Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

144results about How to "Prevent imitation" patented technology

Access control method and system based on cloud technology and two-dimensional code technology

The invention discloses an access control method and system based on a cloud technology and a two-dimensional code technology. The system comprises a remote cloud server, a system management client, a property management client, a plurality of user intelligent terminals and access control equipment, wherein the access control equipment is internally provided with an electric control lock; information management is carried out through logging in the remote cloud server via the system management client; the property management client is in communication connection with the system management client through a wide area network and personnel information of corresponding units is managed by the property management client; each user intelligent terminal requires a two-dimensional code picture from the remote cloud server in a utilization process and then sends a two-dimensional code to the access control equipment to carry out authority verification; after a camera of the access control equipment scans the two-dimensional code picture, data analysis is carried out and then authority judgment is carried out; if an authority passes, the electric control lock is controlled to be unlocked and a prompt is given; otherwise, the system reminds that the electric control lock is not successfully unlocked and a prompt is given.
Owner:SHENZHEN MICHOI SECURITY TECH

Method and system for authenticating legality of receiving terminal in unidirectional network

The invention relates to a method and system for legality authentication of receiving terminals in a unidirectional network. The digital signature of UID of chips is written in terminal equipment, terminal firmware downloads a server authentication agent program from the network, the program runs on the hardware platform of the terminal, and UID signature is decrypted by using a built-in public key or the public key of the signature certificate acquired from the network; if the decrypted value and the abstract value of UID read out from the chips are determined to be identical and the signature certificate is in a trust chain established by the rood certificate, the terminal is legal, or the terminal is illegal. Also, in the process of self-test of the firmware, the decrypted value can be obtained by using the public key in the signature certificate to decrypt UID signature, then UID of the chips is read out and the abstract value thereof is calculated, and if the two values are identical, the self-test passes, or the work state ends. By using the self-test of the terminal firmware or the mutual authentication between the server authentication agent program and the firmware, the invention makes clone and copied set-top boxs not work normally in the network.
Owner:北京邦天信息技术有限公司

Communication message security interaction method and device of distribution automation system

The invention provides a communication message security interaction method and a device of a distribution automation system. After completing two-way identity authentication between a distribution master station and a distribution terminal, a main distribution station obtains distribution terminal information from the distribution terminal. The main distribution station judges whether that distribution terminal is the first identity authentication according to the version number of the symmetrical key of the distribution terminal, if not, the message exchange between the distribution terminaland the main distribution station is carried out; otherwise, after the symmetric key of the distribution terminal is updated, message exchange between the distribution terminal and the distribution master station is performed. The scheme makes up for the shortcomings that the distribution master station can not identify the distribution terminal in the distribution automation system security protection system, and the confidentiality and integrity of the communication message can not be guaranteed, and improves the security protection level of the vertical communication between the distribution master station and the distribution terminal in the distribution automation system. At that same time, the problem that the remote control / parameter set message has the hidden trouble of the replayattack and the like are sol.
Owner:CHINA ELECTRIC POWER RES INST +1

Electronic signature verification method, terminal equipment and computer readable medium

The embodiment of the invention discloses an electronic signature verification method, terminal equipment and a computer readable medium. The method is applied to the terminal equipment which containsa finger biological information sensor in a touch screen. The method comprises the following steps that: through the touch screen, collecting an input signature trajectory, and while the signature trajectory is collected, collecting a finger contact feature corresponding to the signature trajectory through the finger biological information sensor; verifying whether the signature trajectory is matched with a pre-stored signature trajectory or not; if the signature trajectory is matched with the pre-stored signature trajectory, verifying whether the finger contact feature corresponding to the signature trajectory is matched with a pre-stored finger contact feature corresponding to the pre-stored signature trajectory or not; and if the finger contact feature corresponding to the signature trajectory is matched with the pre-stored finger contact feature corresponding to the pre-stored signature trajectory, determining the signature trajectory passes electronic signature verification. By use of the electronic signature verification method of the embodiment of the invention, the use safety of the electronic signature can be improved.
Owner:SHENZHEN GIONEE COMM EQUIP

Multifunctional distributed intelligent access control system using IC card or dynamic password

The invention relates to a multifunctional distributed intelligent access control system using an IC card or dynamic password, relates to cloud intelligent Internet-of-Things household door locks, and belongs to the field of Internet of Things. The system is mainly composed of a management center server, an embedded access control terminal control module, a communication channel, an access control member mobile phone and the like. An operation method comprises the steps: a user accesses a WeChat public number through a mobile phone and submits a registration request, and after the registration is successful, the system can randomly generate a dynamic password; and then the user-obtained dynamic password is inputted to an access control host, a legal unlocking authorization is emitted, a user unlocking record is saved, and ultimately, the user unlocks the access control system. The system has the innovation that convenient standby support is provided for conditions that a card is lost and a user cannot enter a door with forgetting to take the card, and the system is convenient for daily life; on the other hand, the card can be prevented from being copied and being stolen for use, the important gateway card and code multiple authentication remote access control authorization management and control can be realized, and the access control reliability and safety are further improved.
Owner:HARBIN UNIV OF SCI & TECH

