Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

231 results about "Equipment serial number" patented technology

Serial numbers are used to identify specific machines and equipment by assigning a previously unused number to that particular device.

Method for fast configuring remote video monitoring system

The invention discloses a method for fast configuring a remote video monitoring system. The method comprises the steps that (1) a wireless network access module is arranged on a monitoring camera; (2) currently available wireless networks are scanned by a monitoring client, a wireless network is selected and a wireless network password is input; (3) after receiving authentication information of the monitoring client, a monitoring server sends a safety verification code to the monitoring client; (4) the monitoring client converts an access point name, the password, the safety verification code and the authentication information to a two-dimension code picture, and the two-dimension code picture is placed in a shooting area of the monitoring camera; (5) the two-dimension code picture is shot through the monitoring camera and is analyzed, the monitoring camera has access to the wireless network, and an equipment serial number, the safety verification code and the authentication information of the monitoring camera are then sent to the monitoring server; (6) authentication is conducted on the monitoring client by the monitoring server according to information sent by the monitoring camera, and when the certification is passed, the monitoring camera and the monitoring client are bound to enter a monitoring module.
Owner:INST OF SOFTWARE - CHINESE ACAD OF SCI +1

Secure authentication proxy architecture for a web-based wireless Intranet application

A method and server system for exchanging data between a wireless electronic device and another computer system. This system allows a wireless electronic device to securely communicate with an Intranet by verifying authentication parameters. The first authentication parameter is the device serial number and a password which authenticates the network connection. The second authentication parameter is a user name and password that authenticates the user's access to applications on the Intranet. The system uniquely integrates the authentication parameters into every query the wireless device makes to the Intranet to maintain the session between the wireless device and the Intranet. Beneficially, the authentication parameters are not stored on any particular network device and do not burden either the server or the wireless device with maintaining the session. In another embodiment of the present invention, the server system uses a link rewriter service for examining web pages generated by applications of the Intranet to identify links that target any application that is resident on the Intranet. The link rewriter uses a look up table in a database to rewrite the link to include a keyword that designates the targeted application and its Intranet server. The keyword is then used to route links to the Intranet and if a link is not resident on the Intranet, the query will be routed to the Internet.
Owner:QUALCOMM INC

Dynamic electronic coded lock system and authentication method thereof

The invention relates to a dynamic electronic coded lock system and an authentication method thereof. The system is composed of an electronic lock (1) and a plurality of password tokens (2) with different equipment sequence numbers. The authentication method comprises the following steps that: the electronic lock respectively accumulates and stores the application times of the password tokens according to the equipment sequence numbers; each password token accumulates and stores own application time; a dynamic password is calculated according to certain rules at the password token end on the basis of the equipment sequence numbers and the accumulated application times, and then is displayed; a dynamic password set is calculated according to the same rules of the password token end at the electronic lock end on the basis of the equipment sequence number corresponding to the password token in use and the allowable error range of the accumulated application times corresponding to the equipment sequence number, and a password input by a user is received; and an unlocking command is executed if the password input by the user is in the selectable dynamic password set, otherwise, the unlocking operation is ineffective. The system and method need no time benchmark, the service life and the security of the system can be prolonged and improved, and a hardware design is simplified.
Owner:孙添平

Equipment authorization use method and equipment for method

ActiveCN102831352AEnrich business scopeChanging the leasing business modelComputer security arrangementsElectric equipmentAuthorization
The invention discloses an equipment authorization use method and a device and equipment for the method. The method includes an equipment authorizing device and authorized equipment. The equipment authorizing device is used for generating and outputting an authorization information code; and the authorized equipment receives the authorization information code, and sets the authorization use time of the equipment according to the authorization information code. The interaction between the equipment authorization device and the authorized equipment is realized through the authorization information code. The authorization information code includes an equipment serial number, authorization information and authorization timeliness information, and the authorization information code is generated by converting above information into a character string and adding a check code. The check code is obtained by adding a private data to the above information and processing the information by MD5 (message-digest 5) algorithm, wherein the private data is a secrete data; the MD5 algorithm has non-repudiation; and the authorization information code has a timeliness, so that the authorization information code has certain security. The equipment authorization use method provided by the invention can be used for conducting trial and leasing business of electronic equipment.
Owner:NANJING TIANSU AUTOMATION CONTROL SYST

