Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

169results about How to "Improve authority" patented technology

Payment and identity authentication systems based on biometric feature recognition

The invention discloses payment and identity authentication systems based on biometric feature recognition. The payment system based on the biometric feature recognition comprises a payment system and a smart mobile terminal, wherein the payment system comprises a payment server for storing user bank account information which is bound with biometric feature information of a user; and the smart mobile terminal comprises a payment request module, a biometric feature acquisition module, a biometric feature recognition module, a user bank account calling module and a payment confirmation module. The payment system based on the biometric feature recognition has the effects that when the payment system is used for making a payment, the user can make a rapid payment by inputting a voiceprint, irises, a palm print, a vein, ears, a gait or retinas without carrying any cash, bank card, consumer card or mobile phone no matter where the user is, so that a conventional payment mode is broken, and the restraints of the cash, cards and electronic equipment are broken. A checker can rapidly check user identity information by using the identity authentication system, and the user does not need to take out any identity card, so that high practicability and a good use effect are achieved.
Owner:刘洪文

Identity authentication method based on biological feature information

The invention discloses an identity authentication method based on biological feature information. The method includes: Step 1, erecting a data server in a management background; Step 2, collecting biological feature information of a user through an identity authentication device, and generating an authentication information data packet to be sent to the data server of the management background for storage; Step 3, in identity authentication of the user, the identity authentication device firstly collecting electronic data information in an identity card of the user, and then reading corresponding fingerprint line information and face feature information; and Step 4, the identity authentication device collecting fingerprint line information and face feature information, and then performing analysis and comparison with the fingerprint line information and the face feature information transmitted by the data server. If the biological feature information of the two is identical, the identity authentication is passed, and otherwise the identity authentication fails. The identity authentication method uses various biological feature information recognition technologies to perform identity authentication, and is high in security and strong in reliability.
Owner:南京译海网络科技股份有限公司

Construction method for urban disaster prevention and fighting informationalized rescue command comprehensive intelligent platform

The invention relates to a construction method for an urban disaster prevention and fighting informationalized rescue command comprehensive intelligent platform. The method organically integrates the telemetry and remote-sensing devices for video monitoring and fire detection and alarm, the CHINANET, and the acoustic and optical analysis and data transmission techniques. Through the establishment of a local area network which is connected with the CHINANET and is specialized in disaster prevention and rescue handling, the platform realizes the real-time acquisition of a great amount of disaster area information (including the information about the disaster occurrence process) in a most economical mode within the shortest time, shares the real-time information with related experts and technical staff for analysis and treatment in a safe mode, and provides a brand-new informationalized solution for the disaster cause analysis, process recording and rescue handling. The invention also provides a practical solution for the wider practical and daily application of the system. Simultaneously, the method related to data acquisition and processing also breaks an inherent data source, acquisition and transmission mode of the optical analysis.
Owner:徐东伟

Identity authentication method and system based on sound wave communications

The invention relates to the technical field of network security, and provides an identity authentication method and system based on sound wave communications. The method includes the steps that 1, feature codes are implanted into an authentication device; 2, binding information is obtained according to user information and the feature codes in the authentication device of a user, and the binding information is recorded in a server-side; 3, user equipment of the user has access to the server-side to obtain the feature codes in the binding information; 4, the user equipment encodes connecting request information containing the feature codes into sound wave signals and broadcasts the sound wave signals; 5, the authentication device monitors the sound wave signals, a sound wave link is established between the authentication device and the user equipment according to a monitoring result, and identity authentication is provided to the user equipment. According to the identity authentication method and system based on sound wave communications, common potential safety hazards of existing sound wave equipment are avoided, trusted identity authentication of each service system can be enhanced, the authority and the security of data of each service system are improved, power consumption of the authentication device is saved, and meanwhile user experience is improved.
Owner:BEIJING ZHONGJIN GUOXIN TECH

Stink fingerprint spectrum based stink pollution source tracing method and application thereof

The invention relates to a stink fingerprint spectrum based stink pollution source tracing method. The method comprises the following steps: A, determining a suspected pollution source; B, discharging, sampling, analyzing the pollution source; C, sampling and analyzing an environment stink gas; D, screening a stink pollutant; E, constructing a pollution source and environment stink fingerprint spectrum; F, calculating the similarity through a source tracing mode; and G, identifying the pollution source according to the similarity. The stink fingerprint spectrum is constructed through the fingerprint spectrum technology and the odor threshold of a stink substance, the similarity coefficient of the pollution source and environment stink fingerprint spectrum is calculated by using an includedangle cosine method, so that the possible source of the stink pollution is judged, the source of the stink pollution is rapidly and accurately identified, the difficult problem of tracing the sourceof the stink pollution is solved, the technical defect of complaint management of the stink pollution is overcome, and the effectiveness and the authority in supervision and law enforcement of the stink pollution of the environmental management department are improved.
Owner:天津市生态环境科学研究院(天津市环境规划院 +1

