Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

188results about How to "Improve verification accuracy" patented technology

Authentication system and method based on intelligent mobile communication equipment

The invention provides an authentication system based on intelligent mobile communication equipment. The authentication system comprises more than one intelligent mobile communication equipment, more than one server, a client-side module and a server-side module; the client-side module is arranged in the intelligent mobile communication equipment and comprises an identification module, wherein the identification module is used for submitting an authentication request, acquiring identity information, identifying elements in the identity information and querying an authentication result; the server-side module is arranged in the server and comprises a certificate management module, an identity information management module and an authentication module and is used for realizing format and content management of various certificates, management of the identity information and authentication of effectiveness of the elements; the identity information comprises at least one element; and the client-side module and the server-side module are in data communication through a mobile communication network. The invention further provides an authentication method based on the intelligent mobile communication equipment. Due to adoption of the authentication system and method, the identity authentication can be rapidly, conveniently and accurately carried out.
Owner:ZHUHAI ZAIZHOU SOFTWARE TECH

Image watermark removal device

The invention relates to the technical field of image processing, in particular to an image watermark removal device. The image watermark removal device aims to provide a way of solving the technicalproblem that the picture quality of a restored image and face verification accuracy are low. In order to realize the purpose, the image watermark removal device can carry out watermark removal processing on a face image on the basis of a generative adversarial network model, wherein a generator in the generative adversarial network model can generate a corresponding watermark-free image corresponding to the face image, a discriminator can judge whether the integral image and the local image of the watermark-free image are true images or not; and an optimization module optimizes the generator and the discriminator. Furthermore, the device comprises a face recognition model to extract the face feature of a watermark-free original image and the face feature of the watermark-free image generated by the generator, and the generator and the discriminator are further optimized. By use of the technical scheme of the invention, while the high-quality watermark-free image can be obtained, information contained in the image is effectively protected.
Owner:INST OF AUTOMATION CHINESE ACAD OF SCI

Station entrance identity authentication method based on two-dimensional code

The invention relates to a station entrance identity authentication method based on a two-dimensional code. The method particularly includes the following steps: S1) providing an electric operation and maintenance communication management and control system for collecting and storing identity information of operation and maintenance workers to generate identity identification information; S2) encrypting the identity identification information to generate a cipher text by a system; S3) converting the cipher text into a two-dimensional code image by the system and sending the two-dimensional code image to a mobile terminal of the operation and maintenance workers; S4) providing a two-dimensional code scanning device, so that when the operation and maintenance workers enter the station for maintenance and show the two-dimensional code image on the mobile terminal, the two-dimensional code scanning device scans the two-dimensional code and analyses the identity information of the workers, and sends the analyzed identity information to the system for identification; and S5) receiving the verification result from the system by the two-dimensional code scanning device. The method solves the problem of identity identification of the operation and maintenance workers through the two-dimensional code and data encryption technologies.
Owner:STATE GRID FUJIAN ELECTRIC POWER CO LTD +1

Dual wireless signal electronic lock and unlocking method thereof

The invention provides a dual wireless signal electronic lock and unlocking method thereof. The dual wireless signal electronic lock comprises a first lock and a second lock. The first lock and the second lock are fixedly connected. The first lock comprises a position information module, a safety locking module and an electronic locking module. The position information module is used for obtaining geographic position information of the position and comparing the geographic position information with preset geographic position information, if the geographic position information is matched with the preset geographic position information according to the comparison result, the electronic locking module is controlled to be unlocked, and if the geographic position information is not matched with the preset geographic position information according to the comparison result, data receiving is cut off; the safety locking module is used for verifying that a worker initiating the unlocking operation has the unlocking condition; the electronic locking module is used for locking the first lock. The dual locks are adopted for locking, the safety coefficient is high, the first lock performs unlocking by adopting the geographic position information unlocking mode, on the basis of control of the safety locking module, the safety is high, and damage is not likely to be caused.
Owner:林琳

Person and credential verification system and method based on deep learning

The invention relates to a person and credential verification system and method, in particular to a person and credential verification system and method based on deep learning and belongs to the field of security guarding. The system comprises a training subsystem and a person and credential verification subsystem; the method includes a training process and a person and credential verifying process; the training process includes adopting a plurality of on-site facial images of known identities and credential photos to train the training subsystem; the person and credential verifying process includes utilizing the module parameters acquired through the training process, comparing the plurality of on-site acquired images of a discharged person with the credential photos corresponding to the information acquired by a credential reading module, and outputting the verification result whether the person consistent with the credential or not automatically. By the aid of the system and method, the credential photos and a plurality of facial photos acquired through an on-site video monitoring device can be compared effectively, the adaptability to facial angles, on-site environment, light emission and other factors is high, the accuracy of person and credential verification is high, and the discharging speed is high.
Owner:BEIJING ZHONGDUN SECURITY TECH DEV

No-load cutting-in modeling and experimental method of double-fed type wind-driven generator

The embodiment of the invention provides a no-load cutting-in modeling and experimental method of a double-fed type wind-driven generator. The modeling method comprises the following concrete steps: firstly, establishing a mathematical model for no-load cutting-in control of the double-fed type wind-driven generator; simulating a small-step cutting-in switch element in the double-fed type wind-driven generator by utilizing a valve switch which is controlled by binary control words in a real-time digital simulator (RTDS) of an electric power system; and realizing the simulation control of the double-fed type wind-driven generator from the no-load state to the cutting-in state by controlling the switching-on and the switching-off of the valve switch. The technical scheme of the invention can be implemented to realize the real-time simulation process of the double-fed type wind-driven generator from the no-load state to the cutting-in state, and the simulation model is used for carrying out the no-load cutting-in experiment on a variable-flow controller system of a practical double-fed type wind-driven generator, thereby providing real and accurate simulation environment and improving the verifying accuracy.
Owner:NORTH CHINA ELECTRIC POWER UNIV (BAODING)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products