Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

55results about How to "Reduce verification times" patented technology

Prediction and optimization method for efficient working condition area range of centrifugal pump impeller

The invention relates to the field of centrifugal pump hydraulic optimization. The invention aims to provide a prediction and optimization method for an efficient working condition area range of a centrifugal pump impeller. According to the method, on the premise that the maximum efficiency point of the centrifugal pump is not changed, factors of energy loss and pressure pulsation of the centrifugal pump impeller are fully considered, an efficient working condition area of the centrifugal pump impeller is accurately predicted, and design parameters of the centrifugal pump impeller are optimized according to the efficient working condition area, so that the application range of the centrifugal pump is expanded, the operation stability of the centrifugal pump is improved, resources are saved, and the centrifugal pump is more economical. According to the technical scheme, the method for predicting and optimizing the efficient working condition area range of the centrifugal pump impeller comprises the following steps of (1) modeling and meshing, (2) CFX simulation verification, (3) vortex structure extraction, (4) energy loss analysis, (5) pressure pulsation analysis, (6) efficient working condition area prediction and (7) centrifugal pump impeller design parameter optimization.
Owner:ZHEJIANG SCI-TECH UNIV

Account verification method and device

The invention discloses an account verification method and device and belongs to the field of network security. The account verification method comprises the following steps of receiving an account verification request sent by a terminal, wherein the account verification request comprises a user account and first identity information of a verification initiator, and the first identity informationcomprises biological verification information and certificate verification information; obtaining second identity information of an account owner of the user account, wherein the second identity information comprises biological authentication information and certificate authentication information; determining whether the verification initiator and the account owner are the same user according to the first identity information and the second identity information; and when the verification initiator and the account owner are the same user, returning a verification success result to the terminal.In the embodiments of the invention, the user only needs to upload the biological verification information and the certificate verification information which do not need to be memorized so as to complete the account verification, and thus the user can be prevented from filling in the verification data according to the memory, and the efficiency and success rate of account verification are improved on the premise of ensuring the security of the account.
Owner:TENCENT TECH (SHENZHEN) CO LTD

Method, device, equipment and system for executing third-party authentication

The invention aims at providing a method, a device, equipment and a system for executing third-party authentication. The method comprises the following steps of: receiving first information to be authenticated from user equipment; when an authentication protocol type does not belong to the authentication protocol type used when network equipment executes authentication, and converting the first information to be authenticated into second information to be authenticated used when the network equipment executes the authentication; authenticating the second information to be authenticated; and feeding authentication result information back to the user equipment. The method, the device, the equipment and the system have the advantages that the application under the network environment with multiple authentication protocol types can be realized, so that the efficiency for executing the third-party authentication is increased; the times for carrying out third-party authentication are reduced, so that the use experience of a user is improved; first network equipment does not need to keep connection with the user equipment all the time and can acquire information related to the authentication process directly according to authentication identifying information, so that the load of the first network equipment is reduced.
Owner:SHANGHAI SYNACAST MEDIA TECH

Blockchain network sniffer, network sniffing method and optimization method

ActiveCN110474818AReduce the number of verificationsIncrease the speed of transmissionFinanceData switching networksData transmissionBlockchain
The embodiment of the invention relates to a blockchain network sniffer, a network sniffing method and an optimization method, the blockchain network sniffer comprises a detection module and a decision arbitration module, the detection module comprises at least one detection node, and the detection node is connected with all nodes in a blockchain network; wherein each detection node is connected with subsets of all the nodes, the subsets connected with the detection nodes are not overlapped, and a combined set of all the subsets is a complete set of all the nodes of the blockchain; the decision arbitration module is composed of an arbitration node and further comprises an arbitration node, and the arbitration node is placed in the blockchain network and connected with all the detection nodes. According to the invention, a quantitative measurement index can be provided for the service data transmission efficiency in the blockchain network. Meanwhile, by means of the network channel of the sniffer, the hop count of data transmission can be reduced, the verification frequency can be correspondingly reduced, and the propagation speed can be increased from a network layer by means of the network channel of the sniffer.
Owner:福州博泉网络科技有限公司

