Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

222results about How to "Realize authentication" patented technology

OAuth protocol-based safety certificate method of open platform and system thereof

The invention relates to an OAuth protocol-based safety certificate method of an open platform and a system thereof. The method comprises the following steps that: an open platform checks whether an application example identifier that is consistent with the platform is carried in an access request for application of an unauthorized Request Token, wherein the access request is sent by a third part application apparatus; if not, a new application example identifier is distributed; and the application example identifier, a Request Token that is not authorized by a user and a corresponded token secret key are returned to the third part application apparatus; and the third part application apparatus updates the application example identifier to the local and continuously carries the application example identifier to carry out a subsequent OAuth certificate request; the open platform utilizes the application example identifier to guide the user authorization; and then, an Access Token and a corresponded secret key are issued to the third part application apparatus. According to the invention, the method and the system belong to the network technology field; and accurate certificate and authentication can be carried out on service scenes of a plurality of third part application operation examples; and moreover, flexible charging can be realized.
Owner:EB INFORMATION TECH

Safety access method of wireless metropolitan area network

The invention relates to a method for safe accessing of a wireless metropolitan area network, which comprises an authenticating step and a session key negotiating step. The authenticating step comprises that: a subscriber station SS sends a request message for access authentication to a base station BS; the BS sends a request message for certificate authentication to an authentication server AS; the AS verifies the request message for certificate authentication and sends a response message for certificate authentication to the BS; the BS verifies the validity of the identity of the SS according to the response message for certificate authentication; if the SS is valid, the BS sends the response message for access authentication to the SS; the SS verifies the validity of the BS according to the response message for access authentication; if the BS is valid, the SS uses the encryption certificate key of the SS to decrypt the material of authentication key. The SS signing certificate in the proposal is used for stating the identity and the SS encrypting certificate is used for encrypting and decrypting the material of authentication key so as to reduce the risk that the key is decrypted; through verifying the certificates of the BS and the SS by the AS, authentication for the subscriber station SS and the base station BS is realized and security level is improved.
Owner:GCI SCI & TECH

System for real time embedding visible watermark into flow medium as well as server terminal and client terminal thereof

The invention relates to a server side of a stream media visible watermark real-time embedding system, comprising: a video collecting module for real-time collection of video data; a video decoding module for compressive coding of the video data; a watermark embedding module for embedding information of the digital watermark into a code stream output after the video decoding module compresses and codes the video data in order to acquire the video data comprising the watermark; a stream media processing module for storing the video data comprising the watermark and output by the watermark embedding module and transferring the video data in accordance with a connection request from a client side. The invention also comprises a corresponding client and a stream media visible watermark real-time embedding system composed by the server side and the client side. The embodiment of the inventive stream media visible watermark real-time embedding system integrates the digital watermark with coding of the video data, which accomplishes real-time embedding for the watermark in the process of transmission of the stream media so as to achieve protection and authentication for copyright of the stream media information in the process of visiting.
Owner:TSINGHUA UNIV

P2P (Point-to-Point) streaming media system, P2P user equipment and streaming media data transmitting method

The invention discloses a P2P (Point-to-Point) streaming media system which comprises a source server, a caching server, a streaming media key application server and an IMS (IP Multimedia Subsystem) key network element, wherein the source server stores streaming media contents; the caching server caches streaming media data and sends to P2P user equipment; the streaming media key application server is interacted with the caching server to generate program information, obtains owned streaming media data information and current state information reported by the P2P user equipment through the IMS key network element, and provides corresponding program information and resource information for the P2P user equipment requesting streaming media service; and the IMS key network element accesses the P2P user equipment into an IMS network and controls the connection negotiation among the P2P user equipment, the caching server providing the downloading of the corresponding streaming media data and other P2P user equipment. The invention also provides the P2P user equipment and a streaming media data transmitting method. The invention realizes that the P2P user equipment is accessed into the IMS network through the IMS key network element for controlling the streaming media service.
Owner:CHINA MOBILE COMM GRP CO LTD

