrypt; a client only obtains whether the identification is passed or not, and does not know the other information, including hamming distance; one face picture is expressed by the 320bit feature, and compared with the SCiFi system, the feature data volume is decreased by 2/3, so that the consumption time of encrypting and identification is low, and the real-time performance is high.
Owner:BEIJING UNIV OF TECH

Intelligent vein authentication method and system having autonomous learning capability

The invention discloses an intelligent vein authentication method and system having autonomous learning capability. The method comprises steps that model training of the full convolutional neural network depth learning model in repeated and regular global training and irregular local training modes is carried out, before online operation of the full convolutional neural network depth learning model, one global training is carried out through utilizing accumulated samples, and optimized characteristic extraction, characteristic identification and characteristic classification parameters are stored; after online operation of the model, newly-registered samples are utilized to carry out irregular local training of the model, and characteristic classification parameter optimization is completed; under the specific condition, the newly-accumulated samples are utilized to carry out regular global training of the model, and the characteristic extraction, characteristic identification and characteristic classification parameters are optimized for another time, the model is guaranteed to be the intelligent authentication system having the autonomous learning capability, and vein authentication precision is further enhanced.
Owner:通华科技(大连)有限公司

Wireless access point safe authentication method and system

Disclosed is a wireless access point safe authentication method and system. The method comprises transmitting a discovery request message from a wireless access point to a wireless controller; receiving the discovery request message from the wireless controller, analyzing the discovery request message to obtain the serial number and the MAC (media access control) address of the wireless access point, and transmitting a discovery responding message to the wireless access point; receiving the discovery responding message from the wireless access point and analyzing the discovery responding message to obtain the IP (Internet protocol) address information of the wireless controller, binding the IP address information with the wireless controller, and transmitting a connection request message to the wireless controller; after receiving the connection request message from the wireless controller, determining whether the serial number and the MAC address of the wireless access point are matched with a prestored serial number and a prestored MAC address; if so, establishing a communication channel between the wireless controller and the wireless access point. By taking that whether the serial number and the MAC address of the wireless access point are matched as the access basis, the wireless access point safe authentication method and system prevents unallowed wireless access points from access to the wireless controller, thereby improving the authentication accuracy.
Owner:湖南恒茂信息技术有限公司

Cross-platform identity authentication system and method based on human-computer interaction behaviors

ActiveCN104778387ASolve the problem of reduced authentication accuracyImprove authentication accuracyDigital data authenticationAuthentication systemHuman system interaction
The invention discloses a cross-platform identity authentication system and method based on human-computer interaction behaviors. The cross-platform identify authentication method comprises the following steps that (1) a user enters a behavior authentication system, wherein the behavior authentication system judges whether the user is a new user, and if so, a step (2) is carried out for registration, and if the user is a registered user, a step (3) is carried out for cross-platform detection; (2) the new user carries out registration; (3) cross-platform detection is carried out, and if the user crosses platforms, a step (5) is carried out for cross-platform identity authentication; (4) single-platform identity authentication is carried out; (5) cross-platform identity authentication is carried out, a cross-platform feature library of the user is updated, and a single-platform identity authentication model is established. Under an existing internet environment, the user can often access the same network account by using different terminal equipment, and the accuracy of a traditional identity authentication technology based on the human-computer interaction behaviors is greatly reduced by different hardware environments. The problems can be effectively solved by the cross-platform authentication method based on a cross-platform identity verification model.
Owner:XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products