Motor vehicle headlamp luminous intensity distribution property self-adaption detection method based on camera method

The invention discloses a motor vehicle headlamp luminous intensity distribution property self-adaption detection method based on camera method, which comprises the following steps of: performing quasi-positioning on far and near illumination; acquiring the light type of lower beams, acquiring the light type of upper beams; digitally processing light type data of upper and lower beams; judging whether the data meets a certain requirement or not; storing coordinates of movement compared with an initial position; storing images and the data; printing and displaying data; carrying out self-adaption sampling region adjustment; judging whether the sampling region surpasses a certain range or not; determining whether a product is qualified, and the like. By adopting the motor vehicle headlamp luminous intensity distribution property self-adaption detection method based on camera method, all possible measurement can be realized by performing one-step collimation of the motor vehicle headlamp luminous intensity distribution property self-adaption detection system in the prior art; and if a lamp at a collimation position is unqualified, other positions where the lamp is qualified can be searched through software without collimating or testing once again, so that the detection testing time can be shortened, and the possibility of passed inspection and the authority and accuracy of detection can be increased.
Owner:TIANJIN INTERNAL COMBUSTION ENGINE RES INST

Identity authentication and management system based on biological feature identification technology

The invention provides an identity authentication and management system based on a biological feature identification technology. The system is characterized by comprising an identity information collection and verification subsystem, an identity information management subsystem and an identity information verification subsystem, wherein the identity information collection and verification subsystem is connected with the identity information management subsystem through 3G communication; and the identity information verification subsystem is connected with the identity information management subsystem through a network. According to the identity authentication and management system, the authenticity of an identity card is distinguished by using the relevant biological feature identification technology in combination with the identity information, whether the biological feature information of a person to be verified accords with the information of the identity card is judged through comparison, and the identity information of citizens and the relevant biological feature information and previous authentication result of the person to be verified are processed, analyzed and managed by using a big data mechanism, so that the authentication rapidity is improved, and the accuracy and authority of identity authentication are improved through multi-level verification.
Owner:QINGDAO UNIV OF SCI & TECH

Method and apparatus for determining address information in home page of official website

The present invention provides a method for determining address information in a home page of an official website. The method comprises: acquiring one or more home pages of an official website; performing text analysis on a page content of the home page of the official website so as to extract one or more address related text segments in the page content; performing processing on the address related text segment so as to extract a plurality of address related segmenting words; and respectively performing query and matching on the plurality of address related segmenting words in an address database, and if each address related segmenting word is matched successfully, determining that each address related text segment is address information. According to the embodiment of the present invention, the home page of the official website is determined in a large number of home pages, and the address information is determined based on the page content of the home page of the official website, so that the address information with relatively high authority and validity in the official website can be rapidly acquired, and strong guarantee is provided for a manner of detecting POI data based on the address information in the official website.
Owner:BEIJING QIHOO TECH CO LTD +1

Distributed authentication method based on pre-shared key

InactiveCN105323754AEnsure safetyThe authentication result is reliableSecurity arrangementAccess networkEphemeral key
The invention discloses a distributed authentication method based on a pre-shared key (PSK). The method comprises the following steps that the PSK is acquired before a request access network node accesses the network and a success access network node is selected to be an authentication node so as to carry out bidirectional authentication; during each bidirectional authentication, two parties generate random numbers respectively; according to the PSK and the random numbers, a temporary key and a verification key are generated and are used for encrypting an authentication interaction message and verifying an identity of an opposite side respectively; the two parties locally maintain one identification sequence number which is used for identifying an effective bidirectional authentication; during a bidirectional authentication process, one party recovers the temporary key and the verification key of the opposite side according to the PSK and the random number of the opposite side, receives and decrypts the opposite side identification sequence number and then compares with a local identification sequence number; whether a replay attack prevention condition is satisfied is verified; if the replay attack prevention condition is not satisfied, the bidirectional authentication is invalid; if the replay attack prevention condition is satisfied, the recovered verification key of the opposite side is sent to the opposite side; after receiving and decrypting, the opposite side verifies whether the verification key is the same with the verification key generated by the opposite side itself; if the verification key is not the same with the verification key generated by the opposite side itself, the authentication is failed; and if the verification key is the same with the verification key generated by the opposite side itself, the identity of one party is valid.
Owner:BEIJING XINWEI TELECOM TECH +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products