Anti-counterfeiting system

The invention discloses an anti-counterfeiting system, which comprises an anti-counterfeiting label, an intelligent terminal and an anti-counterfeiting server, wherein the anti-counterfeiting label isassociated with product information and is embedded on the package of the product and is invisible; the intelligent terminal is internally provided with a code reading module and is wirelessly sensedwith the anti-counterfeiting label, and the intelligent terminal is used for reading the product information in the anti-counterfeiting label and transmitting the product information to the anti-counterfeiting server; and the anti-counterfeiting server stores multiple items of certified product information and is in communication connection with the intelligent terminal. According to the anti-counterfeiting system provided by the invention, the anti-counterfeiting label is invisible and the anti-counterfeiting server and the intelligent terminal do not display the specific product informationor the certified product information and only display the true and false information, the anti-counterfeiting label and the product information associated with the anti-counterfeiting label can be effectively prevented from being stolen or copied, and a counterfeited or forged product can be efficiently recognized.
Owner:米格(浙江)创新科技有限公司

Method and device for authenticating terminal as well as EOC (Ethernet over Coax) terminal

The invention relates to a method and device for authenticating a terminal as well as an EOC (Ethernet over Coax) terminal. The method for authenticating the terminal comprises the following steps of: acquirement: acquiring characteristic domain information of the EOC terminal and first encryption control domain information which is prestored in the EOC terminal and generated according to a preset key and encryption algorithm based on the characteristic domain information; calculation: generating second encryption control domain information according to the preset key and encryption algorithm based on the characteristic domain information; and authentication: judging whether the first encryption control domain information and the second encryption control domain information accord with the preset authentication passing rule or not, allowing the EOC terminal to pass the authentication if the first encryption control domain information and the second encryption control domain information accord with the authentication passing rule; or otherwise, not allowing the EOC terminal to pass the authentication. The invention can achieve the purpose of carrying out the authentication control on the terminal on the basis of not increasing the terminal cost.
Owner:NEW H3C TECH CO LTD

Family file processing method and device, computer equipment and storage medium

The invention relates to a family file processing method and device, computer equipment and a storage medium. The method comprises the steps of obtaining file attribute information and graphic information of family files; and respectively executing encryption operation on the file attribute information and the graphic information to generate an encrypted encrypted family file, wherein the file attribute information is used for representing an object specification in the family file; wherein the graphic information is used for representing visual features of the family files; therefore, when the encrypted family file is loaded into the project and is in a family editing mode; the file attribute information is encrypted; therefore, information such as object specifications in the family filecannot be obtained; the confidentiality of family files is realized; in addition, due to the fact that the graphic information is encrypted, normal geometric figures of the objects cannot be displayed in the family editing mode, users who are not allowed to check the geometric figures of the family files are prevented from imitating the geometric figures of the family files, the safety of the family files is greatly improved, and the loss of labor achievements of designers is avoided.
Owner:久瓴(上海)智能科技有限公司

Writing handwriting identification system and method

The present invention discloses a writing handwriting identification method. The method comprises the steps of: collecting brushstroke force, writing speed and a handwriting track to generate a brushstroke force curve and/or writing speed curve when a writer is writing, a handwriting identification unit is configured to distinguish the types of strokes through identification of a nib moving trackto classify the obtained brushstroke force curve and/or writing speed curve according to the types of strokes and extract feature values which can best differ from other persons, wherein the obtainedfeature values can be taken as a feature value template stored in a storage module, or can be taken a comparison feature value sent to a feature value comparison module for comparison with the featurevalue template. In the handwriting identification method, the brushstroke force and/or writing speed can be collected, and/or the brushstroke force curve and/or writing speed curve are generated in the handwriting identification method to perform analysis, because the brushstroke force and the writing speed are both writing features invisible to human eyes, and other persons cannot perform imitation, it can be prevented from imitation by other persons in any one way or both ways, and therefore, the discrimination accuracy can be improved.
Owner:肖奇

Self-contained two-dimensional code anti-fake medicine, and preparation method and identification method thereof

The invention provides a self-contained two-dimensional code anti-fake medicine, and a preparation method and an identification method thereof, and belongs to the technical field of biological medicine preparation. According to the preparation method, a micro-processing technology is adopted to perform two-dimension code structure processing on a substrate, the polydimethylsiloxane is adopted to perform antagonizing model on a base plate with the two-dimension code structure to obtain a solid mould for preparing the medicine, the polyvinyl alcohol with the molecular weight of 80,000 to 120,000 is poured into the mould to form a medicine-contained coating, then a medicine solution is poured, and drying is carried out to obtain the self-contained two-dimensional code medicine. The self-contained two-dimensional code medicine provided by the invention can be applied to the anti-fake field of medicines, and has the advantages that firstly, the medicine can directly carry anti-fake information per se to avoid a re-imitation problem of printed paper labels; secondly, the influence of the traditional radio frequency identification (RFID) technology on safety and effectiveness of electronic tags is avoided; finally, an anti-fake process of the medicine and an identification process of the medicine are further simplified, thereby being rapid and low in cost.
Owner:TSINGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products