Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

32 results about "Binding number" patented technology

THE BINDING NUMBER The binding number of a graph G, bind(G), is the largest number c such that I I'(X)J > min(c I X 1, 1 G 1) for every X C V(G); i.e., it is the minimum value of I I'(X)I/I X I taken over all non-empty sets X of vertices such that l'(X) =A V(G).

Method for safely calling session initiation protocol (SIP) terminal based on bound number authentication mechanism

The invention provides a method for safely calling a session initiation protocol (SIP) terminal based on a user bound number authentication mechanism. The method comprises the following steps that: a user template is arranged on an SIP server, and an SIP account number is bound with a specified telephone number of a user; a user sends a login request out, and the SIP server searches the corresponding user template after receiving the login request; if the template does not exist, normal registration process is performed; if the template exists, the SIP server starts a call limit for the user; after a receiving authority is acquired, the corresponding SIP terminal corresponding to the user is required to be called by using the bound telephone number through the SIP server; if the SIP server detects that the corresponding SIP terminal is called by using the telephone number bound in the template, the call limit of the SIP terminal is lifted; and if the corresponding SIP terminal is not called by using the bound telephone number, the call limit is kept. By the method, a phenomenon that an illegal user has a free call on other's expenses through an illegal means can be effectively avoided, the SIP terminal can selects to refuse an authentication call of the telephone number, and additional telephone expenses cannot be generated.
Owner:GUANGDONG TELEPOWER TELECOM TECH

Voiceprint identity authentication device and authentication optimization method and system

The invention discloses an authentication optimization method of a voiceprint identity authentication device. The authentication optimization method comprises the steps that the Mel-frequency cepstral coefficients corresponding to registration voice signals are extracted and preset number binding is performed on the Mel-frequency cepstral coefficients; the Mel-frequency cepstral coefficients act as an input layer and the bound numbers act as an output layer to perform differentiated deep belief network training and acquire the parameter space; the Mel-frequency cepstral coefficients are inputted to the differentiated deep belief network to acquire the hidden layer output to act as the feature vectors; all the feature vectors act as the input to construct a Gaussian mixture model; and the corresponding Mel-frequency cepstral coefficient of any registration voice signal is inputted to the differentiated deep belief network to acquire multiple hidden layer outputs, and the hidden layer outputs of which the degree of distinction is higher than the preset threshold are selected to act as the training data to update the Gaussian mixture model. The following spontaneously changed voice signal of the registrant acts as the raining data to update the Gaussian mixture model so as to be more adaptive to the present sound production state of the registrant, and the recognition rate can be guaranteed.
Owner:GUANGDONG UNIV OF TECH

Safety control method for stage-outputting and multi-path monitoring of depositor bank account capital

The invention discloses a safety control method for stage-outputting and multi-path monitoring of depositor bank account capital, belonging to the field of financial safety. A capital account is divided into multi-stages; each stage has different functions. A plurality of special passwords for capital transferring and monitoring are set; the capital is transferred between each stage by a fixed phone and a mobile phone with binding numbers; and a special person can be set for monitoring the capital outputting; the times and sequences of each monitoring phone can be changed so as to ensure the safety of enormous capitals; moreover, the departments like the public security in the location of a received account for the outputted capital can be authorized to monitor the capital, and ensure the owner of the account to be true, legal and pursuable. The depositor can employ traditional modes (signature, original passwords, fingerprints, and the like) for using the capital transferred to a quasi-output stage. When the mobile phone is used, the information like the original passwords and the account number is not needed to be used, thus being capable of preventing a wireless signal from being intercepted and captured to blow the gaff; therefore, the goal of theft prevention can be realized by transferring the passwords and monitoring the outputted capitals under a hidden situation.
Owner:杨莉华

Access layer embedded IP recording method and a system based on softswitch

The invention discloses an access layer embedded IP recording method and an access layer embedded IP recording system based on softswitch. The method comprises the following steps: (1) extracting portdata corresponding to IP telephone number or IP address from the access layer switch; (2) extracting port data corresponding to IP telephone number or IP address from the access layer switch; (3) extracting port data corresponding to IP address from the access layer switch. 2) the embedded recording server connected with the access layer switch adopts a functional module including insertion, monitoring and forced disassembly to realize the recording process; Step 3) The recording file is extracted in a manner including an IP address, a binding number and a time period, and is converted into voice data storage. The scheme of the invention no longer adopts the traditional server plus software structure, but adopts the embedded structure based on the professional chip, so that the volume issmaller and exquisite, the power consumption is lower, the performance is more stable, the deployment is more convenient and the cost is lower. After the device is deployed in the access layer or terminal, the realization and extraction of the recording can be more convenient, and the coordination and management between departments can be more flat and efficient. Therefore, the device has a largerapplication field and foreground.
Owner:STATE GRID SHANDONG ELECTRIC POWER +1

