Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

66results about How to "Improve verification capabilities" patented technology

Staircase program verify for multi-level cell flash memory designs

A system for concurrently verifying programming of logical data in a multi-level-cell (MLC) flash memory device having a plurality of memory cells each configured to store N bits of logical data where N>=2. The MLC flash memory device has a plurality of memory cells capable of being storing N-bits of data in one of 2N distinct data storage levels, each data storage level corresponding to a discrete N-bit combination of logical data. The data storage levels include a default level, called the erased level, and 2N-1 program levels, including a lowest program level, 2N-2 intermediate program levels and a highest program level. For each memory cell to be verified as programmed, an N-bit combination of data to be verified is loaded into a program-verify circuit and a stepped voltage pulse having 2N-1 steps is applied to each memory cell. The stepped voltage pulse includes an initial step, at least one intermediate step and a final step with the initial step substantially equal to a program-verify voltage for the highest program level of the MLC flash memory within a the highest program level, each successive intermediate step is substantially equal to a program-verify voltage corresponding to an intermediate program level and the final step of the voltage pulse is substantially equal to a program-verify voltage for the lowest program level. Concurrently with the application of the stepped voltage pulse to each memory cell, the data storage level is verified as substantially within a program level corresponding to the N-bit combination for the memory cell. Subsequent to verifying the data storage level for a memory cell, the verified memory cell is inhibited form further application of a program pulse.
Owner:MONTEREY RES LLC

Method for performing ground check and performance evaluation on satellite-borne measurement-type GNSS (Global Navigation Satellite System) receiver

The invention provides a method for performing ground check and performance evaluation on a satellite-borne measurement-type GNSS (Global Navigation Satellite System) receiver. The method comprises the following steps of: firstly performing observation data verification on observation data generated by the satellite-borne measurement-type GNSS receiver; and after verification is finished, further performing orbit determination performance test on the satellite-borne measurement-type GNSS receiver by utilizing a geometrical orbit determination method. The process of performing data verification on the observation data mainly comprises four links, namely observation data standard format treatment, observation data type integrity checking, observation data quality evaluation based on calculation on observed value dual difference of different navigational satellites at a same frequency and observed value single difference of a same navigational satellite at different frequencies, and evaluation on pseudo range and carrier noise based on simulation data observation in a zero / short base line under the condition of no satellite; and during orbit determination performance test, by virtue of solving a linearized observation equation and comparing the linearized observation equation with a theoretical value, the orbit determination accuracy of the satellite-borne measurement-type GNSS receiver is obtained. The method provided by the invention can be used for directly and comprehensively evaluating the performance of the satellite-borne measurement-type GNSS receiver.
Owner:BEIJING INST OF SPACECRAFT SYST ENG

Security authentication method and system

The embodiment of the invention discloses a security authentication method and system. The method comprises the following steps: a client obtains registration information if detecting a registration request containing a registration number; the client uses the registration number and the registration information to apply for a server to bind a user identity identification card corresponding to the registration number with the client; the client obtains the registration information in real time if detecting that the user triggers to carry out communication through a security chip, and sends the registration information to the server; the server verifies whether the user identity identification card identified by the registration information is legally bound with the client, and allows the users to carry out the communication through the security chip if the verification is passed. According to the security authentication method and system disclosed by the embodiment of the invention, the user identity identification card corresponding to the registration number is bound with the client, so that the unique correspondence of the intelligent terminal and the user identity identification card can be realized, thereby improving the ability of the intelligent terminal to verify the legality of the user and guaranteeing the legal user to use the intelligent terminal to carry out communication.
Owner:SHENZHEN GIONEE COMM EQUIP

Multi-factor identity authentication method for preventing library collision attacks