Equipment sequence number setting method and device and computer readable storage medium

ActiveCN107257392ASolve problems that are not uniqueTransmissionSoftware engineeringEquipment serial number
The invention discloses an equipment sequence number setting method and device and a computer readable storage medium. The method comprises the steps of: responding to a sequence number setting request sent by to-be-allocated equipment, wherein the sequence number setting request carries equipment identification code information and additional parameter information of the to-be-allocated equipment; judging whether the equipment identification code information is matched with identification code information of existing equipment in a preset data table; when the equipment identification code information is matched with the identification code information of the existing equipment in the preset data table, judging whether the additional parameter information is matched with additional verification parameter information of the existing equipment matched with the equipment identification code information; and when the additional parameter information is not matched with the additional verification parameter information of the existing equipment matched with the equipment identification code information, setting an equipment sequence number corresponding to the to-be-allocated equipment. The invention solves the problem of non-uniqueness of the equipment sequence number, which is cause by adopting single data to allocate the equipment sequence number currently.
Owner:SHENZHEN TCL NEW-TECH CO LTD

Intelligent household system and quick pairing method thereof

The invention relates to an intelligent household system and a quick pairing method of the intelligent household system. The intelligent household system comprises intelligent household equipment, a handheld terminal, a control center and a cloud server, wherein the intelligent household equipment generates a random code with a plurality of bits; the generated random code and an equipment sequence number are displayed on the equipment; the handheld terminal acquires and transmits a configuration command, the random code and the sequence number to the control center via the cloud server or directly; after the control center receives the configuration command, the random code and the sequence number, the control center enters into an equipment addition mode to search equipment for pairing; after the control center is paired with new intelligent equipment, the control center transmits the random code to the new intelligent equipment; the new intelligent equipment is matched with the random code; after matching succeeds, the new intelligent equipment transmits the sequence number to the control center; the control center accomplishes sequence number matching; and the pairing succeeds. Therefore, keys of the control center and the new equipment are not required to be pressed simultaneously; most work is accomplished in the handheld terminal; interference and safety problems of neighbouring multiple-equipment configuration are avoided at the same time; and marks such as a two-dimensional code are not required to be printed on a housing of the equipment any longer.
Owner:YUNDING NETWORK TECH BEIJING

Authentication method for communicating with automobile through control equipment and system thereof

The invention provides an authentication method for communicating with an automobile through control equipment and a system thereof. The method comprises the steps that a registration server verifies whether the user of the control equipment is a legal user; the control equipment transmits a certificate, the identification information of the control equipment, the vehicle serial number or the vehicle-mounted equipment serial number of the automobile and an instruction used for controlling the automobile to a service processor; the service processor provides the certificate and the identification information of the control equipment to an authentication server, and the authentication server verifies whether the control equipment is legal control equipment; the service processor provides the vehicle serial number or the vehicle-mounted equipment serial number and the instruction used for controlling the automobile to a security server, and the security server verifies whether the automobile is a legally authenticated automobile according to the vehicle serial number or the vehicle-mounted equipment serial number; the security server verifies whether communication between the control equipment and the automobile is legal and secure by using a communication session overtime mechanism and a random number encryption mode; and the security server transmits the instruction used for controlling the automobile to the automobile so as to control the automobile to perform the instruction.
Owner:严俨

