Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

421 results about "Code acquisition" patented technology

Indoor mobile robot positioning system and method based on two-dimensional code

The present invention relates to an indoor mobile robot positioning system and method based on two-dimensional code. The system includes a two-dimensional code positioning controller mounted on a mobile robot, a two-dimensional code acquisition device and a two-dimensional code label distributed in the indoor environment. The two-dimensional code positioning controller is composed of a microprocessor and a communication interface that are connected together. The microprocessor is connected with the two-dimensional code acquisition device through the communication interface and is used for controlling the two-dimensional code acquisition device to acquire two-dimensional code images, receive the two-dimensional code images acquired by the two-dimensional code image acquisition device and realize precise positioning function. The method acquires an actual position of the mobile robot through photographing the indoor two-dimensional code labels, transforming coordinates and mapping code values. The method of the invention organically combines visual positioning technique, two-dimensional code positioning technology and two degree of freedom measuring technology to realize the function of precise positioning of the mobile robot and solve problems of complex image processing and inaccurate positioning of a traditional vision positioning system.
Owner:爱泊科技(海南)有限公司

Factory intelligent workshop real-time scheduling system

ActiveCN106056298AIntelligent Management ScienceManagement scienceResourcesProduction control systemStorage garage
The invention relates to a factory intelligent workshop real-time scheduling system, and is designed to solve the technical problem that a management system of an existing factory intelligent workshop needs further improvement. The system is mainly characterized in that an intelligent processing production line of the scheduling system finishes research and purchase as well as installation and debugging of workshop machining equipment; an intelligent warehouse and logistics transportation system carries out scientific classification, storage and transportation on raw materials and substances, management of finished and semi-finished products, and analysis and management on storage data of the raw materials, the semi-finished products and the finished products; an intelligent production control system, by fully utilizing information technology, carries out control in multiple dimensions of production plan issuing, material delivery, production scheduling, completion confirmation, standard operation guidance, quality control and finished product bar code acquisition, and accurately conveys on-site information to a production manager and a decision maker in real time through a network; and an intelligent alarm system is used for monitoring environment and temperature and reminding a transfer robot to return, avoid obstacles and charge.
Owner:宁波赛夫科技有限公司

Data transmitter and receiver of a spread spectrum communication system using a pilot channel

An improved spread spectrum communication system includes a transmitter and a receiver utilizing a pilot channel for the transmission of pure rather than modulated PN codes for code acquisition or tracking purposes with a lower bit error rate. The pilot signal is used to obtain initial system synchronization and phase tracking of the transmitted spread spectrum signal. At the transmitter side, a Walsh code generator, a Walsh modulator, a first PN code generator, a first band spreader, a second band spreader, finite impulse response filters, digital-analog converters, low-pass filters, an intermediate frequency mixer, a carrier mixer, a band-pass filter are used to transmit a spread spectrum signal. At the receiver side, a corresponding band-pass filter, a carrier mixer, an intermediate-frequency mixer, low-pass filters, analog-digital converters, a second PN code generator, an I channel despreader, a Q channel despreader, a PN code synchronization controller, a Walsh code generator, a first Walsh demodulator, a second Walsh demodulator, accumulator & dump circuits, a combiner, and a data decider are used to demodulate a received spread spectrum signal
Owner:SAMSUNG ELECTRONICS CO LTD

Method and device for transmitting verification codes via short messages

The invention discloses a method and a device for transmitting verification codes via short messages. The method includes that a server receives a verification code acquisition request carried with service identification and mobile terminal identification; the server judges whether a verification code corresponding to the service identification is previously transmitted to a mobile terminal via a short message channel or not, and the mobile terminal corresponds to the mobile terminal identification; the server transmits the verification code corresponding to the service identification to the mobile terminal via a selected short message channel if the verification code is not previously transmitted to the mobile terminal; and the server acquires short message channels which do not previously transmit the verification code corresponding to the service identification to the mobile terminal, selects a short message channel from the acquired short message channels and transmits the verification code corresponding to the service identification to the mobile terminal via the selected short message channel. The method has the advantage that the short message arrival rate can be increased when the verification codes are transmitted via the short messages.
Owner:ALIBABA GRP HLDG LTD

