Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

49results about How to "Reduce the Risk of Misappropriation" patented technology

Automobile keyless entry and starting system based on face recognition

The invention relates to an automotive electronic technology, and discloses an automobile keyless entry and starting system based on face recognition. The automobile keyless entry and starting systemcomprises an image collecting unit, a face recognition chip and a BCM controller; and through the face recognition chip, a face image, obtained by the image collecting unit, of a current automobile user and a pre-saved face image of a legal automobile user are subjected to feature comparison to conduct identity verification on the current automobile user, a corresponding triggering instruction issent to the BCM controller after verification is passed to unlock a central lock, an electronic steering column lock and an engine anti-theft locking system of an automobile through the BCM controller, and thus keyless entry and starting of the automobile are achieved. Through the technical scheme, an automobile owner can enter and start the automobile without relying on an intelligent key, and thus the convenient and worriless effects are achieved; and meanwhile through the technical scheme, the purpose of conducting identity verification on the current automobile user is also achieved, and thus the risk that the automobile is embezzled is lowered.
Owner:深圳市赛格车圣科技有限公司

Method and system for reducing stealing risk of electric vehicle charging identity certificate

The invention discloses a method and a system for reducing the stealing risk of an electric vehicle charging identity certificate. The method comprises the following steps: (1) data acquisition: acquiring the charging identity certificate and vehicle data, processing the charging identity certificate and the vehicle data by a central system, and processing and extracting to form vehicle characteristic information; (2) binding and charging: enabling the central system to inquire vehicle characteristic information bound with the charging identity certificate from a persistent data storage device, if the vehicle characteristic information is empty, binding the currently collected vehicle characteristic information with the current charging identity certificate, and storing the binding relationship in the persistent data storage device for subsequent inquiry; if the vehicle characteristic information bound with the charging identity certificate is inquired, comparing the inquired vehicle characteristic information with the currently collected vehicle characteristic information for verification, if the verification passes, enabling the central system to indicate a charging pile system to start/continue charging, otherwise, the charging is refused/the charging is stopped immediately/an electric vehicle owner is notified to confirm whether to continue the charging or not.
Owner:BEIJING X CHARGE TECH CO LTD

Method and system for encrypting, hiding and discovering of WIFI access point

The invention discloses a method and a system for encrypting, hiding and discovering of a WIFI access point. The method comprises steps of generating a first public key and a first private key, wherein the first public key is positioned in an AP, and placing the first private key in an STA, B generating a second public key and a second private key, wherein the second public key is added into a management frame, and utilizing the first public key to encrypt the frame body which is transmitted to the STA, C using the first private key to decrypt the encryption to find the AP by the STA and storing the second public key, D using the second public key to transmit the following-up management frame to the AP by the STA, using the second private key to perform decryption on the following-up management frame by the AP, using the first public key to transmit the following- up management frame to the STA by the AP, and using the first private key to perform decryption on the received following-up management frame by the STA. The invention utilizes the asymmetric encryption algorithm to perform encryption on the STA and the AP management frame, only the STA has the correct private key to decrypt the management frame and find the existence of the AP so as to hide the visibility of the AP toward the illegal user and thus reduce the risk that the AP can be stolen.
Owner:TCL CORPORATION

Electronic signature implementation method based on state grid security technology architecture

The invention discloses an electronic signature implementation method based on state grid security technology architecture, which comprises the following steps: acquiring user information containing auser identity, applying to an authentication institution for verifying the user identity according to the user information, and generating a user key pair for a user through a power intranet encryption machine; binding the user information with a private key in the user key pair, and carrying out segmentation processing on the private key; submitting user information to an authentication institution through a power extranet signature server, generating a user digital certificate based on the user information, and encrypting and storing the user digital certificate; a to-be-signed file uploaded by a user is obtained through a power extranet signature server, after the identity of the user is confirmed according to a user digital certificate, a segmented private key is called, and a complete user private key is obtained through a synthesis algorithm; and digital signature operation is completed according to the complete user private key. And the security and reliability of the electronic signature system are improved by encrypting and storing the user private key segment by segment, and the risk of stealing the private key is reduced.
Owner:ZHEJIANG HUAYUN INFORMATION TECH CO LTD

