Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

32results about How to "Realize real-name authentication" patented technology

Identity recognition method and system based on multi-biometric feature in combination with device fingerprint

The present invention discloses an identity recognition method and system based on a multi-biometric feature in combination with a device fingerprint. The method comprises two main steps of registration authentication and user identification, and the system comprises a smart phone, a storage server and an authentication server; the smart phone is connected with an input end of the storage server, and an output end of the storage server is connected with the authentication server; and the smart phone is interconnected with the authentication server. The method disclosed by the present invention comprises two main sections of the registration authentication and the user identification, and by means of iris local authentication, the two main sections can confirm that an operator of a phone is an owner of the phone; human face information acquired at the same time as the iris local authentication can be confirmed as human face information of the owner of the phone, thereby ensuring accuracy of registered user information. According to the method and the system disclosed by the present invention, a smart phone iris recognition technology and a smart phone device fingerprint technology are combined, so that effects of network real person and real name authentication as well as high network account security and login convenience and the like are achieved.
Owner:SHANGHAI CHUANZHI FINANCE INFORMATION SERVICE CO LTD

Block chain real-name participating method and system

The invention provides a block chain real-time participating method and system. The method comprises the following steps: performing initial authentication according to an authentication video by a participating node; verifying whether a user certificate image is matched with a living user by a mining node after the initial authentication is passed, and verifying whether the user certificate information is matched with user basic information if the user certificate image is matched with the living user, wherein the user certificate image and the user certificate information are acquired and authenticated by the public security Bureau; if the user certificate information is matched with user basic information, computing the time difference between the video recording time and the receivingtime, and determining a fact that the real-name authentication of the application user is passed if the time difference satisfies the preset time range; and writing the block into a block chain into an account book if an invalid broadcast message is unreceived. Therefore, the real-name authentication of the node in the block chain is realized based on the user related information provided by the public security bureau, the accuracy of the real-time authentication is guaranteed; the node in the block chain network is corresponding to the real user identity in the reality, thereby facilitating the node management and block chain legality maintenance.
Owner:全链通有限公司

Artificial intelligence epidemic situation big data prevention and control early warning system

The invention discloses an artificial intelligence epidemic situation big data prevention and control early warning system, which comprises a terminal service platform, a plurality of information acquisition modules connected to the terminal service platform, and switches respectively connected between the plurality of information acquisition modules and the terminal service platform and used forbidirectional communication. According to the invention, face-body temperature-cardiopulmonary multi-mode recognition and intelligent analysis are carried out on a person, so that a traditional singleinfrared temperature measurement mode is broken through, non-contact accurate temperature measurement, cardiopulmonary signal measurement and abnormal alarm are achieved, screening, detection and alarm are mainly conducted on current corona virus disease 2019 patients, especially patients without symptoms, the screening work pressure of key public places can be greatly relieved, and the detectionprobability of suspected persons is increased; and an AI mathematical model algorithm is adopted, so that the system has the data deep mining capability, can perform deep learning by utilizing a neural convolutional network, can predict the epidemic situation development trend, and generates the epidemic situation monitoring and troubleshooting standard in real time.
Owner:梁步阁

Business outlet Internet WIFI access system and method thereof

The invention discloses a business outlet Internet WIFI access system and a method thereof. The system comprises a plurality of intelligent terminals, a self-service terminal, a background server, an operator certification server, a database server, a Portal server and a gateway. The self-service terminal is connected with the background server through a bank internal special network. The background server is connected with the operator certification server through a network special line. The operator certification server is respectively connected with each intelligent terminal through a WIFI network. The WIFI network is connected with the Internet, the operator certification server and the Portal server through the gateway. The business outlet Internet WIFI access system is provided with real name authentication and Internet behavior tracing functions, bank self-service equipment and the operator certification server are organically combined, combined with bank customer resource information, the safety of a bank network and the high efficiency and flexibility of an Internet environment provided by an operator are taken into consideration at the same time, and a safe Internet environment is provided for customers.
Owner:中国农业银行股份有限公司四川省分行

Identification method and system based on multiple biological features combined with device fingerprints

The present invention discloses an identity recognition method and system based on a multi-biometric feature in combination with a device fingerprint. The method comprises two main steps of registration authentication and user identification, and the system comprises a smart phone, a storage server and an authentication server; the smart phone is connected with an input end of the storage server, and an output end of the storage server is connected with the authentication server; and the smart phone is interconnected with the authentication server. The method disclosed by the present invention comprises two main sections of the registration authentication and the user identification, and by means of iris local authentication, the two main sections can confirm that an operator of a phone is an owner of the phone; human face information acquired at the same time as the iris local authentication can be confirmed as human face information of the owner of the phone, thereby ensuring accuracy of registered user information. According to the method and the system disclosed by the present invention, a smart phone iris recognition technology and a smart phone device fingerprint technology are combined, so that effects of network real person and real name authentication as well as high network account security and login convenience and the like are achieved.
Owner:SHANGHAI CHUANZHI FINANCE INFORMATION SERVICE CO LTD

Detection and maintenance evaluation system based on JSP development

PendingCN111260247AReasonable allocation settingsVersatilityResourcesSoftware engineeringVerification
The invention discloses a detection and maintenance evaluation system based on JSP development, relates to the technical field of databases, and aims at solving the problems that an existing detectionand maintenance evaluation system does not have a set of relatively complete scoring system, the scoring standard difference between different devices is relatively large, and the universality is low. The starting output end is connected with the input end of the login interface; the input end of the login interface is connected with the input end of the identity verification module; the identityverification module is connected with the page starting module when verification succeeds; the identity verification module is connected with the counting module when verification fails; the output end of the page starting module is connected with the input end of the authority verification module; the authority verification module is connected with the administrator page when verification succeeds, the authority verification module is connected with the participant page when verification fails, the output end of the administrator page and the output end of the participant page are both connected with the exit verification module, and the exit verification module is connected with the end when confirmation succeeds.
Owner:南京米好信息安全有限公司