Method and device for determining position change of network equipment, computer equipment and medium

The invention relates to a method and device for determining position change of network equipment, computer equipment and a medium, and belongs to the field of positioning. The method comprises the following steps: receiving a first wireless fingerprint of a first terminal and a first position of the first terminal; if the distance between the first position and a second position corresponding toa target wireless fingerprint in the target fingerprint database is greater than a distance threshold, determining a data acquisition area comprising the first position based on the first position, the target wireless fingerprint being matched with the first wireless fingerprint; acquiring second wireless fingerprints of a plurality of second terminals in the data acquisition area; and determiningthe position change condition of the network equipment based on the number of the wireless fingerprints matched with the first wireless fingerprint in the second wireless fingerprints of the plurality of second terminals. By acquiring the wireless fingerprint of the terminal in the data acquisition area, the verification process is accelerated, the acquisition of useless information is reduced, and the verification efficiency is improved.
Owner:BEIJING SANKUAI ONLINE TECH CO LTD

Identity authentication method, system and device and computer readable storage medium

The invention discloses an identity authentication method, system and device, and a computer readable storage medium, which are applied to an identity authentication node in a block chain. The methodcomprises the steps of: obtaining first hidden identity information and a first encrypted secret sharing share of a to-be-authenticated node in the block chain; obtaining second hidden identity information and a second encrypted secret sharing share of a target number of other nodes in the block chain; based on the first hidden identity information, the first encrypted secret sharing share, the second hidden identity information and the second encrypted secret sharing share, judging whether a preset condition of a preset secret sharing method is satisfied or not; and if the preset condition issatisfied, passing the identity authentication of the to-be-authenticated node. The identity information is hidden, the real identity information of the target node cannot be leaked, anonymous identity authentication can be realized, only the encrypted master key can be obtained after secret recovery is performed on the encrypted secret sharing share according to the preset secret sharing method,and the method security can be ensured; and only one-time verification is needed, so that the efficiency is high.
Owner:INSPUR SUZHOU INTELLIGENT TECH CO LTD

Chip verification auxiliary environment and chip verification system

The invention discloses a chip verification auxiliary environment and a chip verification system. The chip verification auxiliary environment comprises an application scene database used for recordingall application scenes of a chip; a verification scene generation and conversion unit used for automatically generating various to-be-verified verification scenes according to the application scenesand converting formats of all configurations of the verification scenes into languages which can be recognized by the verification environment; a data acquisition and analysis processing unit used for generating a random seed and acquiring a verification result of a verification scene in the verification environment; a scene configuration unit which selects a verification scene according to the random seed, and sends each configuration of the verification scene to the verification environment for verification of the verification scene. According to an auxiliary environment, all verificationscenes can be automatically generated according to settings and converted into languages which can be recognized by the verification environment; the verification environment setting accuracy and thechip verification speed are greatly improved, and the chip development progress is accelerated.
Owner:ZHUHAI HUGE IC CO LTD

Mobility management entity, mobile terminal, controlled parameter transmission system and controlled parameter transmission method

The invention provides a mobility management entity, a mobile terminal, a controlled parameter transmission system and a controlled parameter transmission method. The method includes the following steps: a transmission message is generated and transmitted to the mobile terminal, and a controlled parameter, a verification parameter and a first authentication parameter are carried by the transmission message; a response message fed back by the mobile terminal is received; after the response message is received, an acknowledgement message is fed back to the mobile terminal. By implementing the invention, the MME (mobility management entity) adds the controlled parameter, the verification parameter and the first authentication parameter into the same transmission message, and transmits the transmission message to the UE (user equipment), the UE feeds back the response message to the MME after verifying the transmission message, the MME transmits the acknowledgement message to the UE after receiving the response message, and thereby the transmission of the controlled parameter is complete by means of three times of information interaction; compared with the conventional controlled parameter transmission method, the flow is simplified.
Owner:YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD

