Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

32results about How to "Safety verification" patented technology

Multi-mode biological characteristic authentication device and system

The present invention discloses a multi-mode biological characteristic authentication device which is provided with a first fingerprint sensing module, a second fingerprint sensing module, a palm print sensing module, an information receiving unit and a prompting unit. The first fingerprint sensing module is used for acquiring first fingerprint information of an index finger, a middle finger, a ring finger and/or a little finger of a user; the second fingerprint sensing module is used for acquiring fingerprint information of a thumb of the user; the palm print sensing module is used for acquiring palm print information of the user; the information receiving unit is used for receiving the first fingerprint information from the first fingerprint sensing module, the second fingerprint information from the second fingerprint sensing module and the palm print information from the palm print sensing module and determining whether the information is synchronously and correctly acquired; and if the information is synchronously and correctly acquired, correct acquisition prompt information is sent out by the prompting unit. According to the present invention, the identity can be authenticated better; reliability is high; difficulty and complexity in counterfeiting of biological characteristics of a human body are improved; and safety of the system is improved.
Owner:河南华辰智控技术有限公司

Cash business processing method and system based on accounting and cashier separation

The invention discloses a cash business processing method and a system based on accounting and cashier separation. The method includes the following steps: (1) receiving a cash business request of a user; generating account transaction information and cashier operation information according to the cash business request, wherein the cashier operation information has an associated transaction verification certificate attached; and reading the cashier operation information and verifying the transaction verification certificate, and performing a cash withdrawal operation if the transaction verification certificate passes verification; and (2) acquiring a cash depositing operation of a customer; generating cashier operation information according to the cash depositing operation, wherein the cashier operation information has an associated transaction verification certificate attached; and reading the cashier operation information and verifying the transaction verification certificate, and generating account transaction information if the transaction verification certificate passes verification. Lower counters can share one piece of cash processing equipment to handle cash business under the premise that the existing low-counter system of banks is not transformed.
Owner:南京合荣欣业金融软件有限公司

Real-name verification gate and application method thereof

The invention relates to a real-name verification gate and an application method thereof. The real-name verification gate is characterized by comprising a real-name verification system, a gate systemand a power supply, wherein the real-name verification system comprises a camera, a card reader, a two-dimensional code scanner, a display screen, a power amplifier horn, a loudspeaker and an industrial personal computer, the camera, the card reader, the two-dimensional code scanner, the display screen, the power amplifier horn, the loudspeaker and the industrial personal computer are arranged onthe gate system, the industrial personal computer is electrically connected with the camera, the card reader, the two-dimensional code scanner, the display screen and the power amplifier horn, the power amplifier horn is further electrically connected with the loudspeaker, the industrial personal computer is used for verifying whether information of a current user is qualified or not by a human face identification algorithm, the gate system is electrically connected with the industrial personal computer, the gate system is used for automatically opening a gate or warning according to a verification result sent from the industrial personal computer, and the power supply is used for supplying power to each electrical part of the real-name verification gate. The real-name verification gate can be widely applied to the field of security and protection.
Owner:CRSC COMM & INFORMATION GRP CO LTD

Security authentication method for intelligent set-top box

InactiveCN105307016AEasy to useUse of security authenticationSelective content distributionUser verificationUser needs
The invention discloses a security authentication method for an intelligent set-top box. The security authentication method comprises the following steps: a mobile phone interacts with the intelligent set-top box through a local area network; a user inputs fingerprint on a mobile phone fingerprint sensor, and the mobile phone combines an IMEI code of the mobile phone and the user fingerprint information into a user identifier and sends the user identifier to the set-top box through the local area network; the set-top box stores the received user identifier; the user needing to decrypt the set-top box inputs the fingerprint on the mobile phone fingerprint sensor, the mobile phone combines the IMEI code of the mobile phone and the user fingerprint information into a user verification identifier and sends the user verification identifier to the set-top box through the local area network; and after receiving the user verification identifier, the set-top box verifies whether a user identifier record matched with the user verification identifier exists in a local storage list, and if so, the decryption is successful. By adopting the security authentication method disclosed by the invention, the user does not need to input a digital password, and the user can easily and safely use his own fingerprint password on the intelligent set-top box to enjoy services.
Owner:SHENZHEN SOWELL TECH

