Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method and system for protecting human-vehicle authentication information

A technology that authenticates information and protects people. It is applied in the field of data processing and can solve problems such as vehicle and user information mismatch, user information leakage, etc., and achieve the effects of reducing data leakage, improving data accuracy, and reducing the probability of occurrence

Pending Publication Date: 2022-04-26
深圳市顺易通信息科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the submission of these materials takes place online, and after one authentication, the vehicle can be easily bound by the owner. The risk of user information leakage caused by fraudulent use of information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for protecting human-vehicle authentication information
  • Method and system for protecting human-vehicle authentication information
  • Method and system for protecting human-vehicle authentication information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] Embodiments of the present application provide a method and system for protecting passenger-vehicle authentication information, which are used to perform passenger-vehicle authentication for abnormal users again.

[0066] The following will clearly and completely describe the technical solutions in the present application with reference to the accompanying drawings in the embodiments of the present application. Apparently, the described embodiments are only some of the embodiments of the present application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0067] Executors in the embodiments of this application include, but are not limited to, terminals, servers, systems, and other devices that include logic computing and operating capabilities. The details are not limited here, and the embodiments o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a method and a system for protecting human-vehicle authentication information, which are used for carrying out human-vehicle authentication on an abnormal user again. The method provided by the embodiment of the invention comprises the following steps: calculating bound vehicle relationships of all users one by one according to a preset rule to obtain relationship credibility; judging whether the relation credibility is greater than a preset relation credibility threshold value or not; if not, determining that the user corresponding to the relationship credibility is an abnormal user; marking an abnormal user mark for the abnormal user; generating an abnormal user list according to the abnormal user marks until the relationship credibility of all the users is calculated; and sending a re-authentication instruction to the abnormal users in the abnormal user list.

Description

technical field [0001] The embodiments of the present application relate to the field of data processing, and in particular to a method and system for protecting authentication information of people and vehicles. Background technique [0002] In recent years, people's living standards have been improving day by day, the number of motor vehicles in cities has increased year by year, and services around vehicles have also flourished. In the face of huge user groups and information, various things and services in the industry are accelerated to digitize. [0003] In the prior art, users can purchase and enjoy the services and information provided by the service provider through online purchase. In order to provide these services in a targeted manner, the service provider often needs to collect some personal information of the user as a certificate of the identity of the service object. For example, based on the license plate number and mobile phone number provided by the user...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31
CPCG06F21/31G06F21/316
Inventor 唐健袁艺桥李开榆刘扬
Owner 深圳市顺易通信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products