Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

124results about How to "Not easy to forget" patented technology

Password authentication method and device

The invention discloses a password authentication method and a password authentication device, and in the password authentication implementation process, the password is difficult to be exposed, and is more safe and reliable. The method comprises the steps of receiving a standard password preset by users, wherein the standard password consists of characteristic values of a plurality of identification information; generating a plurality of identification information randomly on a touch screen when deblocking command is received, and recording the corresponding relationship between the position information of the identification information on the touch screen and the characteristic values of the identification information; acquiring the position information clicked on the touch screen, acquiring the characteristic values of the plurality of corresponding identification information according to a plurality of position information clicked by users, and forming a deblocking password input by users through the characteristic values of the plurality of identification information; and judging whether the deblocking password is identical to the standard password, if so, confirming that deblocking is successful, and if not, confirming that delocking is failed. The invention also discloses a password authentication device.
Owner:上海榕安科技有限公司

Cloud data integrity verification method and system based on biological characteristics

The invention relates to the technical field of network security, in particular to a cloud data integrity verification method and system based on biological characteristics. The method comprises: the system is initialized and generates public parameters; a client uploads biological characteristic identity, and a key generation central server generates keys for a user; the client uploads files and tags to a cloud server; an auditing server transmits a challenge value to the cloud server, the cloud server computes a response value by utilizing the challenge value, user data and the tag and transmits the response value to the auditing server, and the auditing server verifies the validity of the response value in order to check whether the cloud server completely saves the data of the client. According to the cloud data integrity verification method and system based on the biological characteristics, complex key management load of the traditional verification protocol is simplified, and the system complexity is reduced; and meanwhile, fault tolerance, which the cloud data integrity auditing scheme based on identity does not have, is provided, so that the practicability is better. The invention further relates to a system of the cloud data integrity verification method based on the biological characteristics.
Owner:SHAANXI NORMAL UNIV

Coded lock based on brain-computer switching technique and encryption and decryption method of coded lock

The invention discloses a coded lock based on a brain-computer switching technique and an encryption and decryption method of the coded lock. The coded lock comprises dressing equipment, encryption and decryption equipment and a code memory, wherein the dressing equipment comprises a shell matched with a human head; an internal space is formed by the shell; a brain wave sensor and a first encryption wireless transmitter are arranged inside the internal space; the brain wave sensor comprises a sensing unit and a signal transmission unit; the encryption and decryption equipment comprises a receiver and a matcher; the receiver comprises a receiving unit and a second encryption wireless transmitter; one end of the matcher is electrically connected with the receiving unit; an interface matched with equipment to be encrypted is arranged at the other end of the matcher; the matcher comprises a storing unit and a reading unit; the code memory is arranged in the equipment to be encrypted. The coded lock provided by the invention has the relatively high security, can provide the great convenience for the disable and the unschooled when passwords are set, and has the advantages of being simple to operate, convenient to use and wide in application.
Owner:SUZHOU UNIV

Wearable wireless charger baby

The invention discloses a wearable wireless charger baby which comprises a wireless power supply module and a wireless charge module, wherein a charge detection module is adopted to detect whether equipment to be charged is in a charge area of the wearable wireless charger baby or not; if the equipment to be charged is in the charge area of the wearable wireless charger baby, the lithium battery of a wireless transmitting module is adopted to supply power to enable a transmitting coil to generate and output radio frequency according to the result of the charge detection module; an energy conversion circuit in a wireless receiving module is adopted to receive electromagnetic signals transmitted from the wireless transmitting module and to convert the electromagnetic signals into alternative current; a voltage conversion circuit is adopted to receive generated alternative current and convert the alternative current into direct current; a battery protecting circuit is adopted to prevent the situation that a battery is damaged by situations such as over charge, over current and short circuit. Due to the adoption of a telescopic elastic band and double additional elliptical buckles, the wearable wireless charger baby disclosed by the invention can be worn on arms, wrists and legs or suspended above other articles, is convenient to carry over, and further has the advantages of wide wireless charge range, high intelligent degree, small size, simplicity in operation and the like.
Owner:HANGZHOU DIANZI UNIV

Application process of fingerprint identification technology on POS machine, imprinter and cash dispenser

An application process of fingerprint identification technology on a POS machine, an imprinter and a cash dispenser mainly comprises fingerprinting, fingerprint image preprocessing, characteristic point extraction, characteristic point storage, integrates the characteristics of individual fingerprints into the information of the individual data of a credit card so as to bind with the information of the individual data. The fingerprint comparison comprises fingerprint collection, fingerprint image preprocessing, and characteristic point extraction, carries out feather matching on the extracted characteristic points and the stored characteristic points, and finally outputs and shows the comparison results. The invention has the advantages that the fingerprint identification technology is applied to the POS machine, the imprinter and the cash dispenser, has two major functions of fingerprint registration and fingerprint comparison, the individual fingerprint identification technology and the image conversion technology are used for realizing the transmission process of the image data and ensuring the non-losing and non-damaging of the characteristic information of the fingerprint; the implicative information is more obvious, is difficult to be forgotten or lost, forged or stolen, and carried about, is safe, convenient and fast in utilization.
Owner:FUSHUN JINDAO TECH

