Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

157results about How to "Quick Login" patented technology

Self-upgrade method for equipment in remote online monitoring system

The invention belongs to the field of wireless communication, and particularly relates to a self-upgrade method for equipment in a remote online monitoring system. The method is characterized in that: each piece of terminal equipment performs self-upgrade and self-maintenance through the remote online monitoring system consisting of a terminal table tool, a data acquisition unit and a background server based on a GPRS (General Packet Radio Service). The method mainly comprises the following steps that: the background server manages an application program and version information; the data acquisition unit periodically inquires a version log and downloads a new version program; the data acquisition unit realizes self-upgrade and upgrades the terminal table tool; and after the new version program is updated successfully, skipping is performed and an old version program is still kept for later use. In the method, the GPRS, storage space management, a file sub-package mechanism, a transmission response mechanism, a mode for continuous transmission at break-points and an IAP (Internet Access Provider) program programming mode are combined, and the accuracy and reliability of data transmission are ensured; and under the condition of not influencing normal use of a user, the equipment upgrading and maintaining problems of large quantity and wide distribution are solved quickly and efficiently.
Owner:杭州先锋电子技术股份有限公司

Method and system for quickly obtaining network information service at mobile terminal

The utility model relates to a method of easily getting network information services from a mobile terminal, which adopts a structure of client / server. A user is directly interactive with a server and gets network information services via the client module binding at the terminal: when the terminal is in a standby state, the user clicks a mode switching key to switch the terminal to the given different service modes or switch the terminal among different service modes; and in a certain service mode, the user directly inputs a keyword on the terminal desktop, the client module separately inquires a client database, a server database or a server search equipment according to the current service mode and the information which is input by the user, and gets the corresponding network services and content resources, and separately chooses a related network as a service carrier according to the service mode, directly leads the user into the network services for information services. The utility model has advantages that the operation is simple, and the user can fast and easily land Internet and other networks from the terminal desktop, easily finishes the switchovers of service modes and gets corresponding services.
Owner:网秦无限(北京)科技有限公司

Login method and system, computer device and storage medium

The invention relates to a login method and system, a computer device and a storage medium. The method comprises the steps of acquiring a product trigger instruction via a logged-in page correspondingto a user identifier, wherein the product trigger instruction carries a product-party identifier; generating a product information access request according to the product trigger instruction, and sending the product information access request to a platform-party server, wherein the product information access request carries the user identifier, and the product information access request is used for indicating the platform-party server to generate a security token according to the user identifier; receiving the security token sent by the platform-party server, and generating a login request according to the security token; sending the login request to a product-party server corresponding to the product-party identifier, and receiving a verification result sent by the platform-party server,wherein the login request is used for indicating the product-party server to send the security token to the platform-party server for verification; and when the verification result is that the verification is successful, logging in the product-party server, and receiving product information returned by the product-party server. By adopting the method, a product-party system can be logged in quickly.
Owner:ONE CONNECT SMART TECH CO LTD SHENZHEN

Method for mini-station to authenticate and log in virtual machine in cloud system and login system

The invention discloses a method for a mini-station to authenticate and log in a virtual machine in a cloud computing system and a login system. The method comprises the following steps that: (1) the mini-station logs in the cloud computing system by the login system; (2) the login system searches for the number of available virtual machines in the cloud computing system; (3) the login system starts the virtual machine in the cloud computing system according to virtual machine selection rules and executes steps (4) to (6) if the number of the available virtual machines is more than or equal to 1, otherwise returns information indicating that the cloud computing system does not have available resources to the mini-station, and the mini-station quits; (4) the virtual machine generates virtual machine login information, and transmits the virtual machine login information to the login system; (5) the login system transmits the virtual machine login information to the mini-station; and (6) the mini-station logs in the virtual machine. By the method and the login system, the mini-station can rapidly authenticate and log in the virtual machine, and the virtual machine is not required to be kept in a starting state so as to make safer the system and effectively save resources.
Owner:GCI SCI & TECH

Direct broadcasting room video stream pushing control method and corresponding server and mobile terminal

The invention relates to a network direct broadcasting technology, in particularly to a direct broadcasting room video stream pushing control method and a corresponding server and a mobile terminal. The method includes the following steps: receiving a connection request including pre-protocol information output by a second terminal, issued by a host user in a direct broadcasting room from a first terminal; responding to the connection request, sending a received first direct broadcasting video stream uploaded by the first terminal to the second terminal; and receiving a third direct broadcasting video stream combined by at least one of a second direct broadcasting video stream uploaded by the second terminal and the first direct broadcasting video stream, and pushing the third direct broadcasting video stream to a member user in the direct broadcasting room. The method can achieve multi-platform synchronous direct broadcasting on the basis of separation and combination of video streams, can achieve sharing and flexible combination of the video streams, makes multi-platform direct broadcasting more convenient and fast, can improve the direct broadcasting efficiency, the direct broadcasting content, and can improve the user experience.
Owner:BIGO TECH PTE LTD

Enterprise real name authentication method and authentication server

ActiveCN109660484AEfficient and convenient online real-name authentication serviceImproved user login experienceUser identity/authority verificationAuthentication systemUser identifier
The embodiment of the invention provides an enterprise real name authentication method and an authentication server, and belongs to the technical field of the information security. The method comprises the following steps: acquiring an enterprise real name authentication request sent by a user through a third-party network application, wherein the enterprise real name authentication request comprises an application identifier of the third-party network application; judging whether the third-party network application is legal according to the application identifier; if the third-party network application is legal, acquiring a user identifier of a terminal application program of the user, and judging whether enterprise identity authorization information corresponding to the user identifier is existent at local according to the user identifier; if the enterprise identity authorization information corresponding to the user identifier is existent at local, sending the enterprise identity information corresponding to the enterprise identity authorization information to the third-party network application. Through the enterprise real name authentication method provided by the embodiment of the invention, an efficient and convenient online real name authentication service can be provided for the enterprise, so that an enterprise user can directly and quickly login the third-party network application based on the identity authorization of the enterprise, and the user login experience is improved.
Owner:爱信诺征信有限公司