Method for using authentication security in electronic communication

The invention relates to the technical field of electronic communication security, and specifically relates to a method for using authentication security in an electronic communication. The method comprises the following steps: creating an electronic communication room by first communication equipment, automatically generating a room number, and then setting room verification information; inputting the room number and entering a room by second communication equipment, inputting a static key, and verifying the static key; after the verification is passed, answering an identity information verification problem; after the identity information verification problem is answered correctly, connecting to the room; and sending a voice verification application by the second communication equipment;receiving the voice verification application by the first communication equipment, and judging voice information; receiving a pairing verification code by the second communication equipment and generating a pairing application code; and inputting the pairing application code by two groups of communication equipment to complete pairing, and establishing a communication connection. The method for using the authentication security in the electronic communication provided by the invention solves the problem that information is leaked since irrelevant personnel can enter the communication in the communication process due to the lack of a secure identity authentication method in the existing multi-person electronic communication process.
Owner:GUILIN UNIV OF AEROSPACE TECH

Method for identifying integrity of transaction information

The invention provides a method and a device for identifying integrity of transaction information. The method comprises steps that a terminal device receives a transaction instruction sent by a host and analyzing the transaction instruction so as to obtain a first information verification code and to-be-verified transaction information; blocking the to-be verified transaction information so as toobtain transaction information blocks, according to the first secret key, generating a third secret key, according to a second secret key, generating a fourth secret key, and according to the transaction information blocks, the first secret key, the second secret key, the third secret key and the fourth secret key, carrying out calculation so as to generate a transaction information code; judgingwhether the transaction information code matches the first information verification code, if yes, determining that the transaction information is complete, executing the transaction instruction and returning a transaction result to the host and finishing; or else, determining that the transaction information is not complete, rejecting execution of the transaction instruction, returning an error code to the host and finishing the execution. In this way, according to the to-be-verified transaction information, to-be-verified trade information is subjected to processing for many times in a calculation process of the verification code, the important data in the transaction information is quite safe in the verification process.
Owner:FEITIAN TECHNOLOGIES

Automobile online payment system and method

An automobile online payment system disclosed by the present invention comprises an Internet of Vehicles module, a personal payment system and a man-machine interaction module, the man-machine interaction module is used for inputting an Internet of Vehicles account, and the Internet of Vehicles module is connected with the personal payment system through a network and is used for binding the Internet of Vehicles account with the personal payment system, and when operation related to a payment function is carried out through the human-computer interaction interface in the vehicle, the vehicle networking module is matched with a personal payment system through a vehicle networking account to complete payment operation. The system has the advantages that the structure is simple, payment is convenient, when payment is needed, the personal payment system is rapidly connected and called through the FACE ID and the Internet of Vehicles account number to conduct payment, the Gemangeran is reliable, verification of the face ID and the Internet of Vehicles account number is safer, the payment efficiency is guaranteed, meanwhile, the payment safety is improved, the in-vehicle payment experience of a user is improved, and the improvement of the function of the Internet of Vehicles in the vehicle is promoted.
Owner:YIBIN COWIN AUTO CO LTD

How to verify login authority

The embodiment of the invention relates to a login authority verifying method, and the method comprises the steps: obtaining the telephone number information of a currently inserted SIM (subscriber identity module) card in a user terminal; generating an initialized login interface according to the telephone number information; obtaining a login information submitting instruction inputted by a user; generating a preset number obtaining command according to the login information submitting instruction; obtaining the preset number information stored in a database of the user terminal according to the preset number obtaining command; determining whether the preset number information is the same as the telephone number information or not; updating the preset number information stored in the database according to the telephone number information when the preset number information is not the same as the telephone number information; determining whether the updated preset number information is the same as the telephone number information or not again; generating login information according to the telephone number information, the IMEI of a user terminal and the user information of the user terminal when the updated preset number information is the same as the telephone number information, transmitting the login information to a server, and carrying out the login of a user; and enabling the server to update the cellphone number field stored in user account information according to the login information.
Owner:北京博瑞彤芸科技股份有限公司

