Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

1071results about How to "Protection of rights and interests" patented technology

Unattended electric car rental system and rental method

ActiveCN104992364AEasy to useProtect the rights and interests of usersBuying/selling/leasing transactionsData transmissionAutomatic deduction
Provided are an unattended electric car rental system and a rental method. The system comprises a vehicle-mounted terminal, a user terminal and a management platform; and the vehicle-mounted terminal and the user terminal both perform data transmission with the management platform, and a wireless connection is formed between the vehicle-mounted terminal and the user terminal. The method comprises steps of: the management platform obtaining user information, obtaining user deposit, receiving information of a reserved vehicle, monitoring a time when a user picks up the vehicle, controlling the user to pick up the vehicle, verifying the user information, controlling starting up and running of the vehicle, controlling the user to return the vehicle, the management platform performing automatic deductions, and introducing a whole process of implementation of vehicle renting. The system provided by the invention is novel in design, and is convenient for the user to use; a rental process does not need the participation of staff members, thereby implementing unmanned renting. The method provided by the invention provides more convenience for the user in a renting process, and real-time feedback of information enables the user to timely obtain related information, thereby ensuring rights and interests of rental enterprises and users.
Owner:联世海富威海智慧科技有限公司

Block chain key trusteeship and recovery method and device based on secrecy sharing technology

The invention discloses a block chain key trusteeship and recovery method and device based on a secrecy sharing technology. The method comprises the steps that A1, a user groups a private key sk1 in a(t, n) secrecy sharing mode, wherein the n is the number of fragments of shared secrecies obtained by splitting the private key, the t is the minimum number of the fragments for recovery of the private key, and the t is greater than or equal to 2 and is smaller than or equal to the n; A2, information containing user identification information is taken as a private key protection key, and then grouping encryption is carried out on the private key through utilization of the key; and A3, secrecy string information containing encrypted ciphertexts is dispersely stored to a block chain or is sentto trusted nodes for trusteeship and storage, when the user discovers that own private key is lost, a key recovery request is generated, at least t secrecy strings are obtained from the trusted nodesor the block chain in a secrecy string storage mode of the key, and the content in the secrecy strings is extracted, decrypted and recombined, so the private key is recovered. According to the methodand the device, the secrecy sharing technology is applied to a block chain scene for the first time, thereby solving the private key trusteeship and recovery security problem.
Owner:JUZIX TECH SHENZHEN CO LTD

Multi-signature transaction information processing method for data transaction platform based on block chain

The invention discloses a multi-signature transaction information processing method for a data transaction platform based on a block chain. Each of a buyer and a seller generates a transaction key pair at self client, and the data transaction platform generates and distributes a single transaction key pair for each transaction process; the seller releases data to be transacted on the block chain via the data transaction platform; after the buyer submits a transaction application, an intermediate address is generated according to a three-party public key, money is transferred to the intermediate address after payment, and the seller receives the money, writes the money into the block chain, then encrypts data and sends the encrypted data to the buyer; after the buyer receives the data, if transaction is acknowledged, the double parties sign, and the money is transferred to the address of the seller; and if objection exists, the data transaction platform makes a judgment, and determines to transfer the money to the buyer or the seller according to the judgment result. Data and transaction information during transaction of the double parties are processed in a special regional chain manner, and meanwhile, the data transaction platform cannot embezzle the transaction money, so that the security of digital assets during transaction is further guaranteed.
Owner:浙江数秦科技有限公司

Identity authentication method and apparatus

Embodiments of the invention provide an identity authentication method and apparatus. The method comprises the steps of obtaining a certificate image of to-be-authenticated personnel; judging whether a certificate in the certificate image is an authenticated certificate or not, thereby obtaining a certificate authentication result; obtaining a human face image of the to-be-authenticated personnel; performing living body detection by utilizing the human face image, thereby obtaining a living body detection result; and determining whether an identity of the to-be-authenticated personnel is legal or not at least according to the certificate authentication result and the living body detection result. According to the method and the apparatus, whether the identity of the to-be-authenticated personnel is legal or not is determined in combination with the authenticated certificate judgment and the living body detection, so that compared with a conventional mode of performing identity authentication based on a password or the certificate only, the identity authentication method and apparatus has the advantages that the authentication result is more accurate, and the security of user authentication can be improved, so that user rights and interests can be effectively ensured.
Owner:BEIJING KUANGSHI TECH +1

