Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

41 results about "Card security code" patented technology

A card security code (CSC), card verification data (CVD), card verification number, card verification value (CVV), card verification value code, card verification code (CVC), verification code (V-code or V code), or signature panel code (SPC) is a security feature for "card not present" payment card transactions instituted to reduce the incidence of credit card fraud.

Security code activated access control system

An access control system that utilizes security codes (500), a database (430), and a control device (20) is disclosed. Each security codes (500) is comprised of a unique key code (502) that provides security in addition to a use code (503) that is used to convey specific user defined functions. The use code (503) may be determined by the security code requester (400) at the time of security code (500) charge out from the database (430). The database (430) controls the issuance of security codes (500) and the control device (20) validates the key code (502) within the security code (500) against key codes (502) within control device (20) memory and if valid, performs an action based on the validation of the use code (503) parameters. As the key codes (502) that are within the control device (20) memory are used, the control device (20) then self-regenerates the key codes (502) in order to extend the control device (20) service life indefinitely. The database (430) and the control device (20) have security code (500) activities that are synchronized, though the two operate independently and are not electronically connected. The system provides a secure interface for obtaining access authority from the database (430). Security code requesters (400) contact the database (430) and request security codes (500) in order to activate a specific control device (20). After database (430) issuance, the security codes (500) are then input by the security code user (420) at the control device (20) location and activates the control device (20) if the key code (502) matches the key code (502) within the control device (20) and the use code (503) parameters are validated by the control device (20). The control device (20) and the database (430) key codes (502) are synchronized. This allows an unlimited supply of security codes (500) to be issued by the database (430) and used by the control device (20).
Owner:YAGER DAVID FR +1

Technology for applying vocal print verification as security codes of mobile applications

The invention discloses a technology for applying vocal print verification as security codes of mobile applications. The technology comprises the steps as follows: using a mobile phone which comprises a vocal print sampling module; conducting vocal print registration for the first time, uploading a registration number and vocal print characters to a vocal print verification server through the mobile phone, and establishing a vocal print file of a register on the server; according to differences of the vocal print verification modes, enabling a user to follow to speak a verification sentence; sending a mobile phone number and verification voice stream to the vocal print verification server by application software through safe network connection; comparing vocal print characters of the voice stream and the vocal print of the mobile phone number in registration by the vocal print verification server, and returning the similar percentage; and according to self security requirement, allowing the user to use the software if the probability exceeds a set threshold value, otherwise, refusing using the software and making records into a security log. According to the scheme, the security is guaranteed by utilizing the uniqueness of personal voice and through verification by the vocal print verification server, meanwhile, the cracking possibility is reduced at the same time, and the use convenience effect can be achieved.
Owner:上海先先信息科技有限公司

Goods false proof method and system based on Internet safety lock

InactiveCN106940859AAchieve anti-counterfeiting goalsAnti-lostDigital data protectionCommerceProduct traceabilityCard security code
The embodiment of the present invention discloses a commodity anti-counterfeiting method and system based on an Internet security lock. By uniformly encoding the Internet security lock and writing the locked commodity information into the security lock code, the user can verify the identity of the commodity through the security lock. Information to identify the authenticity of the goods, so as to achieve anti-counterfeiting. The method in the embodiment of the present invention includes: generating a corresponding security lock code by uniformly encoding the Internet security lock, and writing information corresponding to locked commodities in the security lock code, the security lock includes a physical anti-counterfeiting lock, a card anti-counterfeiting lock, Virtual anti-counterfeiting lock, the information of the locked commodity includes commodity code and commodity code associated information, commodity traceability code and commodity traceable code associated information, commodity specific anti-counterfeiting information; generating the first opening method corresponding to each entity anti-counterfeiting lock code ; Generate an anti-counterfeit card corresponding to each of the card anti-counterfeit lock codes; generate a second opening method corresponding to each of the virtual anti-counterfeit lock codes.
Owner:李建魁

An article anti-counterfeiting method that realizes multiple authentications through associated anti-counterfeiting codes

The invention discloses an article anti-counterfeiting method for realizing multiple authentications through associated anti-counterfeiting sets of codes. The method forms a set of anti-counterfeiting authentication codes with a plurality of random anti-counterfeiting authentication codes according to requirements, and hides the anti-counterfeiting codes in articles and on the package of the item and stored in the database of the authentication system; then when the relevant end customer performs the final anti-counterfeiting certification, the anti-counterfeiting authentication code hidden on the item or item packaging is taken out through an irreversible operation on the item, and the anti-counterfeiting authentication code hidden on the item or item packaging is retrieved by telephone, mobile phone or network query means The obtained anti-counterfeit authentication code is sent to the authentication system through the communication network. The authentication system will feed back the corresponding authentication result to the end customer according to whether the anti-counterfeiting code exists in the system database, the number of times it has been authenticated, and the associated authenticated anti-counterfeiting authentication code information. The anti-counterfeiting method of the invention can effectively prevent counterfeiting and counterfeiting, and can obtain the anti-counterfeiting effect of low anti-counterfeiting cost, easy realization and high anti-counterfeiting ability.
Owner:SHAANXI UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products