Online car-hailing information security verification method and system and server

The invention provides an online car-hailing information security verification method and system, and a server, and relates to the technical field of block chains, the method is applied to a sub-server, and the method comprises the steps: obtaining the driver information and vehicle information of an online car-hailing platform terminal; performing information legality verification on the driver information and the vehicle information; after the verification is legal, generating a driver block based on the driver information, and generating an online car-hailing block based on the vehicle information; performing link verification on the driver block and the online car-hailing block, adding the driver block to the driver chain after the link verification is passed, and adding the online car-hailing block to the online car-hailing chain; and performing matching verification on the driver chain and the online car-hailing chain to determine a matching result, so that online car-hailing information security verification can be performed according to the matching result. According to the invention, the qualification of online car-hailing drivers can be effectively managed in a decentralized manner, the cost of manual verification is greatly reduced, and the verification effect of online car-hailing information security is improved.
Owner:HANGZHOU QULIAN TECH CO LTD

A method for identifying the integrity of transaction information

A method and device for authenticating the integrity of transaction information, the method comprising: a terminal device receives a transaction instruction sent by a host computer, parses the transaction instruction to obtain a first message verification code and transaction information to be verified; the transaction information to be verified is divided into blocks to obtain Transaction information block, generate a third key based on the first key, generate a fourth key based on the second key, generate a fourth key based on the transaction information block, the first key, the second key, the third key and the fourth key Perform calculations to generate authentication message verification codes; judge whether the authentication message verification code matches the first message verification code, if yes, the transaction information is complete, execute the transaction instruction, return the transaction result to the upper computer, and end; otherwise, the transaction information is incomplete, Refuse to execute the transaction order, return an error code to the host computer, and end. Therefore, in the process of calculating the verification code according to the transaction information to be verified, the transaction information to be verified is processed multiple times, and the important data in the transaction information is more secure during the verification process.
Owner:FEITIAN TECHNOLOGIES

Service life management method of active medical instrument

The invention provides a service life management method of an active medical instrument, and belongs to the field of medical equipment management. The service life of the active medical instrument ismanaged through the registration unit and the verification unit; the registration unit forms an activation code based on a registration code and a unique code, and the verification unit receives a file with the activation code, analyzes the activation code, judges whether the activation code is an activation code of a local machine or not, analyzes and judges the service life if the activation code is the activation code of the local machine, and shuts down if the activation code is not the activation code of the local machine. And after analyzing and judging the service life, the service lifeof the local machine is managed. The verification process is safe and reliable, off-line verification is supported, and manual intervention is not needed; when the equipment is about to reach the service life, a medical equipment using unit is prompted in advance, and after the equipment date expires, the equipment stops running except for the condition specified by Medical Instrument Supervisionand Management Regulations, so risks caused by overdue use are prevented.
Owner:四川天府南格尔生物医学有限公司

A mobile phone headset based on puf authentication and information encryption

The invention relates to a mobile phone earphone based on PUF identity authentication and information encryption. The mobile phone earphone based on PUF identity authentication and information encryption is characterized in that a PUF module is arranged between an earphone audio interface and an earphone loudspeaker and is inlaid in the mobile phone earphone; the PUF module comprises an energy collector, a duplex communicator, a static storage, an error correction decoder and an encrypted circuit; the energy collector, the duplex communicator and the earphone audio interface are connected; the energy collector obtains voltage and current through the audio interface and supplies power to other modules after processing the voltage and the current; the duplex communicator is in intercommunication with a mobile phone through the earphone audio interface, and is further connected with the static storage and the encrypted circuit; the static storage is connected with the error correction decoder; the error correction decoder is connected with the encrypted circuit; the encrypted circuit is connected with the earphone loudspeaker. By the adoption of the PUF technology, the safety problem of an existing encryption algorithm is solved through hardware encryption, and the mobile phone earphone becomes a special device for identity authentication, information encryption and payment security enhancement.
Owner:TIANJIN LIANXIN TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products