Public security management lock and system based on identity card unlocking and using method thereof

The invention belongs to the technical field of intelligent door locks, and particularly relates to a public security management lock and system based on identity card unlocking and a using method thereof. The system comprises a lock shell, and an upper end unlocking area, a handle and a lower end unlocking area which are sequentially arranged on a front panel of the lock shell from top to bottom.The upper end unlocking area comprises a sliding groove formed in the front panel of the lock shell and a sliding cover arranged on the front panel of the lock shell and matching the sliding groove.The lower end unlocking area comprises a landslide protruding block arranged on the front panel of the lock shell and an identity card recognition area fixedly installed on the landslide protruding block, and a baffle is arranged below the identity card recognition area. A face recognition detector and an identity card recognition module are adopted to perform dual detection on a user, it is guaranteed that unlocking can be performed only after simultaneous detection of a person and an identity card is passed, and therefore it is guaranteed that unlocking can be performed only by a person whocan input unlocking information, and safety accidents are reduced. And a fingerprint identification module is further arranged, so that the user can enter a room under the condition that the identitycard is lost.
Owner:江苏先驰物联网技术有限公司

Mobile social platform interaction control method for LED landscape lighting system

The invention discloses a mobile social platform interaction control method for an LED landscape lighting system. The mobile social platform interaction control method comprises the steps of: a registration step, which is implemented by receiving registration information of a user; an authentication step, which is implemented by performing real-name authentication on the user according to the registration information; a receiving step, which is implemented by receiving content data of the user; a filtering step, which is implemented by determining whether the content data satisfies a display condition and then executing a subsequent step if so; and a display step, which is implemented by displaying the data on a medium according to the content data, wherein the medium comprises the LED landscape lighting system. The mobile social platform interaction control method realizes the real-name authentication of the audiences and simplifies the release and promotion of the LED landscape lighting system, realizes a more convenient and safer public media interaction platform, can effectively control the displayed content interactively published to the outdoor medium, can better filter bad information, and can track a publisher according to the real-name information, thereby realizing more abundant content presentation and safer and more harmonious interaction control of the mobile social platform.
Owner:北京明瑞之光科技有限公司

Blockchain real-name authentication method and system

The invention provides a block chain real-name authentication method and system. The method comprises the following steps: publishing a broadcast message including a real-name registration problem toa block chain network by a founding node; acquiring a real-name authentication request by a participating node, signing the first authentication broadcast message, and then sending to the block chainnetwork; verifying whether a user certificate image is matched with a living user by a mining node, and verifying whether the user certificate information is matched with user basic information if theuser certificate image is matched with the living user; if the user certificate information is matched with user basic information, computing the time difference between the video recording time andthe receiving time, and determining a fact that the real-name authentication is passed if the time difference satisfies the preset time range; and writing the block into a block chain into an accountbook if an invalid broadcast message is unreceived. Therefore, the real-name authentication of the node in the block chain is realized, the node in the block chain network is corresponding to the realuser identity in the reality, the misjudgment on the time in the authentication process is avoided, and the reliability of the real-name authentication is improved.
Owner:全链通有限公司

Real-name system all-in-one card suitable for different crowds

According to the real-name system all-in-one card suitable for different crowds provided by the invention, a plurality of chip card slots are configured, and the card slots selected by the different crowds are different in configuration function, so that customization can be realized according to the function requirements of the different crowds; the card slots comprise a first chip card slot, a second chip card slot, a third chip card slot and a fourth chip card slot. When the Internet of Things chip is placed in the second chip card slot or the third chip card slot, the all-purpose card device achieves basic functions, and the all-purpose card device can be started or lost through the Internet of Things chip. When the Internet of Things chip is placed in the first chip card slot or the fourth chip card slot, the Internet of Things chip is inserted. The all-purpose card device not only realizes basic functions, but also can be connected with a mobile terminal through a data interfaceso as to read data, and can convert the data of the real-name system Internet of Things chip based on the data conversion processor to form a data stream capable of being wirelessly transmitted to theoutside, so that the data stream can be used by the mobile terminal.
Owner:CHINA UNIV OF GEOSCIENCES (BEIJING)

Blockchain real-name participation method and system

The invention provides a block chain real-time participating method and system. The method comprises the following steps: performing initial authentication according to an authentication video by a participating node; verifying whether a user certificate image is matched with a living user by a mining node after the initial authentication is passed, and verifying whether the user certificate information is matched with user basic information if the user certificate image is matched with the living user, wherein the user certificate image and the user certificate information are acquired and authenticated by the public security Bureau; if the user certificate information is matched with user basic information, computing the time difference between the video recording time and the receivingtime, and determining a fact that the real-name authentication of the application user is passed if the time difference satisfies the preset time range; and writing the block into a block chain into an account book if an invalid broadcast message is unreceived. Therefore, the real-name authentication of the node in the block chain is realized based on the user related information provided by the public security bureau, the accuracy of the real-time authentication is guaranteed; the node in the block chain network is corresponding to the real user identity in the reality, thereby facilitating the node management and block chain legality maintenance.
Owner:全链通有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products