Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

32results about How to "Prevent knowing" patented technology

Home decoration network platform system and use method

The present invention relates to a safe and reliable home decoration network platform system and a use method. The safe and reliable home decoration network platform system comprises a platform service unit, a classification service unit and a user unit connected with the platform service unit by the internet; the platform service unit is used for input, output and processing of information between the user unit and the classification service unit; the user unit means a platform character relationship and comprises a home owner module, a supplier module, a designer module, a foreman module and a supervisor module; the classification service unit comprises a 3D designer module, a 3D commodity module, a house type module, a designer works module, a home owner works module, an E-commerce module and a flow processing module; online design on the home decoration platform system is implemented and a user carries out online design and previews a design effect in advance; a designer carries out online design and shows public works and the user directly enjoys and selects the works of the designer on a platform; and a total charge supervision function is provided for the integral home decoration project, the integral project can be orderly propelled to be successfully carried out and contract breakage or wrangle is avoided.
Owner:HENAN XINSHAN INFORMATION TECH

User identity real-name authentication method of an electronic payment system

The invention relates to a user identity real-name authentication method of an electronic payment system, belongs to the technical field of network information security, and solves the problem that real-name authentication is unsafe and unreliable in the prior art. The method comprises the following steps that an electronic payment system sends a real-name authentication request to a third-party supervision system; After receiving the real-name authentication request, the third-party supervision system acquires network operator information and a network user name of the electronic payment system, acquires user real-name identity information and transmits the user real-name identity information to the infrastructure platform; The infrastructure platform verifies the real-name identity information; If the verification result is true, performing encryption mapping on the network operator information, the network user name and the real-name identity information, generating a network identity certificate, transmitting the network identity certificate to a third-party supervision system, and sending real-name authentication confirmation information to an electronic payment system; Otherwise, the real-name authentication is terminated. According to the method, a third-party supervision system is combined with a network identity certificate, so that the privacy of a user is protected,and the person and the certificate are the same.
Owner:XINGTANG TELECOMM TECH CO LTD +1

Internet of vehicles anonymous security evidence obtaining method and system based on blockchain technology

The invention discloses an Internet of Vehicles anonymous security evidence obtaining method and system based on a blockchain technology. The Internet of Vehicles anonymous security evidence obtaining method and system are applied to a network environment composed of a plurality of data uploading modules, a plurality of data using modules, a plurality of authorization modules, a blockchain module and a distributed data storage module. The data uploading module preprocesses and encrypts the data, uploads the data to the distributed data storage module, and sends a corresponding transaction to the blockchain module; the data use module sets required data attributes, generates a range proof and sends the range proof to the blockchain module; the authorization module is responsible for initialization of the whole evidence obtaining system, tracing of evidence obtaining data and authorization approval operation, and participates in maintenance of blockchain nodes; the blockchain module is composed of a plurality of nodes, so that the whole system can supervise the transparency and legality of evidence obtaining; and the distributed data storage module is used for storing the encrypted evidence obtaining data and generating a downloading link. According to the invention, the confidentiality and traceability of evidence obtaining data can be protected.
Owner:HEFEI UNIV OF TECH

Printing device and information processing system using the same

The invention provides a printing device and an information processing system using the same. The printing device includes a table storage unit that stores a print request management table in which a password, request source identification data for identifying the external processing apparatus which has transmitted the print request and a job code for specifying the print request are coordinated with each other; and a print control unit that requests entry of a password and, when the password is entered, searches the print request management table and, when there is only one password which matches the entered password, performs the printing job in accordance with the print request specified by the job code which is determined by the password and, when there are a plurality of the passwords which match the entered password, compares the request source identification data corresponding to the respective passwords and, when the request source identification data corresponding to the respective passwords are different from each other, requests entry of the request source identification data and, when the request source identification data is entered, performs the printing job in accordance with the print request specified by the job code determined by the entered password and the request source identification data.
Owner:MURATA MASCH LTD

