Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

148results about How to "Improve verification speed" patented technology

Key pre-distribution based automobile ECU integrity authentication and encrypted communication method

The invention discloses a key pre-distribution based automobile ECU (Electronic Control Unit) integrity authentication and encrypted communication method. The key pre-distribution based automobile ECU integrity authentication and encrypted communication method comprises the steps of providing a unique session key for each ECU by using KPS; carrying out identity authentication through comparing ECU firmware Hash values; judging whether one ECU is tampered; and adopting a two-step authentication mechanism which combines local authentication with remote authentication, wherein safety authentication comprises automobile factory initialization and automobile start self-inspection. As the remote authentication and the local authentication are combined in the key pre-distribution based automobile ECU integrity authentication and encrypted communication method, a communication channel is safe, session keys among the ECU are different, and extremely high safety is obtained; as the keys rather than an encryption algorithm are pre-distributed to the ECU, the difficulty in key distribution is greatly reduced; as the integrity of each ECU is detected by comparison of the Hash values, the efficiency is high, and the cost is low; as key data are stored at a safety module of each ECU, physic attacks can be resisted; and after one original ECU is replaced and one ECU firmware is updated, authentication and encrypted communication still can be carried out by applying the safety mechanism.
Owner:CHENGDU UNIV OF INFORMATION TECH

Public bicycle renting system using two-dimensional code scanning

The invention discloses a public bicycle renting system using two-dimensional code scanning. The public bicycle renting system comprises a mobile client, a renting station and a background service end which are communicated through network connection by the aid of respectively communication modules, wherein the mobile client is used for generating a two-dimensional code according to the data of a user; the renting station comprises a front-end service module and a lock, the front-end service module is used for identifying the two-dimensional code, transmitting a matching request to the background service end, detecting the returning action of a public bicycle to obtain the information of the public bicycle, locking the public bicycle and charging a user according to the rate; the background service end responds to the matching request, judges the information legitimacy of the two-dimensional code and returns a matching result; the front-end service module controls of the lock to unlock or lock the public bicycle. The public bicycle renting system has the advantages that public bicycle renting is achieved by using the front-end service module to scan the two-dimensional code, the complexity caused by card application is alleviated, and user experience is improved.
Owner:HANGZHOU GST TECH

Network payment-based card-free metro ticket selling and checking methods, terminal and server

The invention discloses a network payment-based card-free metro ticket selling method, a network payment-based card-free metro ticket checking method, a terminal and a server. The ticket selling method comprises the steps of receiving registration information and ticket selection information of a user, and generating an order; feeding back the order to the terminal; receiving a payment mode selected by the user, wherein the payment mode includes deferred payment and immediate payment; if the payment mode is the immediate payment, judging whether an immediate payment request quantity exceeds a set threshold or not, and if the immediate payment request quantity exceeds the set threshold, setting payment requests with the quantity exceeding the set threshold to be in a queue waiting state, otherwise, executing a payment instruction; after the order is paid, sending a notification of payment success to the terminal; generating a two-dimensional code, and sending the two-dimensional code to the terminal; sending the registration information of the user and order information to a safety inspection server; if the payment mode is the deferred payment, judging whether the user is a user in a honesty database or not, and if yes, sending the two-dimensional code to the terminal; and if not, sending a notification of rejecting a deferred payment request to the terminal. The ticket selling and checking methods have the advantages of card-free ticket selling and checking.
Owner:SHANDONG UNIV

Data object verification method, device and system based on rules, and electric device

The invention discloses a data object verification method, device and system based on rules, and an electric device. The data object verification method based on the rules comprises the steps of obtaining a to-be-verified data object and a corresponding verification rule; sorting a performing sequence of sub-verification rules contained in the verification rule according to a preset sorting standard, thereby obtaining the performing sequence of the sub-verification rules; judging whether the to-be-verified data object satisfies the sub-verification rules or not in sequence according to the performing sequence of the sub-verification rules, until a preset verification stopping condition corresponding to the sorting stand is realized or all the sub-verification rules are performed completely; and calculating to obtain a verification result of the to-be-verified data object according to logic relationships between judging results and the sub-verification rules. Through adoption of the method provided by the method, the device, the system and the electric device, the sub-verification rules capable of determining the verification result rapidly are performed preferentially, and the sub-verification rules are prevented from being performed completely, thereby achieving an effect of improving a data verification speed.
Owner:ALIBABA GRP HLDG LTD

Identity authentication method based on dynamic token, and decryption and encryption terminal

The embodiment of the invention provides an identity authentication method based on a dynamic token and a decryption and encryption terminal. The method comprises the steps: carrying out the encryption operation of ID data according to a main secret key if the dynamic token comprising an encryption end one-time password and the ID data is received, and obtaining a decryption end personal secret key; performing encryption operation on the current timestamp of the decryption end according to the personal secret key of the decryption end to obtain a one-time password of the decryption end, and ifthe one-time password of the decryption end is consistent with the one-time password of the encryption end, passing identity authentication; wherein the encryption end one-time password is obtained after the encryption end personal secret key carries out encryption operation on the current timestamp of the encryption end, and the encryption end personal secret key is obtained after the decryptionterminal carries out encryption on the ID information according to the main secret key. The invention has the advantages that the secret keys used by users are different, the system safety is improved under the scene that the terminal safety cannot be guaranteed, bidirectional communication is not needed, the verification speed is increased, the one-time password is obtained according to the timestamp, and the replay attack can be effectively avoided.
Owner:TSINGHUA UNIV