Mobile management device, mobile terminal, transmission system and method for controlled parameters

The invention provides a mobility management entity, a mobile terminal, a controlled parameter transmission system and a controlled parameter transmission method. The method includes the following steps: a transmission message is generated and transmitted to the mobile terminal, and a controlled parameter, a verification parameter and a first authentication parameter are carried by the transmission message; a response message fed back by the mobile terminal is received; after the response message is received, an acknowledgement message is fed back to the mobile terminal. By implementing the invention, the MME (mobility management entity) adds the controlled parameter, the verification parameter and the first authentication parameter into the same transmission message, and transmits the transmission message to the UE (user equipment), the UE feeds back the response message to the MME after verifying the transmission message, the MME transmits the acknowledgement message to the UE after receiving the response message, and thereby the transmission of the controlled parameter is complete by means of three times of information interaction; compared with the conventional controlled parameter transmission method, the flow is simplified.
Owner:YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD

A method, device, device and system for performing third-party authentication

The invention aims at providing a method, a device, equipment and a system for executing third-party authentication. The method comprises the following steps of: receiving first information to be authenticated from user equipment; when an authentication protocol type does not belong to the authentication protocol type used when network equipment executes authentication, and converting the first information to be authenticated into second information to be authenticated used when the network equipment executes the authentication; authenticating the second information to be authenticated; and feeding authentication result information back to the user equipment. The method, the device, the equipment and the system have the advantages that the application under the network environment with multiple authentication protocol types can be realized, so that the efficiency for executing the third-party authentication is increased; the times for carrying out third-party authentication are reduced, so that the use experience of a user is improved; first network equipment does not need to keep connection with the user equipment all the time and can acquire information related to the authentication process directly according to authentication identifying information, so that the load of the first network equipment is reduced.
Owner:SHANGHAI SYNACAST MEDIA TECH

Emergency epidemic prevention system capable of switching modes

The invention discloses an emergency epidemic prevention system capable of switching modes, and particularly relates to the field of building construction, which comprises an access control system server, an access control unit, an emergency epidemic prevention system, a security monitoring system and a mode switching control system, the access control system server is internally provided with a two-dimensional code recognition system for scanning health codes, a color recognition system for distinguishing image color data, a voice interaction system for voice interaction and an access control data storage system for storing user data; the entrance guard master control system is used for controlling entrance guard recognition and opening and closing; and the emergency anti-epidemic equipment control system is used for controlling emergency anti-epidemic equipment. According to the invention, by designing the emergency epidemic prevention system and the mode switching control system, the security and protection system of the community has a function of cooperating with epidemic prevention work, and by designing the security and protection monitoring system, the field condition at the entrance guard is fed back to the entrance guard system server in real time, and an instruction signal from the entrance guard system server is received.
Owner:豪越科技有限公司

Propositional logic correcting method based on representative model

The invention relates to a propositional logic correcting and calculating method based on a representative model, comprising the following steps: (1) initiating a result set Lambda, accepting a set Sigma, a system set Gamma and a new representative model list (New Model List); (2) initiating a representative model list (Model List) by using all representative models of Sigma; (3) if the system set Gamma is an empty set, turning to step (8); (4) taking out and deleting a proposition A from Gamma; (5) constructing an alternative representative model set Prop Model of A by using A, Sigma and Model List; (6) carrying out verification to A by all alternative representative models in Prop Model one by one: if an alternative representative model M leads A to be true, storing M into New Model List; (7) if New Model List is not an empty set, assigning a value to Model List by using New Model List, resetting New Model List to be the empty set, storing A into Lambda and Sigma respectively, and turning to step (3); and if New Model List is an empty set, directly turning to step (3); and (8) outputting the result Lambda. In the method, the representative model is constructed according to every proposition condition in the system set, and a method for only verifying related models is used so as to reduce the checking times of models, thus improving the efficiency of correction and calculation.
Owner:BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products