Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

82results about How to "Reduce the likelihood of an attack" patented technology

NFC (Near Field Communication) transmission method based on biometric feature recognition

The invention relates to an NFC (Near Field Communication) transmission method based on biometric feature recognition. A fingerprint recognition sensor is integrated into a mobile terminal, and is functionally combined with an NFC module and a Bluetooth module. The method comprises the following steps: acquiring the fingerprint information of a user by using the fingerprint recognition sensor; deciding whether the NFC module is permitted to be started or not according to the authentication result of the fingerprint recognition sensor; if an NFC function is permitted to be started according to authentication, further judging a system task; if an NFC payment activity is performed, fully handing over a task for exchanging payment information to the NFC module for finishing by a system; if the system performs data exchange activities such as tag reading / writing, starting the NFC module, rapidly activating a Bluetooth module by using the NFC module, establishing a Bluetooth transmission link, and handing over a data transmission task to the Bluetooth module for processing. By adopting the NFC transmission method, the security of payment activities and data exchange is ensured, meanwhile links are established among terminals, and the data transmission speed is increased.
Owner:NANJING UNIV OF POSTS & TELECOMM

Method and system for connecting incoming call to Bluetooth headset

The invention provides a method for connecting an incoming call to a Bluetooth headset, which comprises the following steps: S1, when a calling request from a calling mobile phone is received, a prompt message of whether the Bluetooth headset needs to be connected is output; S2, a receiving user inputs the connection order of connecting to the Bluetooth headset according to the prompt message, and starts a Bluetooth module according to the connection order to search the matched Bluetooth headset and display a matching result; and S3, the target Bluetooth headset selected from the matching result by the user is acquired, communication connection between the incoming call and the target Bluetooth headset is established, and after the connection is succeeded, communication with the calling mobile phone is carried out through the target Bluetooth headset. The invention also provides a system for connecting the incoming call to the Bluetooth headset. According to the method for connecting the incoming call to the Bluetooth headset, a user does not need to hang up the incoming call when answering the incoming call and directly communicates with the calling mobile phone through the searched target Bluetooth headset, the user experience is greatly improved, and the operation is very convenient.
Owner:BYD CO LTD

Method for improving safety of Web service

The invention discloses a method for improving the safety of Web service, which comprises the following steps: generating a request data packet comprising a first message digest generated by encrypting a user password by using a hash algorithm at a client side, and sending the data packet into a server side; using the hash algorithm to encrypt the stored user password by the service side, and generating a second message digest; comparing the first message digest with the second message digest by the server side, generating and storing a session identifier if the first message digest and the second message digest are same, using a symmetric encryption algorithm to encrypt the session identifier by taking the stored user password as a secret key, and sending the session identifier to the client side; using the symmetric encryption algorithm to decrypt the session identifier by taking the user password as the secret key by the client side to obtain a plaintext of the session identifier, and using the plaintext of the session identifier to send a session request to the server side; firstly judging whether the session identifier which is same as the session identifier in the session request exists or not in a memory by the service side, processing the session request and eliminating the session identifier if so, and returning a processing result.
Owner:深圳市励拓软件有限公司

Vehicle unlocking method based on Bluetooth communication protocol

The invention discloses a method for unlocking and locking a vehicle door on the basis of a Bluetooth communication protocol and belongs to the technical field of shared automobiles. Use scenes of a rent car and a private car are both taken into consideration so that the vehicle management safety is also taken into consideration while convenience is brought to a driver / borrower. The method for unlocking and locking the vehicle door on the basis of the Bluetooth communication protocol comprises the steps of S1, establishing binding of a vehicle-mounted terminal, a vehicle and a Phone APP; S2, logging in the Phone APP to transmit a car booking request, and enabling a TSP to receive reserve information to generate a digital key and transmit the digital key to the Phone APP and the vehicle-mounted terminal; S3, finding a car, performing communication connection through a Bluetooth, executing an unlocking instruction, unlocking the vehicle door after authentication, and otherwise, failing to unlock the vehicle door; and S4, performing secondary authentication through a PIN code; after successful authentication, activating a vehicle physical key and starting a vehicle; and otherwise, enabling the vehicle to be unable to start.
Owner:恒大新能源汽车(天津)有限公司

Intelligent selecting method of account keeping nodes

The invention discloses an intelligent selecting method of account keeping nodes, and relates to the field of block chains, virtual currency and artificial intelligence. The method comprises the stepsthat step one, node capacity value of each account keeping node is calculated based on block data; step two, threshold values of the node capacity value of each node are counted; step three, part ofaccount keeping nodes are selected randomly after a current account keeping node is determined according to the threshold values to complete node selection. The method aims at solving the problems ofaccount conflict, low account keeping efficiency and energy wasting caused by mining computing conducted by a large number of miners, and preventing the problems of unequal and non-decentralization caused by selecting account keeping nodes by adopting man-made voting; intelligent account keep right or mining right distribution mechanism are adopted based on block data and each dimensional data ofthe miners, hacker attack is prevented by adopting the account keeping right or mining right random distribution, and the problems of energy wasting and low account keeping efficiency caused by miningconflict are solved under the premises of equality, decentralization and safety of the block chains.
Owner:BEIJING EASY AI TECHNOLOGY CO LTD