ActiveCN105187382AAvoid Credential Stuffing AttacksImprove verification capabilitiesTransmissionBrute forcePassword
The invention discloses a multi-factor identity authentication method for preventing library collision attacks, which is mainly used for solving the problem that user passwords in the existing website login systems are vulnerable to brute force attacks and library collision attacks. The multiple factors in the multi-factor identity authentication method disclosed by the invention comprises a user password, a mobile phone and a bracelet, which are indispensable to complete the security authentication of user identity. The multi-factor identity authentication method comprises the steps of: (1) a user uses a short password to generate an original master key through a termination key derivation function and processes the original master key for twice in combination with two random numbers related to the bracelet and the mobile phone respectively to generate a server storage password, and stores the server storage password in a server; (2) the user successively derives the original master key and two different random numbers in combination with the bracelet and the mobile phone factors to generate the server storage password; and (3) the user uses the server storage password to carry out mutual authentication with the server. The multiple factors in the multi-factor identity authentication method disclosed by the invention is used for generating different original master keys for different websites and providing security protection to effectively avoid the risk that a single password is vulnerable to embezzlement for identity camouflage.
Owner:XIDIAN UNIV

Verification method and device based on picture verification code and computer readable storage medium

The embodiment of the invention relates to the technical field of image processing, and discloses a verification method and device based on a picture verification code and a computer readable storagemedium. The verification method comprises the following steps: generating and displaying a verification code, wherein the verification code comprises a plurality of verification code pictures respectively representing one number or one letter string, and reasoning rules for reasoning a verification result according to the number or the letter string; wherein each verification code picture comprises a plurality of picture areas arranged according to a position arrangement rule, each picture area represents a number or a letter, and combining the numbers or the letters represented by the pictureareas according to the arrangement rule to obtain a number or a letter string represented by the verification code picture; receiving a verification result input by the user according to the verification code picture and the reasoning rule; and verifying the verification result input by the user. According to the verification method provided by the invention, the complexity and calculation difficulty of the verification code are improved, the verification code is prevented from being identified by a machine, and malicious behaviors such as automatic batch registration are effectively prevented.
Owner:MIGU CO LTD

Verifiable query optimization method for reputation-behavior associated double block chains

The invention discloses a verifiable query optimization method for reputation-behavior associated double block chains, which comprises the following steps of calculating the number of all nodes in a tree skeleton when a certain transaction number or a predetermined block number exists, and creating the tree skeleton; designing an inter-block index structure which is efficient in writing and based on a jump list, so that the query time for traversing blocks is efficiently saved; designing a query mode which considers that an index structure in a reputation chain block and an index structure in a behavior data chain block have the same attribute and has multiple attributes; and designing a reputation chain verification index structure and a behavior data chain verification index structure, so that the integrity of the query result set is efficiently ensured. The verifiable query optimization method oriented to the reputation-behavior associated double block chains is realized, the problems that the associated double chain query mode is single, the query performance is low and the query verification efficiency is poor are solved, and the requirements of data traceability or data evidence obtaining are further met.
Owner:NORTHEASTERN UNIV

ETC equipment anti-disassembly device, method and vehicle

InactiveCN111038404AImprove the efficiency of tamper verificationEasy to useVehicle componentsVehicle drivingEmbedded system
The invention discloses an ETC equipment anti-disassembly device, a method and a vehicle. The ETC equipment anti-disassembly device comprises ETC equipment and a vehicle controller; communication connection is established between ETC equipment and the vehicle controller, and the vehicle controller comprises an authentication request module which used for sending an anti-disassembly authenticationrequest to the ETC equipment and/or a vehicle after the vehicle is powered on; a second anti-disassembly authentication module which is used for performing anti-disassembly authentication according toanti-disassembly authentication request; a second storage module which is used for storing an identification code of ETC equipment; the ETC equipment comprises a first anti-disassembly authenticationmodule which is used for performing anti-disassembly authentication according to anti-disassembly authentication request, a first storage module which is used for storing identification codes of vehicles. According to the ETC equipment anti-disassembly device, anti-disassembly verification is carried out after power-on is completed, normal use of the ETC equipment during vehicle driving is ensured, the driving experience is improved, the ETC equipment or the unique identification code of the vehicle is encrypted and verified, the verification effect between the vehicle and the ETC equipment is further improved, and safe use of the ETC equipment is ensured.
Owner:GEELY AUTOMOBILE INST NINGBO CO LTD +1

