Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

43results about How to "Not easy to decipher" patented technology

Mobile phone unlocking method based on voice recognition

The invention discloses a mobile phone unlocking method based on voice recognition, and the method comprises following steps of recording and storing standard unlocking voice; requiring the unlocking voice when requesting the user to actuate the mobile phone; inputting the voice and converting the voice into voice characteristic parameters; and comparing the voice characteristic parameters of the request user with the standard voice characteristic parameters, and enabling successful unlocking if the voice characteristic parameters are identical to the voice characteristic parameters of one authorized user. Due to the adoption of the method, the problem that the unlocking password is easy to decipher or to peer can be overcome, the collected voice information is finally converted to the voice characteristic parameters after being corrected and adjusted, so that the accuracy of the characteristic parameter calculation result is improved, and the reliability of the voice unlocking is further improved; the information content is compared with the voice characteristic parameters, the unlocking can be completed when the inputted voice characteristic parameters completely conform to the standard unlocking voice, the unlocking voice is not easy to decode, the storage security of the private data of the mobile phone is high, and the stored private data of the mobile phone is not easy to leak; and in the unlocking process, the keystroke operation is not needed, so that convenience in use can be realized.
Owner:CHENGDU CK SCI & TECH

Text-message distribution system capable of identifying encrypted bar code and realization method thereof

The invention discloses a text-message distribution system capable of identifying an encrypted bar code and a realization method thereof. The system includes an encrypted sequence, an encrypted algorithm database, an encrypted sequence number table, a bar-code scanning module, a processing module, a text message module, and a terminal display module. In the system and the realization method thereof, one encryption algorithm is randomly selected from the encrypted algorithm database and a number is used as input to generate a unique encryption sequence and at last, the encryption sequence and a cellphone number are used as one item of record and stored into the encrypted sequence number table and the encryption sequence is printed on an express waybill in the form of a bar code or a two-dimension code. During express distribution, the bar-code scanning module scans the bar code on the waybill so that an encryption sequence number is obtained. According to the sequence number, a bar code-number table is searched so that the cellphone number is obtained and the text message module distributes a text message which is edited in advance to a customer. The system is capable of improving express distribution efficiency, and protecting user privacy in a specific degree at the same time.
Owner:NANJING UNIV OF POSTS & TELECOMM

Distributed encrypted storage and authentication method based on local area network

ActiveCN105791274AEffective distributed encrypted storagePrevent leakageTransmissionComputer hardwareEncryption
The invention discloses a distributed encrypted storage and authentication method based on a local area network. The encrypted storage method disclosed by the invention comprises the steps that a distributed management module segments information according to a certain rule, generates a random code based on each segment, carries out weighted confusion based on the segment information, a segment number and the generated random code, and randomly releases the obtained information to a database storage server; and an encryption module encrypts segmented weighting information in a random encryption mode, and then stores the segmented weighting information in a database by a storage module. The authentication method disclosed by the invention is used for carrying out authentication based on the encrypted storage method, and the principle of the authentication method is to carry out segmented encryption on the information again, and then compare the information with actually stored information to judge whether the authentication is successful. The distributed encrypted storage and authentication method disclosed by the invention has the beneficial effects that sensitive information of a user can be effectively stored in a distributed encrypted storage mode to avoid the leakage of all information resulting from the capture of a single storage server.
Owner:SICHUAN CHANGHONG ELECTRIC CO LTD

Data encryption transmission method and intelligent terminal

The embodiment of the invention provides a data encryption transmission method. The method is applied to an intelligent terminal, and comprises the following steps of: pre-setting a secret key of corresponding light of data to be transmitted based on visible light wireless communication; obtaining a secret key of emission light of the intelligent terminal based on visible light wireless communication; matching the secret key of the emission light with the pre-set secret key of corresponding light of the data to be transmitted; if matching is successful, transmitting the data to be transmitted by the emission light based on a visible light wireless communication manner; and otherwise, not transmitting the data to be transmitted by the emission light. The embodiment of the invention further provides the intelligent terminal. According to the method and the intelligent terminal in the embodiment of the invention, whether the emission light can transmit the data to be transmitted or not is determined by judging whether the secret key of the emission light and the secret key of the corresponding light of the data to be transmitted are successfully matched or not; the fact that the data is difficultly decoded can be ensured; the malicious data transmission possibility is reduced; the transmission data interception possibility is also reduced; and thus, data transmission is relatively simple and safe.
Owner:VIVO MOBILE COMM CO LTD

Photon lock door control system based on wireless network

The invention relates to a photon lock door control system based on a wireless network. The photon lock door control system comprises a photon key, a door lock, a wireless network receiving device and a server database, wherein the photon key is used for transmitting an optical signal containing information; the door lock comprises a wireless network transmission module and is used for responding to the optical signal and transmitting the information of the door lock through the wireless network transmission module; the wireless network receiving device is used for receiving the information transmitted from the wireless network transmission module and transmitting the information to the server database through a network. According to the photon lock door control system disclosed by the invention, the photon key transmits an unlocking instruction to the door lock in a form of the optical signal, the optical signal is not easily decoded and thus the safety is high; the door lock transmits the door lock information to the network in a wireless manner through the wireless network transmission module and wiring is not needed, so that physical connection of equipment is reduced and the expansion is facilitated; the information capacity of the server database is large so as to be convenient for non-developers to operate and control the database.
Owner:KUANG CHI INTELLIGENT PHOTONIC TECH