Third-party login mobile phone number binding method based on mobile phone APP

The invention relates to an APP login method, and specifically relates to a third-party login mobile phone number binding method based on a mobile phone APP. The method provided by the invention comprises the following steps that: a login request of a client is received and an option is returned back, wherein the option is whether to log in with a third-party account or not; when a user selects to log in with the third-party account, the client enters into a third-party login mobile phone number binding page; after the client clicks a verification code acquisition button, a server automatically generates a verification code and transmits the verification code to a mobile phone number; after the verification code is received by the mobile phone number, the verification code is input through a verification code input position of the client, and then, the verification code is submitted. In method provided by the invention, a step of binding the mobile phone number is added before logging in of the third-party account in the existing technical scheme, thus, the method solves a technical problem of failure in logging in to the APP with the third-party account again caused by forgetting the third-party account or forgetting passwords of the third-party account after logging in with the third-party account.
Owner:SHENZHEN GENUINE INNOVATIVE TECH CO LTD

Binding method and device for intelligent equipment and user operation terminal, and electronic equipment

ActiveCN108259643AReduce the risk of bindingImprove securityTransmissionSoftware engineeringComputer terminal
The invention discloses a binding method and a binding device for intelligent equipment and a user operation terminal, electronic equipment and a computer readable storage medium. The method comprisesthe steps of generating an equipment identification code for intelligent equipment according to an identification code acquisition request sent by the intelligent equipment; sending the equipment identification code to the intelligent equipment, wherein the sending of the equipment identification code triggers the intelligent equipment to display the equipment identification code; receiving a binding request sent by the user operation terminal, wherein the binding request is generated by the user operation terminal according to the equipment identification code input by a user, and the binding request carries the equipment identification code and identification information stored in the user operation terminal; and in response to the binding request, binding the user operation terminal corresponding to the identification information with the intelligent equipment corresponding to the equipment identification code. According to the scheme provided by the invention, a two-dimensional code is not needed to be printed and pasted onto the intelligent equipment, so that the problems that the wrong two-dimensional code is pasted and the two-dimensional code is leaked are avoided, the risk of binding the intelligent equipment by unreal users can be reduced and the security of the intelligent equipment is improved.
Owner:MIDEA SMART TECH CO LTD +1

User login method, user login device and terminal devices

The invention discloses a user login method, a user login device and terminal devices, and belongs to the technical field of terminal devices. The user login method includes receiving two-dimensional code acquisition requests for acquiring two-dimensional codes of account number information of specified application; acquiring the two-dimensional codes according to the account number information for logging users in the specified application when the first terminal devices are determined to be in specified application login states; displaying the two-dimensional codes generated according to the account number information of the specified application, allowing the other terminal devices to scan the two-dimensional codes to obtain the account number information and logging the users in the specified application according to the account number information. The two-dimensional codes are generated according to the account number information of the specified application. The user login method, the user login device and the terminal devices have the advantages that the two-dimensional codes corresponding to the account number information can be generated according to the account number information of the logged specified application by the terminal devices and can be displayed, so that the other terminal devices can obtain the account number information by means of scanning the two-dimensional codes, the users can log in the specified application according to the account number information, account numbers and passwords do not need to be repeatedly inputted, and the time can be saved to a great extent.
Owner:TENCENT TECH (SHENZHEN) CO LTD

Event decomposition using rule-based directives and computed keys

Methods, systems, and computer program products for generating a common event format representation of information from a plurality of messages include parsing a rule associated with a current message to determine if a property of a common event format representation for the current message is to be populated with a property value from a previous message. If the rule specifies to obtain the property value from the previous message, the property value is obtained from the previous message and the common event format representation for the current message is populated with the obtained property value from the previous message. The property value may be obtained by generating a computed key based on properties of the current message that are common to the previous message, and identifying the previous message based on the key of the current message. The rule associated with the current message may also be parsed to determine if the property of the common event format representation for the current message is to be populated with a property value determined by specified code. If the rule specifies to obtain the property value using the specified code, the property value is obtained using the specified code and the common event format representation for the current message is populated with the obtained property value obtained using the specified code.
Owner:INT BUSINESS MASCH CORP

Automatic construction and uploading method and device for application program, computer equipment and storage medium

The invention belongs to the field of computers, and relates to an automatic construction and uploading method and a device for an application program, computer equipment and a storage medium. The method comprises the steps of receiving an application program construction uploading request; acquiring a program code file according to the application program construction uploading request and transmitting the program code file to a program construction directory; acquiring program construction configuration information matched with the category of the application construction uploading request,and compiling a program code file according to the program construction configuration information to generate a compiled file; packaging the compiled file to generate a package file to be uploaded; and signing and verifying the package file, and uploading the package file to a target software platform after the package file passes the verification, thereby finishing automatic construction and uploading of the application program. According to the method provided by the invention, the links of code acquisition, compiling construction, uploading review and the like are connected in series and integrated together, operation is carried out in an automatic mode, continuous integration can be accessed, the application program construction time can be greatly saved, and the working efficiency isimproved.
Owner:CHINA PING AN PROPERTY INSURANCE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products