Token-based client identity verification method and system

The invention discloses a token-based client identity verification method and system, and relates to the field of information technology. The method comprises the following steps: waiting for to receive a user name and password information sent by a client; judging whether the user name and the password information match with the user name and the password information stored in a server, and if not, prompting re-input; if so, generating an authorization token corresponding to a user ID; storing the authorization token in a database and returning the authorization token to the client; waiting for to receive request information sent by the client, and judging whether the request information carries the authorization token: if the request information carries the authorization token, judging whether the authorization token is valid, and if the authorization token invalid, returning re-login information; if the authorization token is valid, judging whether the authorization token stored inthe database is consistent with the authorization token carried in the request information, and if so, indicating that the verification is passed; if not, indicating that the verification fails, and returning account remote login information; and if the request information does not carry the authorization token, returning the re-login information.
Owner:TAIHUA WISDOM IND GRP CO LTD

Client side, server side and identity authentication system and method

The invention discloses a client side, a server side and an identity authentication system and method. The method includes the steps that vocal print characteristics of a user are reserved and used as the vocal print recognition reference characteristics in the user identity authentication process; in the following process, when an authentication request of the client side user is received and identity authentication is conducted; dynamic verification codes generated at random are sent to the client side user, the user is made to read the dynamic verification codes in a voice mode to generate voice information, correctness of voice information of the user is verified based on the dynamic verification codes and reserved reference characteristics, when the vocal print characteristics included in the voice information are the same as the reference characteristics and semantic content included in the voice information is the same as the semantic content of the dynamic verification codes, the user can pass identity authentication. It can be shown that on the basis of biological characteristics (vocal print) and by the combination of the dynamic information verification principle, user identity authentication is achieved, and compared with an existing authentication mode based on physical equipment, the identity authentication method is higher in safety and can guarantee user benefits to the higher degree.
Owner:AGRICULTURAL BANK OF CHINA

Taxi guiding and dispatching system

The invention provides a taxi guiding and dispatching system, which belongs to the field of taxi dispatching system. The taxi guiding and dispatching system provided by the invention comprises a vehicle-mounted terminal, a passenger terminal and a server, and is characterized in that: the vehicle-mounted terminal, the passenger terminal and the server communicate with one another through a network; and the server collects online information of the passenger terminal and the vehicle-mounted terminal, establishes and maintains a supply-demand link relation between taxis and passengers through an intelligent dispatching mechanism, sends travel information of a dispatched taxi to the passenger terminal according to the supply-demand link relation, and sends passenger requirement information dispatched to the vehicle-mounted terminal and an optimal driving route planned for the same to the vehicle-mounted terminal. The taxi guiding and dispatching system can recommend the optimal driving route, improves operating efficiency, reduces operating cost, protects the environment, minimizes the participation of the driver in the whole link so that the driver can concentrate on driving, ensures the safe driving of the driver, reports passenger travel information in real time, and has a certain predictability in passenger riding arrangement.
Owner:山东睿达电子科技有限责任公司

Self-service car returning method in car sharing process and car sharing method based on self-service car returning

A self-service car returning method in the car sharing process and a car sharing method based on self-service car returning belong to the field of car sharing. The methods are disclosed in order to solve the problem that the procedure of car returning is complicated for car sharing as a car user needs to return a car to a car owner and the car owner needs to check the car face to face. The self-service car returning method is characterized by comprising the following steps: S1, a car user parks a car at an agreed location at the end of car sharing; the car user submits a car returning application through the APP client thereof, and takes an image of the car using an APP and uploads the image to a cloud platform server as the car checking basis for car returning, and the cloud platform server automatically adds a timestamp when the APP client of the car user uploads the image, carries out backup and image processing and comparing, makes out new damaged points generated after the car user picks up the car, and pushes the new damaged points to the APP client of a car sharer; and S3, the car sharer receives the car returning application, checks the car based on the image pushed by the APP client of the car user, and / or checks the car at the car location, and / or does not check the car.
Owner:DALIAN ROILAND SCI & TECH CO LTD