Intelligent checking system for transformer accounts for production management system (PMS)

The invention relates to an intelligent checking system for transformer accounts for a PMS for grid equipment, particularly to a checking method for the transformer accounts based on the relevance among technical parameters. The intelligent checking system is applicable to transformer account checking, through in-depth understanding of theoretical knowledge and various technical parameters of a transformer, correlations among the various parameters of the transformer and actual ranges of the parameters, solidification is performed by programs, errors of the accounts are looked up automatically, automatic statistics of error rates is performed, error causes are prompted automatically, and the integrity and accuracy of the transformer accounts are guaranteed. Meanwhile, a large number of labor and material resources are saved, missed checking and inaccurate checking in an artificial account checking process are avoided, the checking speed and the integrity and accuracy of the accounts are improved, a foundation is laid for launching of advanced applications of transformer-type equipment in the PMS, launching of advanced applications of the transformer-type equipment in the PMS is ensured, and stable and efficient operation of the PMS is promoted.
Owner:STATE GRID CORP OF CHINA +1

Threshold voting method based on blockchain consensus and related device

The embodiment of the invention provides a threshold voting method based on blockchain consensus and a related device. The threshold voting method and the related device are used for improving the aggregation speed and verification speed of aggregation nodes and verification nodes. The method provided by the embodiment of the invention comprises the following steps: acquiring an identity identification code and / or a public key of each signature node; receiving signature data sent by the voting node in the current voting period; judging whether the voting node changes before and after voting according to the identity identification code and / or the public key corresponding to each signature node; if not, when the ratio of the number N of the voting nodes to the total number M of all the signature nodes exceeds a first threshold T, adopting a genetic algorithm to select a first preset number A of preferred nodes from the voting nodes in the current voting period, wherein A is not larger than N and not smaller than the product of M and T; aggregating the signature data sent by the optimal node in the current voting period by adopting a BLS signature to obtain aggregated signature data;and sending the aggregated signature data and the identity identification code corresponding to the preferred node to a verification node.
Owner:SHENZHEN THUNDER NETWORK TECH +1

Mobile phone number verification method and system

The invention provides a mobile phone number verification method and system, and the method comprises the following steps: S1, carrying out the processing of a mobile phone number input by a user, theinformation of a current mobile phone device, and a fixed character string, and generating a registration verification code; S2, receiving a mobile phone number input by a user, and processing the received mobile phone number, the information of the current mobile phone equipment and the fixed character string into an encrypted verification code; S3, the verification server comparing whether theregistered mobile phone number, the registration verification code, the verification mobile phone number and the encryption verification code are the same or not, if yes, performing the step S4, and if not, performing the step S5; S4, the verification server generating a comparison success order, and a verification result being corresponding to the merchant system; S5, performing short message verification, if the short message verification is correct, performing the step S4, and if the short message verification is not correct, verification failing. The method and the system have the advantages that the safety is improved, the verification speed is increased, and the operation is simple.
Owner:北京么登科技有限公司

Heterogeneous parallel block chain and technical implementation thereof

The invention relates to a heterogeneous parallel block chain and technical implementation thereof, and relates to the technical field of block chain bases. The heterogeneous parallel block chain is between a chain structure and a DAG, and comprises a service receiving block and a service result block; the service receiving block and the service result block are formed from existing blocks in a splitting manner; and furthermore, DPOS (Delegated Proof Of Stake) is used as a consistency protocol. The technical implementation of the heterogeneous parallel block chain comprises the steps that: a,an appointed block producer determined by the DPOS receives a service, and packs the service in the service receiving block; b, after packing, the producer runs a smart contract; and c, the producer packs a result in the service result block; and result nodes simultaneously verify two blocks: the corresponding service receiving block and the previous service result block. Parallel running of the smart contracts of different blocks can be realized; simultaneously, the security is ensured; the block verification speed is increased; the fast transaction and the verification speed can be improved;the speed is higher than that of chain structures, such as the EOS; the fast transaction can be supported; and simultaneously, the security cannot be reduced.
Owner:夸克链科技(深圳)有限公司

Fast distributed-storage multi-replica consistency checking method and storage architecture

The invention discloses a fast distributed-storage multi-replica consistency checking method and a storage architecture. The method adopts a control host-storage host processing architecture, and includes: evenly dividing a stored file into a plurality of data segments in advance, and respectively setting an individually-corresponding first hash value and a mark bit, which is used for indicating whether the corresponding first hash value expires, for each data segment; when a writing request is received, calculating the corresponding mark bit according to offset and length of the writing request, and setting the mark bit to expiry; and screening out the expiry mark bit, updating the first hash value corresponding to the mark bit, and then calculating a second hash value of the entire fileaccording to the first hash value of each data segment. According to the method, the large file is divided into the plurality of data segments, the hash values of the file are calculated in a segmented manner, then the hash value of the entire file is calculated through the hash value of each segment, reading data of the entire file is avoided, thus a consistency detection speed is increased, andbandwidth consumption of storage hosts is reduced.
Owner:深圳市联云港科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products