Method for remote controller to obtain control authority of controller and remote controller

The invention discloses a method for acquiring controller control authority for a remote controller. The method comprises a step A for setting a customized password and a step B for acquiring the control authority. The step A comprises the following steps: (A1), receiving the customized password input by a user; (A2), storing the customized password and establishing a corresponding relation between the customized password and a specific password. The step B comprises the following steps: (B1), receiving external signals input by the user; (B2), determining whether the external signals are in accordance with the customized password, acquiring the specific password corresponding to the customized password if the external signals are in accordance with the customized password, converting the specific password into a corresponding remote control signal and emitting the remote control signal; (B3), receiving a connecting command sent by a controller, and establishing connection with the controller according to the connecting command. According to the method, the authority password of the remote controller is encrypted freely under the premise that the operation difficulty is not increased, and the use safety is improved. The invention further discloses the corresponding remote controller.
Owner:GUANGDONG XUTIAN IND INVESTMENT CO LTD

Residential district management system

The invention relates to the technical field of community management software, and in particular, relates to a residence community management system, wherein the system comprises a login interface, the login interface is connected with an owner login part and an administrator login part, the owner login part is connected with a management personal information part, a repair request check part, anannouncement check part, a complaint check part, a payment check part and a message check part, and the management personal information part is connected with a password modification part; the repairrequest check part is connected with a repair request adding part, the complaint check part is connected with a complaint adding part, the message check part is connected with a message publishing part, a password modification, the repair request adding part, the complaint adding part, a message publishing part, the announcement check part and the payment check part are all connected with an exitsystem, and the administrator login part is connected with a community property management interface. And the community property management interface is respectively connected with a administrator management part, an owner management part, a repair request management part, a charging management part, an announcement management part and a message management part. The system is simple in function module, contains basic business of property management, has high practicability, is simple and easy to operate, and is low in maintenance cost.
Owner:上海隽珑信息技术有限公司

Multi-layer encryption privacy protection method for content-centric network

The invention discloses a multi-layer encryption privacy protection method used for content-centric networking. The multi-layer encryption privacy protection method comprises the steps that: a requester sends an interest package used for creditability validation to a publisher of content, and the publisher responds to the requestor; the requestor sequentially uses a publisher public key and a router public key for encrypting the requested interest packet, and sends the requested interest packet to a router; the router decrypts the requested interest packet by using a private key to obtain information it needs, and then forwards the requested interest packet to the next-layer router until the requested interest packet is sent to the publisher; the publisher decrypts the requested interest packet by using a publisher private key, validates the creditability of the requester, responds to the requested interest packet when the validation passes, and sends data to the router; and the router decrypts a data packet by using a private key to obtain response data, and forwards the response data to the next-level router until the response data is forwarded to the requester. The multi-layer encryption privacy protection method adopts the public keys for encryption, is relatively high in security, and can protect the privacy of the requestor and the publisher to a greater extent.
Owner:GUANGDONG UNIV OF TECH

Privacy protection online car-hailing method and system for excluding matched drivers

The invention discloses a privacy protection online car-hailing method and a privacy protection online car-hailing system for excluding matched drivers. The privacy protection online car-hailing method and the privacy protection online car-hailing system are applied to an online car-hailing system environment consisting of a plurality of passenger modules, a plurality of driver modules, an online car-hailing service provider module and a certification authority module. The passenger module registers passenger information, generates a service request and transmits the service request to the online car-hailing service provider module; the driver module registers driver information, generates a service response and transmits the service response to the online car-hailing service provider module; the online car-hailing service provider module verifies the service request and the service response, generates a matching result and transmits the matching result to the corresponding paired passenger and driver; and the certification authority module is responsible for system initialization and entity registration. According to the invention, the privacy of passengers can be effectively protected, and the process of receiving the online car-hailing service is safe and reliable, so that the potential risk of maliciously matching the driver is effectively avoided.
Owner:HEFEI UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products