Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

451results about How to "Not easy to be stolen" patented technology

Method for local area network access authentication of casual user

The invention relates to a method for implementing a user access authentication in a local area network, especially to a method for implementing a casual user access authentication in a public local area network. Firstly an internal user applies a casual user name and a key for the casual user through the authentication of a authentication server, the authentication server dynamically generates the casual user name and the key, then the casual user name and the key are stored in a user list of the authentication server, simultaneously the casual user name and the key are transmitted to a mobile phone of the internal user, the casual user uses the casual user name and the key for access authentication, and visits the authorized network resource after the authentication of the authentication server. The method of the invention adopts a double-factor and strong authentication system, the internal user is authenticated once, and the casual user is authenticated twice. The method can greatly improves the system safety, the casual user name and the key are all dynamically generated which are not easy to steal with high safety, and the management process for the casual user is simple and standard.
Owner:CHINA MOBILE GROUP DESIGN INST

Digital watermark production and recognition method used for audio document

InactiveCN101345054AGuaranteed robustnessSolve the problem of copyright certificationSpeech analysisFrequency spectrumDigital watermarking
The invention discloses a digital watermark manufacture method and a recognition method used for audio files. The watermark is added in the audio digital file to be processed and taken as copyright marking information; the method of the invention is characterized in that the watermark is realized by adopting converted voiceprint information and comprises the steps as follows: a section of speech signals with copyright identification is colleted and a voiceprint watermark image is gained; the speech signal is converted into one-dimensional two-value sequence group; the gray-scale value of each matrix unit is presented by adopting an eight-bit binary number; the audio file where the watermark is to be inserted is divided into sections; frequency domain transformation is respectively carried out to each audio section so as to obtain the frequency spectrum file; a bit of one-dimensional two-value sequence group watermark data is embedded into each section of the frequency spectrum file; the embedding method is a method used for quantitatively modifying the frequency spectrum file coefficient; reverse conversion is carried out so as to obtain the audio data of the embedded watermark; the audio data is combined with the audio data which is processed so as to obtain the audio digital file with the digital watermark. Reverse separation operation is carried out during the recognition process. The method of the invention effectively solves the copyright verification problem of the digital audio product.
Owner:SUZHOU UNIV

Mobile payment method and equipment for implementing same

The invention relates to an electronic payment technology, in particular to a mobile payment method, and a mobile terminal and a payment processing system for implementing the mobile payment method. According to the invention, the mobile payment method comprises the following steps of: acquiring an iris image of a user by using the mobile terminal which is provided with an image acquisition unit; determining the identity of the user according to the acquired iris image; and with the payment processing system, performing payment processing by using a judgment result. Compared with the conventional mobile payment method, the embodiment of the invention has the advantages that: by using iris information as the authentication information of the identity of the user, the safety of the payment service of a mobile phone is greatly improved; and by using the iris information, the burden on password memorization of the user is eliminated. In the embodiment of the invention, the safety capacity of a smart card technology is fully utilized in the processing of the iris information. Moreover, a camera serves as the standard hardware configuration of the mobile terminal such as the mobile phone, so system hardware can be less modified by using the iris information, stead of password inputting.
Owner:CHINA UNIONPAY

An underwater communication system based on continuous variable quantum key distribution and method realization method thereof

The invention discloses an underwater communication system based on continuous variable quantum key distribution and a realization method thereof, belonging to the technical field of free space quantum communication. The optical signal is outputted to the receiving end through the cooperation of a first laser, a first electro-optic intensity modulator, a signal source, a first beam splitter, a second electro-optic intensity modulator, a first electro-optic phase modulator and a tunable laser attenuator at the transmitting end; The second laser generates local oscillation light, which is modulated by the second electro-optical phase modulator, the local oscillation light and the optical signal outputted from the transmitting end enter the homodyne detector for detection, and finally the security key is established within the effective distance. The invention applies the continuous variable quantum key distribution technology to the underwater optical communication system, the optical signal is not easy to be stolen by a third party, and the safe underwater communication system is realized. Heterodyne detection is used to filter the ambient stray light, which also achieves good detection effect in the daytime and the environment with background light.
Owner:CENT SOUTH UNIV

Fingerprint identification and authentication circuit of mobile terminal

A fingerprint identification and authentication circuit of a mobile terminal is used for identifying fingerprints of a user when the mobile terminal enters procedures requiring authentication. The fingerprint identification and authentication circuit comprises an inputting module, a switching module, a scanning driving module, an identification driving module, a fingerprint sensing module, a sensing module, a signal processing module, a clock control module, a fingerprint imaging module, an I/O (input/output) control module and a master control module; and when the mobile terminal enters the procedures requiring authentication, a touch command inputted by a user is received, and a touch mode of the mobile terminal is switched into the fingerprint sensing module. A fingerprint image inputted by the user is acquired and is compared to a pre-stored fingerprint image, if the fingerprint image is consistent to the pre-stored fingerprint image, the user is permitted to enter the procedures requiring authentication, and if the fingerprint image is not consistent to the pre-stored fingerprint image, the user is forbidden from entering the procedures requiring authentication. Fingerprints belong to biological characteristics and are unique. After the fingerprints serve as procedure entering conditions, the user does not need to memorize an account and a corresponding password, and data of the account and the password are not easy to steal.
Owner:NANCHANG OUFEI BIOLOGICAL IDENTIFICATION TECH +3

Cable subsurface buoy real-time internal wave monitoring device installed on ocean platform

The invention discloses a cable subsurface buoy real-time internal wave monitoring device. The device comprises a power supply, an industrial personal computer, a steel cable, a customized cable and a plurality of internal wave measurement probes, wherein the plurality of internal wave measurement probes are all composed of conductivity temperature depth systems and current needles, the customized cable is connected with the power supply and the industrial personal computer respectively, the plurality of internal wave measurement devices are arranged on the customized cable, and spaces are kept among the plurality of internal wave measurement devices, the customized cable is fixed on the steel cable, one end of the steel cable is fixed on a deck of a ocean platform and the other end is movably connected with a weight, and the customized cable is fixed on the deck of the ocean platform by an inclined steel cable. According to the invention, the internal wave monitoring device is constructed based on the ocean platform, so that the cable subsurface buoy real-time internal wave monitoring device installed on ocean platform is not easy to steal and lose, the safety of the measurement device is ensured; the real-time power supply of the measurement device and real-time data collection can be achieved; and compared with a self-contained subsurface buoy internal wave monitoring device, the cable subsurface buoy real-time internal wave monitoring device installed on ocean platform is greatly improved in the timeliness of data.
Owner:CHINA NAT OFFSHORE OIL CORP +2

Cloud data integrity verification method and system based on biological characteristics

The invention relates to the technical field of network security, in particular to a cloud data integrity verification method and system based on biological characteristics. The method comprises: the system is initialized and generates public parameters; a client uploads biological characteristic identity, and a key generation central server generates keys for a user; the client uploads files and tags to a cloud server; an auditing server transmits a challenge value to the cloud server, the cloud server computes a response value by utilizing the challenge value, user data and the tag and transmits the response value to the auditing server, and the auditing server verifies the validity of the response value in order to check whether the cloud server completely saves the data of the client. According to the cloud data integrity verification method and system based on the biological characteristics, complex key management load of the traditional verification protocol is simplified, and the system complexity is reduced; and meanwhile, fault tolerance, which the cloud data integrity auditing scheme based on identity does not have, is provided, so that the practicability is better. The invention further relates to a system of the cloud data integrity verification method based on the biological characteristics.
Owner:SHAANXI NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products