Mass D2D anonymous discovery authentication and key negotiation method

The invention belongs to the technical field of communication network security, and discloses a mass D2D anonymous discovery authentication and key negotiation method. The method includes an initialization authentication stage; an anonymous device discovery stage based on prefix encryption; a mutual authentication and key negotiation stage based on batch verification; and a key confirmation stage.According to the scheme design carried out according to the 3GPP standard, communication equipment in the standard does not need to be changed, and the method can be applied to networks of all LTE-A / 5G mobile scenes; the general structure of the equipment discovery and authentication mechanism provided by the invention can realize discovery, mutual authentication, key negotiation and identity privacy protection of adjacent equipment; according to the rapid key confirmation method based on the CRT mechanism provided by the invention, the signaling number is effectively reduced; the signaling overhead, the communication overhead and the transmission overhead are reduced; direct mutual authentication between a large number of D2D devices can be directly realized, and all known attacks at present can be resisted.
Owner:GUANGDONG OPPO MOBILE TELECOMM CORP LTD

Payment method and system for mobile terminal

The invention discloses a payment method and system for a mobile terminal, and the method comprises the steps: selecting the number of articles in a vending machine, and generating the amount of money through the vending machine according to the number of articles; generating an identification code comprising the information of money, and a transaction random code through the vending machine; enabling the mobile terminal to scan the identification code, so as to transmit payment information to a money-receiving server; returning a confirmation code to the mobile terminal after the money-receiving server receives the payment information; and enabling the mobile terminal to receive the confirmation code and display the conformation code. The vending machine scans the displayed confirmation code, and enables the transaction random code to be matched with the confirmation code. If the matching is successful, the article is sold. The beneficial effects of the invention are that the vending machine does not need to be connected with an Ethernet, thereby saving the networking cost, reducing the possibility of being attacked by network hackers, and improving the safety and reliability; the method and system achieves payment through a wireless network of the mobile terminal, thereby effectively saving the payment cost of the vending machine and management and maintenance cost of the vending machine, facilitating the payment, and optimizing the user experience.
Owner:SHANXI LANGZHONG INFORMATION TECH CO LTD

Classified net-cage fish cultivating method

The invention discloses a classified net-cage fish cultivating method. The method comprises the following steps: 1, providing an inner net cage and an outer net cage, wherein the inner net cage is positioned at one corner of the outer net cage, the mesh diameters of a top wall and a bottom wall of the inner net cage are 3 to 7cm, four side walls are watertight, the inner net cage is partitioned into three layers of box bodies through two interlayer plates, the mesh diameter of the first interlayer plate from top to bottom is 0.2 to 0.3cm, and the mesh diameter of the second interlayer plate is 1 to 2cm; 2, stocking fish fries in the outer net cage; 3, when the chest circumference of each fish fry does not reach the mesh diameter of the inner net cage, adding fish feeds into the inner net cage, when the chest circumference of a certain fish fry exceeds the mesh diameter of the inner net cage, adding the feeds into the outer net cage for 20 to 30min firstly, then adding the feeds into the inner net cage for 2 to 3min, and pumping water by using a water pump every day, so that water flow which flows from top to bottom is formed in the inner net cage. According to the classified net-cage fish cultivating method, fishes of different body types can be effectively separated, and the possibility that smaller fishes are attacked is reduced.
Owner:谢元莲

Mobile user position privacy protection method for avoiding attacks performed through circular region overlapping parts

The invention provides a mobile user position privacy protection method for avoiding attacks performed through circular region overlapping parts, and relates to the field of position privacy protection. The method comprises the following steps that: firstly, a user sends a request Q (a current position of the user, the number of query results and the like) to intermediate proxy equipment; the intermediate equipment converts a real position of the user into a circular region, specifies a value which is greater than a confidence level needed by the user and the number of query results, and sends a request Q' to an LBS (Location Based Service) server provider; an LBS finds points of interest satisfying a condition with a query processing method, puts the points of interest satisfying the condition into a set V', and returns the V' to the intermediate equipment; and the intermediate equipment screens the V', and returns a screening result to the user. Through adoption of the method, the attacks performed through the circular region overlapping parts are effectively avoided when the user queries a server, and the position privacy of the user can be protected more accurately. The mobile user position privacy protection method is suitable for protecting privacy of the user position when the user queries surrounding points of interest.
Owner:NANJING UNIV OF INFORMATION SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products