Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

170results about How to "Simplify the verification process" patented technology

Method, device and system for communication through mobile communication network

The invention is applied to the field of communication and provides a method for communication through a mobile communication network. The method comprises the following steps that mobility management entity (MME) sends communication materials to equipment of two communication parties; evolved Node B (eNB) indicates that the equipment of the two communication parties establishes communication data carriers, generates radio network temporary identity (RNTI), and distributes the RNTI to the equipment of the two communication parties; the equipment of the two communication parties performs communication according to received communication materials by using existing mobile communication network. By means of the embodiment of the method for communication through the mobile communication network, MME acquires information that whether UE (user equipment) can perform D2D (disk to disk) communication, then whether two communication parties can perform identical security algorithm is judged, security algorithm used by existing mobile communication is sent to the two communication parties, and the two communication parties are in communication through the security algorithm used by existing mobile communication technology, so that the mobile communication technology is applied in D2D communication aspect, and by means of the existing mobile communication technology, the verification process is simple, and security level is high.
Owner:HUAWEI TECH CO LTD

Information verifying method and device

The invention relates to an information verifying method and an information verifying device, and belongs to the technical field of networks. The method comprises the steps that a first terminal receives specified operation instructions; according to the specified operation instructions, graphic codes are generated so that a second terminal displays an information input interface through scanning the graphic codes, in addition, information, input by users, to be checked is obtained, an verification request is sent to a server, and the server verifies whether a first terminal is allowed to execute the specified operation or not. The information verifying method and the information verifying device have the advantages that the input process of the information to be checked after the first terminal receives the specified operation instructions is transferred onto the second terminal, so the process for inputting the information to be checked is simpler and more convenient, the information verification process is simplified, the time for inputting the information to be checked is reduced, the information verification efficiency is improved, and in addition, a display screen of the second terminal is obviously smaller than that of the first terminal, the information leakage cannot be easily caused, and the safety is improved.
Owner:XIAOMI INC

Method and apparatus for morphological modeling of complex systems to predict performance

A method predicts performance of a system that includes a plurality of interconnected components defining at least one data flow path. The method references a workload specification for the system. The method models the system using one or more component models. Each component model represents selected one or more of the components. Each component model is arranged in like relationship to the data flow path as the selected one or more of the components represented by the component model. Each component model is (a) a constraint upon the workload specification input to that component model or (b) a transformer of the workload specification input to that component model so as to result in one or more output workload specifications that are input workload specifications to subsequent component models along the data flow path or (c) both a constraint and a transformer. At least one of the component models is a constraint. At least some of the component models along the data flow path operate on the workload specification. In one preferred form, operating on the workload specification involves arranging the component models in a hierarchy corresponding to the data flow path; using the specified workload specification as input to the topmost component model in the hierarchy; and applying one or more of the component models to its input workload specification, starting with the topmost component model and then component models at progressively lower levels in the hierarchy. Output workload specification at one level is input workload specification at the next lower level. If the component model comprises a constraint, the method evaluates whether the input workload specification satisfies or violates the constraint. If the component model comprises a workload specification transform, the method modifies the input workload specification so as to produce one or more output workload specifications.
Owner:HEWLETT PACKARD DEV CO LP

Method of speech sound used as secret key to achieve data resource cloud storage management

The invention discloses a method of speech sound used as a secret key to achieve data resource cloud storage management. The method of speech sound used as a secret key to achieve the data resource cloud storage management is characterized in that after users complete recording under a recording interface, recording files can be encrypted and compressed, and then the recording files can be sent to a cloud server. The cloud server can be used for doing voice frequency analysis for the received records and the whole stored records and extracting sound features. The influence caused by environmental noise, information channel and speakers can be reduced as soon as possible. The analyzed speech sound information features are matched with backup speech sound information features. After the matching is succeeded, data resources backup by the speech sound secret key of a cloud storage server is returned to a corresponding client side. The client side can be used for receiving the backup data resources. When the matching is failed, error messages can be returned, and then the client side can be used for reminding users. A speech recognition technology can be used for resolving the safe problems of user registration, code management and the like. The user experience can be improved. A cloud server storage technology is used for reducing to occupy individual equipment resource occupying and overcoming the shortcomings of data loss and the like.
Owner:北京飞漫软件技术有限公司

Voltage transformer online verifying system based on SF6 parallel-plate capacitor