Method for protecting bank account fund security and multiple specific applications thereof

The invention discloses a method for protecting bank account fund security and multiple specific applications thereof, and belongs to the field of financial security. The method comprises the following steps of: dividing accounts into multiple levels with different functions; setting a few fund transfer and monitoring passwords, transferring funds among the levels by using a fixed phone number of bound numbers, a monitoring phone and a mobile phone, setting multiple persons to monitor the output funds, and authorizing departments of public security and the like of the output fund receiver accounts to monitor the funds, thus ensuring reality, legality and traceability of account possessors. When the mobile phone is used, information such as original passwords, accounts and the like does not need to be used or sent, so that radio signals can be prevented from being divulged by intercepting; the password can be used and monitored under the concealed condition, and the deposited amount is used as the other password, so that the theft-proof purpose is fulfilled, and the theft behaviors of thieves such as secret photography, hobbyhorses, exchange and the like completely lose effect; and by the method, a large amount of financial fraud, depositor hijacking, bribery, absconding with money, tax evasion and malicious overdraft cases can be reduced.
Owner:杨莉华

Construction method of nano-drug carrier based on nucleic acid

The invention discloses a construction method of a nano-drug carrier based on nucleic acid. The drug carrier is of a columnar rigid structure that six groups of double helixes are mutually twisted; acolumnar going-through hole, which is 1.8-2nm in diameter, is formed in the middle of the columnar rigid structure; two ends of the carrier are blocked by locked nucleic acid single strands lock1 andlock3; one part of a blocking sequence lock3 at one end is a complementary sequence of a target aptamer mRNA; measured by dynamic light scattering, the overall length of the carrier is 40+/-4.3nm; when the target aptamer mRNA exists in cells, an entropy substitution process occurs since the number of paired bases between the target mRNA and the lock3 is much greater than a binding number between the lock3 and basic structural ports of the carrier, so that one end of the carrier is opened, and drugs in the carrier are released. According to the construction method provided by the invention, bytaking the nucleic acid existing in an organism as a raw material, a pairing situation between the bases can be regulated and controlled through artificial design, so that the nucleic acid is converted into a shape-controllable origami structure through three-dimensional folding, and the basic carrier for drug loading is obtained.
Owner:QINGDAO UNIV OF SCI & TECH

Binding method of elevator external-call display panel, electronic equipment and storage medium

InactiveCN108328439AEasy to controlCan not be replaced at willElevatorsEngineeringElectric equipment
The invention discloses a binding method of an elevator external-call display panel. The binding method is characterized by comprising the following steps that receiving is conducted, specifically, abinding number issued by a main board is received; judging is conducted, specifically, whether a preceding binding number is self-stored or not is judged, if yes, a comparison step is carried out, andif not, the binding number is stored to be the preceding binding number; comparison is conducted, specifically, whether the binding number and the preceding binding number are consistent or not is compared, if yes, communication is established, and if not, alarming is conducted; and unbinding is conducted, specifically, an unbinding instruction issued by the main board is received, the precedingbinding number is eliminated, and then the receiving step is repeated. According to the binding method, the external-call display panel needs to compare the binding number, and can establish communication with the elevator main board only under the situation that the binding number is consistent with the binding number of the elevator main board, otherwise, a corresponding breakdown is prompted, therefore, an elevator can be better managed and controlled, and the external-call display panel and the elevator main board cannot be replaced and exchanged at will.
Owner:杭州句力科技有限公司

A method, device and system for processing mobile phone numbers for secondary sales

The invention provides a processing method, a processing device and a processing system for secondary mobile phone number selling. The processing method, the processing device and the processing system for secondary mobile phone number selling have the advantages that a user with large mobile phone number change or ceasing probability is selected through analysis and screening of users' big data information of a third-party service platform (E-commerce website and / or mobile internet application), a bound number of the user on a third-party service server is transmitted to a telecommunication operator to enable a BSS (business support system) server of the telecommunication operator to judge whether the bound number is subjected to secondary selling or not, and the third-party service server unbinds the mobile phone number of the user or re-authenticate the identity of the user according to a judgment result of the bound number; since the third-party service server is used for identifying and screening of suspected secondarily sold mobile phone numbers, so that the BSS query range is narrowed, in other words, user information quantity transmitted between the third-party service server and a BSS is decreased, network resources are saved and user information leakage risks can be reduced.
Owner:CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products