Method for testing air volume distribution

The invention relates to a method for testing air volume distribution. The method comprises the following steps: aiming at an air conditioning cabinet arranged on a whole vehicle to test the air volume distribution, by respectively arranging a first pressure sensor and a second pressure sensor on an air conditioning cabinet housing and in the whole vehicle passenger compartment and connecting the first pressure sensor and the pressure sensor to a pressure collection module of an air volume testing table; connecting the air volume collection module of the air volume testing table to the passenger compartment; then setting a running mode of an air conditioning system, the rotating speed gear and the scanning style of an air blower of the air conditioning cabinet on the whole vehicle; completely opening air inlets to measured or closing one by one, measuring a pressure value in the air conditioning cabinet and an air volume value in the passenger compartment when the detection value of the second pressure sensor is zero to obtain a relation curve between the pressure value and the air volume value; and processing data to obtain an air volume intermediary value, an air volume ratio and/or an air volume distribution actual value of each air inlet to be measured in the running mode and the rotating speed gear when the air inlets to measured are completely opened. The method is simple and stable in test result; and the testing blank of the whole vehicle air conditioning system is filled.
Owner:SAIC GENERAL MOTORS +1

Detection device and detection method for shaft vibration sensor

The invention relates to a detection device and a detection method for a shaft vibration sensor. The device comprises a metal bottom board, wherein the metal bottom board is equipped with a motor, a corresponding side of the motor is equipped with a bearing, one end of a long shaft is equipped with a motor shaft, the other end of the long shaft penetrates through the bearing, the long shaft is fixed with and penetrated by three shaft vibration sensor test discs with equal intervals, one side of the metal bottom board is provided with a mounting hole groove, the mounting hole groove is fixed with a right-angle side of an angle steel bracket, and another right-angle side of the angle steel bracket is provided with a shaft vibration sensor mounting hole. The detection method comprises steps that, the sensor is aligned; the sensor is connected and starts; the three test discs are used for measurement; the measurement data is respectively contrasted with equivalent peak-peak vibration amplitudes of the three test discs to determine the state of the sensor. The method is the most direct and real method, introduces the minimum interference and has the most reliable detection effect, and capability of verification on the sensor is improved.
Owner:STATE GRID CORP OF CHINA +1

CP-ABE method for supporting privacy protection and decryption in cloud

The invention belongs to the technical field of cloud storage security and information security, and relates to a CP-ABE method for supporting privacy protection and decryption in cloud. According to the invention, a CP-ABE scheme with functions of user privacy protection, decryption test, decryption outsourcing and message verifiability is realized. According to the method, a flexible LSSS structure construction scheme is used in a prime order group; attributes are divided into attribute names and attribute values, the attribute values containing sensitive information are embedded into a ciphertext, and meanwhile multiple groups of generators and random values are selected to achieve anonymity of data users; a decryption test algorithm and an outsourcing decryption algorithm are added, so that the calculation overhead of a data user is saved, and a large amount of decryption calculation is handed over to a third party; and a message verifiability algorithm ensures the decryption accuracy. According to the scheme of the invention, the decryption efficiency, the ciphertext storage overhead and the access control flexibility are greatly improved on the basis of privacy protection, and the problems of privacy disclosure, high user calculation cost and the like in the prior art are solved.
Owner:XIDIAN UNIV

Voice verification method and device, electronic equipment and computer readable storage medium

The invention discloses a voice verification method and device, electronic equipment and a computer readable storage medium. The method comprises the steps of collecting a sound signal in real time; extracting audio features of the sound signals; inputting the audio features into a multi-classification verification model, and outputting a confidence coefficient set through the multi-classificationverification model, the confidence coefficient set comprising confidence coefficients of non-command words and confidence coefficients of a plurality of command words; selecting the maximum confidence in the confidence set; based on the condition that the maximum confidence coefficient is not the confidence coefficient of the non-command word, loading a binary classification verification model corresponding to the target command word to which the maximum confidence coefficient belongs; inputting the audio features into a binary classification verification model, and outputting a target confidence coefficient of the target command word through the binary classification verification model; and executing a function matched with the target command word based on the condition that the target confidence coefficient is greater than a specified threshold. Through the technical scheme of the invention, the equipment can ensure the accuracy of command word detection while saving power consumption and system resource consumption.
Owner:MOBVOI INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products