Quantum secrete key distribution method based on DPI

The invention discloses a quantum secrete key distribution method based on a DPI. The quantum secrete key distribution method based on the DPI comprises the steps that a DPI analysis module of a system carries out application layer analysis on a network data stream, and service types of various applications are recognized and submitted to an encryption strategy selecting module; the encryption strategy selecting module carries out quantum secrete key encryption or traditional secrete key encryption or selects transparent transmission on services with different safety levels according to priorities; a network transparent transmission or traditional secrete key encryption module carries out unencrypted transparent transmission or carries out encryption based on a traditional encryption algorithm based on algorithm safety; a quantum secrete key encryption module carries out quantum encrypted transmission. According to the quantum secrete key distribution method based on the DPI, network core service flows are distinguished and identified, different service flows are encrypted in a graded mode, a quantum secrete key distribution encryption mode or a traditional encryption mode is selected according to encryption strategies, quantum secrete communication of the core service flow of the network is achieved, and the transmission efficiency of the network services is considered.
Owner:CHANGCHUN UNIV

Support vector machine based classification method of base-band time-domain voice-frequency signal

The invention relates to a support vector machine based classification method of base-band time-domain voice-frequency signals, comprising the following steps of: firstly segmenting a base-band time-domain voice-frequency signal sequence to obtain initial segmented subsequences; then respectively subtracting respective mean value from each initial segmented subsequence to obtain zero-mean-value segmented subsequences; then carrying out windowing treatment on each zero-mean-value segmented subsequence, respectively carrying out Fourier transformation treatment on results to obtain the spectrum amplitudes of the zero-mean-value segmented subsequences, and respectively solving the standard difference of each spectrum amplitude to obtain a characteristic quantity; sequentially combining the zero-mean-value segmented subsequences into a long subsequence according to an order; then calculating a normalized autocorrelation matrix of the long subsequence, and carrying out singular value decomposition on the normalized autocorrelation matrix to obtain a demarcation point of a subspace; then calculating the signal to noise ratio parameter of an other characteristic quantity; and finally sending an input vector composed of the two characteristic quantities into a trained SVM (Support Vector Machine) classifier to identify the classification of base-band time-domain voice-frequency signals and distinguish a voice signal and a noise signal.
Owner:TSINGHUA UNIV

Vehicle insurance loss assessment method, device and equipment based on image recognition and storage medium

The invention discloses a vehicle insurance loss assessment method, device and equipment based on image recognition and a storage medium. The method comprises the steps of obtaining a user video imageof a case reporting user and an on-site video image of an accident vehicle through a self-service video call; Inputting the on-site video image into an accident analysis model for image recognition to obtain vehicle information and vehicle damage information of the accident vehicle; If it is determined that the vehicle insurance case reporting request is valid according to the historical case reporting information of the accident vehicle, performing micro-expression recognition on the user video image by using a micro-expression recognition model to obtain a comprehensive emotion score of theuser video image; And if the comprehensive emotion score satisfies a preset score threshold requirement, determining a damage assessment result of the accident vehicle according to the vehicle damageinformation. According to the technical scheme, automatic loss assessment is achieved, manual intervention is not needed, the vehicle insurance processing efficiency and timeliness are improved, theauthenticity of vehicle insurance reporting is effectively identified, the risk of false video reporting is reduced, and the insurance processing accuracy is improved.
Owner:PING AN TECH (SHENZHEN) CO LTD

Six-flavor hematinic capsule, its quality control method and application thereof

The invention discloses a six-flavor hematinic capsule, its quality control method and an application thereof. The six-flavor hematinic capsule is prepared by adding auxiliary materials into raw materials consisting of Chinese angelica, Ligusticum wallichii, Radix Astragali, prepared rehmannia root, lithospermum and white peony root. According to the quality control method of the six-flavor hematinic preparation, whether the six-flavor hematinic capsule contains white peony root, Chinese angelica, Radix Astragali, prepared rehmannia root, lithospermum, Ligusticum wallichii and components is identified by thin layer chromatography; by high-performance liquid chromatography, in vitro dissolution behavior of the six-flavor hematinic capsule is determined, and effective component groups are identified by fingerprint; verbascoside and calycosin glucoside are used as reference substances to simultaneously determine contents in the six-flavor hematinic capsule; and the content of a volatile component ligustilide in the six-flavor hematinic capsule is determined by a gas chromatographic method. The method provided by the invention is simple to operate, is accurate and advanced, has good linear relation, reappearance, precision, stability and recovery rate, can be adopted to effectively control product quality and guarantee curative effect of the product. The invention also provides an application in the preparation of a medicine for treating eye damage and blurred vision.
Owner:GUANGDONG GUOYUAN GUOYAO PHARMA CO LTD