Public payment security protection system based on artificial intelligence

The invention relates to a public payment security protection system based on artificial intelligence, in particular to the technical field of payment security, and the system comprises a collection module which is used for collecting the transaction information and transaction environment information of a first interaction body and the credit information of a second interaction body in real time; the storage module is used for storing transaction records of the first interaction main body and is connected with the acquisition module; the analysis module is used for analyzing the transaction security of the first interaction main body and the second interaction main body, is connected with the acquisition module, and is also used for judging the security of the transaction environment of the first interaction main body according to the transaction position of the first interaction main body; the judgment module is used for carrying out transaction safety judgment according to the safety analysis result and is connected with the analysis module; and the alarm module is used for carrying out corresponding transaction early warning according to the transaction security judgment result and is connected with the judgment module. According to the invention, the transaction security of public payment is effectively improved.
Owner:湖南三湘银行股份有限公司

Dynamic identity authentication method and device, server and storage medium

The embodiment of the invention discloses a dynamic identity authentication method and device, a server and a storage medium. The method comprises the steps of obtaining user agent information in an identity authentication request corresponding to a login behavior, obtaining corresponding trust scores and weight values, and calculating a total score of the identity authentication request; if the total score is lower than a trust threshold, triggering an authentication mode corresponding to a score segment to which the total score belongs; updating the trust score of each dimension in the user agent information according to the authentication result and a preset score adjustment model, and recalculating the total score according to each adjusted trust score and the corresponding weight value, wherein the score adjustment model is used for indicating configuration information for adjusting the trust score of each dimension in the user agent information according to the authentication result; and determining an identity authentication result of the login behavior according to a comparison result of the recalculated total score and the trust threshold and the authentication result. According to the embodiment of the invention, dynamic identity authentication is carried out on the login behavior, so that the security of identity authentication is improved.
Owner:北京指掌易科技有限公司

Method, system and server for hosting data access of static website

A method for hos data access to a static web site includes receive an input uniform resource locator; Parsing the uniform resource locator to obtain a first encryption character and data to be encrypted; Calculating a second encryption character according to the data to be encrypted by using a preset secret key; Judging whether the first encryption symbol and the second encryption symbol are identical; If so, the resource corresponding to the uniform resource locator is accessed. The present application determines whether the second encryption symbol calculated by the system according to the preset secret key and the data to be encrypted is the same as the received first encryption symbol, If the resource corresponding to the uniform resource locator is accessed again, if the resource corresponding to the uniform resource locator is not accessed again, the access is not allowed, the permission control of the hosted data access of the static website is realized, and the risk of the dataembezzlement of the static website is reduced. At that same time, the application also provide a system, a server and a computer-readable storage medium for hos data access to a static web site, which has the above beneficial effects.
Owner:GUANGDONG INSPUR BIG DATA RES CO LTD

New material technology transfer service management system

The invention discloses a new material technology transfer service management system. The system comprises a client terminal, the output end of the client terminal is electrically connected with a data service; wherein the output end of the data service is electrically connected with a login module, the output end of the login module is electrically connected with a client data receiving module, the output end of the client data receiving and transmitting module is electrically connected with a server data receiving and transmitting module, and the output end of the server data receiving and transmitting module is electrically connected with a central server. According to the invention, the client data receiving and transmitting module, the server data receiving and transmitting module andthe short message are arranged; an account number and a password can be sent to the central server when a client logs in; and then the central data server sends a short message of a verification codeto the client terminal to prove that the logger is the owner, so that the risk of client information theft is reduced, the patent security of the client is higher, and the client patent is preventedfrom being illegally purchased and sold by a theft crime.
Owner:河南仙于山环保科技有限公司

Method, system and device for dynamically generating authentication code based on cdma

The invention discloses a method, system and device for dynamically generating an authentication code based on CDMA. The method includes the steps of: the mobile station and the authentication center randomly share security information according to the IMSI International Mobile Subscriber Identity Code, the ESN electronic serial number and the RANDSSD respectively. The data uses the MD5 algorithm to generate a private key; the mobile station and the authentication center use the DH algorithm to generate a public key according to their respective private keys; the mobile station and the authentication center exchange the public key with each other to obtain the other party's public key ; The mobile station and the authentication center use the DH algorithm to generate the authentication code according to their respective private keys and the public key of the other party. Therefore, the present invention dynamically generates an authentication code during the interaction process between the mobile station and the authentication center, and uses the dynamically generated instead of the fixed authentication code to perform authentication, which greatly reduces the risk of the authentication code being stolen, and greatly improves the authentication efficiency. security of rights.
Owner:高新兴物联科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products