Log-in method of application client and relevant device

The embodiment of the invention relates to the technical field of mobile Internet and discloses a log-in method of an application client and a relevant device. The method includes the steps that a log-in request sent by the client is received, and the log-in request comprises identity information of a mobile device provided with the application client, and simple verification information input by a user; whether preset verification information bound with the identity information of the mobile device is pre-stored or not is recognized, if the preset verification information bound with the identity information of the mobile device is pre-stored, whether the simple verification information is the same as the preset verification information or not is judged, and if the simple verification information is the same as the preset verification information, pre-stored account number information bound with the preset verification information is acquired; after verification of the account number information passes, the application client is controlled to log in a server through the account number information. By means of the log-in method of the application client and the relevant device, the application client can log in the server easily and fast, and the risk that the application client illegally logs in the server is reduced.
Owner:GUANGZHOU HUADUO NETWORK TECH

Intelligent dustbin and operation method thereof

The invention relates to the field of waste classification, in particular to an intelligent dustbin comprising a box body. Multiple containing cavities are formed in the box body. Each containing cavity of the box body is provided with a box door unit. The intelligent dustbin is characterized in that the box body is further provided with an external video identification unit and a central controlunit, the external video identification unit comprises a first camera used for shooting images containing a rubbish bag, and the central control unit identifies features of the rubbish bag in the images and opening one corresponding box door unit based on the identification information. Based on the structure, in the operation process of the dustbin, the first camera shoots the images containing the rubbish bag, the central control unit identifies the features of the rubbish bag from the images and opens one corresponding box door unit based on the identification information; by the adoption of the scheme, the intelligent dustbin can omit the step that a user selects the rubbish classification option which the rubbish needing to be thrown belongs to, and automatic judgment can be conductedthrough central control so as to open the corresponding box door; and therefore, the operation process is simplified for the user, and the intelligent dustbin is convenient to use for the user.
Owner:王远喆

Heat exchanging units long-range control system

InactiveCN101261513AReal-time monitoring and control of working conditionsGuaranteed normal operationHeat exchange apparatusTotal factory controlCommunication interfaceModem device
The invention relates to a heat-exchanger unit remote control system in the heat exchange control field, the technology is mainly characterized in that: the system is composed of a main control machine which is positioned at a control center, a modulation demodulator which is connected with a communication interface thereof, control boxes of heat-exchanger units which are distributed in each heat supply station and modulation demodulators which are connected with the communication interfaces thereof by connection via a public telephone virtual network, and the heat exchanger unit control boxes are connected with a temperature sensor in a heat supply pipeline, a pressure sensor, a regulating valve, a circulating pump, a water supplementing pump and an outdoor temperature sensor. The heat-exchanger unit remote control system can carry out the real-time monitoring and the control of the operation situations of all the heat-exchanger units, once the devices of the heat supply stations are detected to have the faults, the processing can be carried out immediately, thus ensuring the normal operation of a heat supply system, automatically adjusting the opening degree of the regulating valve of a primary network, avoiding the waste of the resources due to the excessive heat supply or the inconvenience of a user due to the insufficient heat supply and stably supplying the heat to the user of a secondary network.
Owner:TIANJIN HONGYUAN HEATING EQUIP SCI & TECH

Method and system for executing security operation by using security device

ActiveCN108200037AEnsure safetyProtect business secretsDigital data authenticationTransmissionSmart card
The invention provides a method and system for performing a security operation by using a security device. The method comprises the following steps: a security chip acquires login information and interacts with a smart card to obtain verification information, and sends the verification information to a login processing terminal through a login terminal, the login processing terminal verifies the login information and the verification information, and executes a login operation, after login success, the security chip sends an image collection instruction to a camera device, receives first collection information sent by the camera device, judges whether the collection information contains human face information, if so, judges whether the human face information is consistent with a user facepicture, if not, executes the security operation, if not, judges whether at least one of the disenabling conditions is satisfied, and if so, executes the security operation; or, the security chip sends the first collection information to the login terminal, the login terminal performs judgment, and executes the security operation according to the judgment result, therefore the business secret of the employee who logs in by using the security device is protected, and the unrelated personnel are prevented from using the security device.
Owner:TENDYRON CORP

Method and device for quick voice login of intelligent vehicle

The invention relates to a method and a device for quick voice login of an intelligent vehicle. The method comprises the following steps of simultaneously obtaining vocal print features and a device ID of an on-board host computer or a device ID of a mobile terminal, which is provided by a user, when the user logs in; affirming a storage unit in a cloud database according to the device ID of the on-board host computer or the device ID of a mobile terminal, which is provided by the user; when the device ID is affirmed to be in the storage unit of the cloud database, carrying out matching and retrieval on the extracted vocal print features in the storage unit; and when the vocal print features are matched successfully, logging in successfully, otherwise failing to log in. The user information is classified and stored through the device ID, so that the time for matching and retrieval of the vocal print features is greatly reduced, and the login is realized through the vocal print features of the user while a username and a login password cannot be input, so that the login safety of vehicle-mounted terminals, such as an electronic control unit, is increased, the user login is greatly facilitated, and meanwhile, the user identity can be quickly identified to realize the quick login.
Owner:FJ MOTOR GRP YUDO NEW ENERGY AUTOMOBILE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products