Circular feeding type English teaching demonstration device

The invention provides a circular feeding type English teaching demonstration device which comprises a demonstrating screen, a plurality of transceiving terminals held by students, a microprocessor, a storage module, a comparison module, a question selecting button and a transceiving terminal random selecting module, wherein the demonstrating screen, the transceiving terminals, the storage module, the comparison module, the question selecting button and the transceiving terminal random selecting module are in signal connection to the microprocessor separately; the storage module is in signal connection to the comparison module; and the microprocessor is electrically connected to a power supply module. According to the device provided by the invention, can answering questions can be automatically circularly selected, answering students can be randomly selected and the answers fed back to the system by the students and the correct answers in the system can be displayed at the same time, so that the learning interest of the students can be motivated and the students are impressive to English knowledge and are unlikely to forget in the process of repeatedly circulating and randomly selecting students to answer. The interest of learning Engine by the students can be motivated, so that the English learning effect is favorably improved.
Owner:INNER MONGOLIA UNIV FOR THE NATITIES

Infectious disease protective device

ActiveCN110123535ASolve the problem of inconvenient movingReduce the chance of contact infectionStretcherNursing bedsEngineeringUtilization rate
An infectious disease protective device is intended for effectively solving the problems that a patient with an infectious disease may propagate pathogens to air during coughing, the patient is inconvenient to transfer and a conventional infectious disease protective device has a single function. The infectious disease protective device comprises four support legs, first support bars, second support bars, a first support plate, a second support plate and a third support plate; the first support bars, the second support bars, the first support plate and the second support plate cooperate with one another to form a parallelepipedal frame; the frame, the first support plate, the second support plate and the third support plate form a bed after being horizontally arranged; after the frame is rotated, the frame, the first support plate, the second support plate and the third support plate form a cart; a linkage can be lifted and turned to drive the third support plate to lift and turn; a protective mechanism is arranged at the upper end of the first support plate. The infectious disease protective device is novel in structure and ingenious in concept, allows medical personnel to work more conveniently and more safely, and has a higher utilization rate.
Owner:THE FIRST AFFILIATED HOSPITAL OF ZHENGZHOU UNIV

Networking-supportive electric energy measuring completion acceptance device

The invention relates to the technical field of electric energy measuring, in particular to a networking-supportive electric energy measuring completion acceptance device which is a wireless inspector aiming at safety and wiring correctness of an electric energy measuring device, especially an instrument used for correctness inspection under a power outage state. The networking-supportive electric energy measuring completion acceptance device comprises a body and a control circuit board, a display screen is arranged on the body, the control circuit board is mounted in the body, a power source module, a main control module, a transformer detection module, a communication module, an input module and a display module, the main control module is connected with the the transformer detection module, the communication module, the input module and the display module, the input module sends input signals to the main control module, the transformer detection module transmits detection signals to the main control module, the main control module transmits transformer polarity and transformation ratio information to the display module for displaying, and the power source module is connected with the main control module, the transformer detection module, the communication module, the input module and the display module.
Owner:STATE GRID CORP OF CHINA +2

Input method of Chinese character stroke code

InactiveCN101303623AThe method of character splitting and code extraction is simpleEasy to learnSpecial data processing applicationsInput/output processes for data processingVertical barChinese characters
The invention provides a Chinese character stroke code inputting method; wherein, a Chinese character is considered to be composed of at least one line segment; the line segments are classified into three single-stroke codes, that is, a horizontal stroke code, a vertical stroke code and an oblique stroke code; wherein, the horizontal stroke code represents a horizontal stroke in Chinese characters, the vertical stroke code represents a vertical stroke and a hook stroke in Chinese characters, while the oblique stroke code represents a non-horizontal and non-vertical line segment in the Chinese characters; at least two single-stoke codes are combined to form a plurality of structural stroke codes, the structural stroke code includes a combined stroke code which is formed by connecting and crossing at least two single-stroke codes with each other and a matched stroke code which is formed by matching at least two single-stroke codes with each other; the single-stroke code, the combined stroke code and the matched stroke code are set on a computer key mapping according to different groups; the inputting method includes: a Chinese character to be input is split by using the structural stroke code and the single-stroke code; At most three stroke codes are selected from the split structure and the residual single-stroke codes; finally the Chinese character is input by clicking the keys corresponding to the stroke codes.
Owner:陈新伟
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products