Off-line experience store management system and method

The invention relates to an off-line experience store management system. The system comprises an experience management system terminal and a client identification system, an information query system, a mobile query terminal and an output device which are connected with the experience management system terminal in a communication way, wherein the experience management system terminal is connected with a remote central server in a communication way and performs data interaction and the synchronization of an experience goods database; the client identification system is used for identifying experience sheet numbers of clients coming into a store, transmits the experience sheet numbers to the experience management system terminal and generates experience serial numbers of the clients; the output device is used for displaying information to users in the store according to instructions of the experience management system terminal; the information query system is communicated with the experience management system terminal and is used for providing real-time query of store inventories and experience information for the clients or salesclerks; and the mobile query terminal is used for reading all the goods information of the store and uploading the goods information to the experience management system terminal. Therefore, the system can realize mutual combination of an on-line system and an off-line system and provides an integrated shopping platform.
Owner:BEIJING HUSNG CHUANGZHAN TECH

Lightweight anonymous authentication and key negotiation method in multi-server environment

The invention relates to a lightweight anonymous authentication and key negotiation method in a multi-server environment and belongs to the technical field of information safety. The method is characterized by achieving the anonymous authentication and key negotiation in the multi-server environment by means of the following three steps: (1) building a system and selecting system parameters; (2) registering in a registering center RC by a server and a user; (3) carrying out authentication and key negotiation by the user and a remote server so as to provide subsequent communication session keys. The lightweight anonymous authentication and key negotiation method is applicable to remote authentication of a mobile terminal and servers with low calculation capability, memory space and communication capability; the mobile terminal can log in any server registered by RC through a user name and a password; the server only can authenticate that the user is a valid user and cannot know the specific identity of the user, so that the privacy of the user is protected; the lightweight anonymous authentication and key negotiation method is excellent in expansibility; the two-party negotiation session keys are determined by random numbers Ni1 and Ni2 selected by authenticating for each time by two parties; the independence and the forward and backward security of the session keys are ensured.
Owner:深圳市迅威恒达信息技术有限公司

Anti-stealing link method of internet content delivery network

The invention relates to an anti-stealing link method of an internet content delivery network, comprising the following steps: (1) a user side requests a file server website to provide a file download link through a browser; (2) the file server website returns the file download link in which HTTP (Hyper Text Transport Protocol) User-Agent information of the browser at the user side is introduced; (3) the browser at the user side initiates a file download request to a file server of the file server website through the file download link; (4) after receiving the file download request, the file server of the file server website checks the HTTP User-Agent information in the file download link and User-Agent information in the file download request, if the HTTP User-Agent information in the file download link and the User-Agent information in the file download request are consistent, then the request is judged to be a legal request, and file download service is provided for the request; otherwise, the request is judged to be a stealing link, and the file download service is refused to be provided for the request. The invention improves the threshold of the stealing link and effectively protects the right and the interest of the file server website.
Owner:阿里巴巴(中国)网络技术有限公司

Identity authentication method, device and system, terminal, server and storage medium

The embodiment of the invention provides an identity authentication method, device and system, a terminal, a server and a storage medium. The method comprises steps of acquiring personal identifier information of a to-be-authenticated person; judging whether the personal identifier information is the authenticated information so as to acquire an information authentication result; acquiring a faceimage of the to-be-authenticated person; based on a face image, acquiring a living body detection result, wherein under the condition that a first detection result acquired in living body detection carried out by a local terminal based on a face image and a second detection result acquired in living body detection carried out by a server based on at least one part of the face image represent thatan authentication worker is a living body, the living body detection result is determined to be the result for representing the to-be-authenticated worker is a living body; and at least according to the information authentication result and the living body detection result, whether the identity of the to-be-authenticated worker is legal. According to the invention, by combining the authenticated information judgment and double living body detections, whether the identity of the to-be-authenticated worker is legal is determined.
Owner:BEIJING KUANGSHI TECH +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products