Multifunctional offline password verification method for electronic lock

The invention discloses a multifunctional offline password verification method of an electronic lock. The method comprises steps of generating a plaintext password according to submitted information;obtaining a system secret key in the electronic lock, wherein the plaintext password is subjected to several rounds of secret key encryption transformation according to the encryption strategy and thefour groups of eight-bit secret key values; carrying out a plurality of rounds of value transformation, a plurality of rounds of shift transformation and a plurality of rounds of column hybrid transformation to obtain a dynamic password; analyzing to obtain the plaintext password; and if the plaintext password obtained through analysis has correctness and effectiveness, unlocking by the electronic lock. Compared with the prior art, the method has the beneficial effects that the plaintext password contains the information of the password type, so that the password type information and the digital password can be obtained only by one-time analysis in the analysis process, and the analysis efficiency is improved; meanwhile, encryption is carried out through 16 times of reversible encryptionalgorithms, so that decoding is not easy, and the security performance is greatly improved; and the length of the dynamic password for unlocking is 8-9 bits, so that the dynamic password is convenientto memorize.
Owner:浙江久婵物联科技有限公司

Anti-counterfeit pen and anti-counterfeit label

The invention relates to an anti-counterfeit technology and an anti-counterfeit device, in particular to an anti-counterfeit pen and an anti-counterfeit label. When the anti-counterfeit label is arranged on printing money, an entrance ticket, a moon cake ticket, an identification card, a driving license, a famous tobacco, a famous wine, a drug, a health care product, furniture, clothing, shoes and hats, the anti-counterfeit pen can tell the authenticity of products in a visual and readable way by pointing the anti-counterfeit label. The anti-counterfeit pen comprises a shell which is internally provided with a photoelectric sensor recognizing anti-counterfeit coding information, a mother board, a power source and an anti-counterfeit information output unit; a signal output end of the photoelectric sensor recognizing the anti-counterfeit coding information is connected with a signal input end of the mother board with the functions of information identification, information comparison and judgment and anti-counterfeit signal output; and the anti-counterfeit signal output end is connected with the anti-counterfeit information output unit. The anti-counterfeit label comprises a label bottom layer, an anti-counterfeit coding layer and a pattern layer. The anti-counterfeit pen and the anti-counterfeit label mainly solve the problem that the existing anti-counterfeit technology is not easy to operate by a user due to wide varieties and are beneficial to the unification of the anti-counterfeit technology.
Owner:黄丽娜

A Distributed Encryption Storage and Authentication Method Based on Local Area Network

ActiveCN105791274BEffective distributed encrypted storagePrevent leakageTransmissionArea networkEncryption
The invention discloses a distributed encrypted storage and authentication method based on a local area network. The encrypted storage method disclosed by the invention comprises the steps that a distributed management module segments information according to a certain rule, generates a random code based on each segment, carries out weighted confusion based on the segment information, a segment number and the generated random code, and randomly releases the obtained information to a database storage server; and an encryption module encrypts segmented weighting information in a random encryption mode, and then stores the segmented weighting information in a database by a storage module. The authentication method disclosed by the invention is used for carrying out authentication based on the encrypted storage method, and the principle of the authentication method is to carry out segmented encryption on the information again, and then compare the information with actually stored information to judge whether the authentication is successful. The distributed encrypted storage and authentication method disclosed by the invention has the beneficial effects that sensitive information of a user can be effectively stored in a distributed encrypted storage mode to avoid the leakage of all information resulting from the capture of a single storage server.
Owner:SICHUAN CHANGHONG ELECTRIC CO LTD

Anti-counterfeiting pen and anti-counterfeiting mark

The invention relates to an anti-counterfeit technology and an anti-counterfeit device, in particular to an anti-counterfeit pen and an anti-counterfeit label. When the anti-counterfeit label is arranged on printing money, an entrance ticket, a moon cake ticket, an identification card, a driving license, a famous tobacco, a famous wine, a drug, a health care product, furniture, clothing, shoes and hats, the anti-counterfeit pen can tell the authenticity of products in a visual and readable way by pointing the anti-counterfeit label. The anti-counterfeit pen comprises a shell which is internally provided with a photoelectric sensor recognizing anti-counterfeit coding information, a mother board, a power source and an anti-counterfeit information output unit; a signal output end of the photoelectric sensor recognizing the anti-counterfeit coding information is connected with a signal input end of the mother board with the functions of information identification, information comparison and judgment and anti-counterfeit signal output; and the anti-counterfeit signal output end is connected with the anti-counterfeit information output unit. The anti-counterfeit label comprises a label bottom layer, an anti-counterfeit coding layer and a pattern layer. The anti-counterfeit pen and the anti-counterfeit label mainly solve the problem that the existing anti-counterfeit technology is not easy to operate by a user due to wide varieties and are beneficial to the unification of the anti-counterfeit technology.
Owner:黄丽娜

Medical sample detection method and device, electronic equipment and storage medium

The invention discloses a medical sample detection method and device, electronic equipment and a storage medium. The method comprises the following steps: acquiring patient information, wherein the patient information comprises a patient face image, detection item information and a detection item sequence; generating a bar code based on the patient information, and issuing the bar code to the patient; receiving a detection sample which is returned by the patient and is pasted with the bar code; analyzing the bar code of the detection sample to obtain detection item information and a detection item sequence of the detection sample; and according to the sequence of the detection items, sequentially sending the detection samples to the detection departments corresponding to the detection item information for detection. By adopting the scheme provided by the invention, all the detection samples of the patient can be obtained at one time according to the detection items of the patient, and the detection samples are sequentially sent to the corresponding detection departments based on the detection item information and the detection item sequence, so that the tedious process that the patient needs to go to each detection department one by one for detection is avoided.
Owner:长沙桃子卫健信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products