Automatic access control system based on real-time geographic coordinates, and door opening method

The invention discloses an automatic access control system based on real-time geographic coordinates, and a door opening method. The automatic access control system based on the real-time geographic coordinates comprises a two-dimensional code display unit, a WeChat platform, resident mobile terminals, an official account cloud server, a residential community doorphone and unit doorphones; the communication between the official account cloud server and the resident mobile terminals can be realized by using the resident mobile terminals to concern the access control cloud service WeChat official account. According to the related door opening method, a resident scans an access control two-dimensional code of a residential community door, so that the identity of the resident can be verified; if the resident passes through verification of identity, the residential community door can be opened, and a unit door can be automatically opened when the resident gets close to the unit door. According to the automatic access control system and the door opening method, the resident only needs to be verified for once at the residential community door and then does not need to be verified anymore, so that the door opening of the resident is facilitated.
Owner:XIAMEN DNAKE INTELLIGENT TECH CO LTD

Coin distinguishing apparatus and its method for distinguishing

The invention relates to a coin identifying or discriminating device and method, especially relating to the discrimination of the true coins from the false coins. The method vertically slides the tested coin along a guiding groove down onto a substrate, collects a sound signal emitted by the coin as striking the substrate through sound sensor, directly sends the sound signal or sends the sound signal amplified by a power amplifier to a frequency spectrum analyzing device for making frequency spectrum analysis so as to obtain an inherent frequency of the tested coin, and compares the inherent frequency with a standard data in a frequency spectrum standard memory for making frequency spectrum discrimination; then uses a pressure sensor to measure the weight of the tested coin and sends the generated force signal amplified by a power amplifier into a weight analyzing device and calculates to obtain the weight of the tested coin and compares it with a standard data in a weight standard memory for making weight discrimination; then by an operational policy maker, synthetically analyzes and obtains the final discrimination result. The discriminating device has simple structure, lower manufacturing cost, and high identifying accuracy, applied to identification of various coins and having a wide application prospect.
Owner:UNIV OF SCI & TECH OF CHINA

Biological identity authentication and payment system based on hand vein identification and identity authentication method

A biological identity authentication and payment system based on hand vein identification and an identity authentication method are disclosed. A palm vein acquisition unit and a display interaction unit are included and are connected through a data line. The palm vein acquisition unit comprises a hand vein palm holding body, a lens module group, an image sensor, an infrared light emitting diode array, a light intensity sensor, a controller, a data storage unit, an encryption chip, and a communication interface which is connected with the display interaction unit. The electrical connection relationship of the palm vein acquisition unit is that the image sensor, the infrared light emitting diode array, the light intensity sensor, the data storage unit, the encryption chip, and the communication interface are connected with the corresponding interfaces of the controller respectively. The system and the method have advantages that a user only needs to register one-time hand vein information and bind a personal payment account to a hand vein identification biological identity authentication device for one time so that the binding of personal property account information and personal biological authentication information can be completed; and compared with other biological identification technology, the technology in the invention possesses high safety.
Owner:DEEPBLUE TECH (SHANGHAI) CO LTD

Device and method for on-line rapid analysis of volatile organic compound

The invention discloses a device and method for on-line rapid analysis of a volatile organic compound. The device comprises a film sample feeding device, a film heating device, a vacuum ultraviolet light single-photon ionization source, a focusing electrode assembly, a digital linear ion trap, an ion detection device, a data collecting device, a central control unit and the like. According to the device and method for on-line rapid analysis of the volatile organic compound, the vacuum ultraviolet light single-photon ionization source is adopted, a molecular ion peak is mainly generated after sample molecules are ionized, a spectrogram is greatly simplified, and the vacuum ultraviolet light single-photon ionization source is combined with the digital linear ion trap with the second-level mass spectrum function so that the compound can be rapidly and accurately analyzed and the components of a complex sample can be rapidly analyzed and identified; in addition, a silicon rubber film structure is used without the requirement for complex sample pretreatment, the responding time is short, sample feeding is rapid, and the device and method satisfy the requirement for on-line analysis. The device and method for on-line rapid analysis of the volatile organic compound can be widely applied to the technical field of analytical instrument detection.
Owner:KUSN HEXIN MASS PECTRUM TECH +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products