The invention provides a voltage transformer online verifying system based on an SF6 parallel-plate capacitor. The system comprises a primary voltage sensing unit, a digitalization collecting unit, an optical signal processing unit and an intelligent processing unit. The system is characterized in that the primary voltage sensing unit adopts the SF6 parallel-plate capacitor as a voltage sensing unit and obtains primary voltage signals by detecting currents in capacitance; the primary voltage sensing unit is connected or disconnected with a primary wire through a lifting platform, so that online obtaining of high-voltage signals is achieved; output of the primary voltage sensing unit is connected with the digitalization collecting unit through a shield cable; output of the digitalization collecting unit is digital quantity optical signals transmitted to the intelligent processing unit of the lower-voltage side through the optical signal processing unit. The SF6 parallel-plate capacitor is adopted as a standard mutual inductor, so that online obtaining of the high-voltage signals is achieved. Along with increase of voltage classes, the size and the weight are not increased much, and the system is light due to gas insulation and suitable for a transformer substation site.
Owner:湖北宜电电气有限公司

Digital archive system based on blockchain

The invention provides a digital archive system based on a blockchain. The digital archive system includes an archive management system and a digital archive blockchain. The archive management systemincludes modules of archive piece forming, archive volume forming, archive viewing, archive handover, archive identification, archive destruction and archive counting. The digital archive blockchain includes an archive transaction account book and an archive cabinet. According to the digital archive system, authorization passwords are set, blockchain encryption technology is utilized, entire-network maintenance is carried out, thus tampering cannot occur, security, authenticity and credibility of digital archives are guaranteed, phenomena of usurping, illegal accessing and the like of the archives are eliminated, a traditional archive verification process is simplified, auditing costs are reduced, low-cost use of the archives is realized, and at the same time, losses caused by archive tampering and forging on units are also avoided. Archive management service behaviors at any time can be queried, and viewing and handover records cannot be tampered with, and can be traced. Identity confirmation and qualification authentication are realized, digital economy development and new-old kinetic energy conversion are facilitated, trust costs are reduced, and social system running efficiencyis improved.
Owner:DAREWAY SOFTWARE

Payment system, payment method and information checking method

The invention discloses a payment system, a payment method, and an information checking method. The system comprises a payment-side service platform, a business-side service platform, and a communication service platform of a communication server. The communication service platform is connected with the payment-side service platform and the business-side service platform. The communication service platform is used for receiving a payment request of a client and judging whether to form a fee information list corresponding to the payment request and including payment information; if a fee information list is formed, the communication service platform sends a payment instruction to the payment-side service platform according to the fee information list; and if a fee information list is not formed, the communication service platform acquires payment information from the business-side service platform, forms a fee information list, and sends a payment instruction to the payment-side service platform according to the fee information list after the fee information list is formed. The payment-side service platform is used for receiving the payment instruction and carrying out payment according to the payment instruction. The business-side service platform is used for providing payment information for the communication service platform.
Owner:ZUNYI BRANCH OF CHINA MOBILE GRP GUIZHOU COMPANY

Write message prospect processing method and device facing board-level high-speed bus

The invention discloses a write message prospect processing method and device facing a board-level high-speed bus. The method comprises the following steps: receiving a write message of a link layer; carrying out checking; setting error flag bits; requesting retransmission when the checking result shows that the message is unqualified; identifying the write command and the write data of the write message; caching the write command and the write data through an FIFO queue; outputting the write command and the write data to follow-up message processing logic; detecting the error flag bits of the write message; receiving retransmitted write messages when any error flag bit exists till no error flag bit exists; covering the cached write message if the FIFO queue is not empty; generating a new error correction write message if the FIFO queue is empty, and writing the new error correction write message into the FIFO queue. The device comprises a link layer receiving unit and a message cache and prospect processing unit which are related in the method. The method and device have the advantages that the performance of a storage system can be improved; distinguishing of types of write requests and write data in follow-up processing and cancellation of inaccurate write requests and data are voided; the logic design and verification in follow-up processing are simplified.
Owner:NAT UNIV OF DEFENSE TECH

Multi-application platform access method, device and system

The invention discloses a multi-application platform access method, a multi-application platform access device and a multi-application platform access system, which are applied to the technical field of computers and are used for solving the problems of complicated verification process and low access efficiency of the existing multi-application platform access method. Specifically, the method comprises the steps of receiving an access request initiated by a user for applications in a multi-application platform, and obtaining whole network authorization information which corresponds to the user and is used for authorizing the user to access all applications in the multi-application platform, carrying out validity verification on the whole network authorization information of the user through the authentication server, and allowing the user to access the application when the validity verification of the whole network authorization information of the user is determined to be passed. Therefore, the whole network authorization information is configured for the user through the authentication server, so that the user only needs to perform validity verification on the whole network authorization information of the user when accessing the application in the multi-application platform, thereby simplifying the verification process and improving the application access efficiency while ensuring the access security of the multi-application platform.
Owner:DEEPBLUE TECH (SHANGHAI) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products