Method and device for safely having access to monitoring front-end device

The invention provides a method for safely having access to a monitoring front-end device. The method comprises the first step of receiving a message for adding the monitoring front-end device on a platform server by a registered user; the second step of verifying the serial number in the added message according to the device serial number stored locally, wherein if consistent, a piece of new record including a device name, the serial number and a user name is generated locally; the third step of receiving a register keep-alive message of the monitoring front-end device; the fourth step of searching for the record according to the serial number of the register keep-alive message and adding the synchronous random number and the IP address of the monitoring front-end device; the fifth step of judging whether there is a device name of a device to be accessed under the name of the user or not after the access request of the user is received, wherein if yes, the sixth step is executed, and if not, the access request of the user is rejected; the sixth step of searching for the IP address of the device to be accessed and redirecting the access request of the user to the front-end device, wherein the redirected access request comprises the IP address, a user name and a dynamic verification code of the device. The method for having access to the monitoring front-end device is safe and reliable.
Owner:ZHEJIANG UNIVIEW TECH CO LTD

Protection method for secure cloud computing terminal

InactiveCN103780583AResolve the Leakage SituationAddress safety risk concernsUser identity/authority verificationControl signalClient-side
The invention relates to a protection method for a secure cloud computing terminal. The protection method comprises a first step in which a unique equipment serial number is generated by a digital certificate computing storage IC module arranged inside the secure cloud computing terminal; a second step in which a user identity is verified by a fingerprint reader arranged inside the secure cloud computing terminal; a third step in which the secure cloud computing terminal is connected with a virtual cloud server via a client connection protocol to start a remote cloud virtual machine; a fourth step in which normal starting is judged, if yes, the sixth step is carried out, and if not, the fifth step is carried out; a fifth step in which initial setup is restored by the secure cloud computing terminal, and the first step is carried out; and a sixth step in which the secure cloud computing terminal is connected to a cloud operation system, and the start/stop state of a WiFi module, a USB interface and an optical photoelectric converter can be controlled via controllable signal output and input interfaces. Compared with the prior art, the protection method for a secure cloud computing terminal has the advantages that the problem that the user information is revealed duo to weak secure cloud computing terminal protection measures can be effectively solved and the like.
Owner:SHANGHAI JUNYUE INTELLIGENT TECH

Equipment authorization method, device and system

InactiveCN105187438ARealize offline authorization operationAuthorization operation implementationTransmissionComputer moduleAuthorization
The invention provides an equipment authorization method, device and system. The method comprises the following steps that: an authorization device transmits an equipment serial number and/or GPS (Global Position System) identifier of target equipment to a management system through a network; the management system determines a matched first equipment identification code and transmits the matched first equipment identification code to the authorization device according to the equipment serial number and/or GPS identifier; the authorization device receives the first equipment identification code and stores the first equipment identification code; when the authorization device is connected with the target equipment, the authorization device transmits the stored first equipment identification code to a controller of the target equipment; the controller judges whether the first equipment identification code is matched with a second equipment identification code stored in the controller or not; and when the first equipment identification code is matched with the second equipment identification code, the authorization device performs authorization operation on the target equipment according to authorization information. Through adoption of the equipment authorization method, device and system, authorization operation of the equipment can be realized under the situation that GPS signal intensity is low or GPS signals are unavailable or the equipment is not provided with any GPS module.
Owner:BEIQI FOTON MOTOR CO LTD

Ad-Hoc network communication manager and networking method thereof and Ad-Hoc network communication system

The invention relates to an Ad-Hoc network communication manager and a networking method thereof and a photovoltaic megawatt house Ad-Hoc network communication system. The Ad-Hoc network communicationmanager is connected and communicated with multiple networking devices, the networking devices comprise basic unit devices and branch devices, the basic unit devices are connected with a main controlmodule through communication interfaces, and the branch devices are connected with the basic unit devices; and the Ad-Hoc network communication manager configures device parameters of each networkingdevice through a Web configuration module and stores the device parameters to a database module, and an automatic address allocation module sends broadcast commands according to channels configured by the Web configuration module, automatically allocate different addresses to the devices sequentially according to the order of responses returned by received reading sequence numbers and sequentially broadcasts and sends address setting commands carrying device sequence numbers and device communication addresses for self networking. The networking method is a networking method for the Ad-Hoc network communication manager, and the photovoltaic megawatt house Ad-Hoc network communication system adopts the Ad-Hoc network communication manager.
Owner:ZHEJIANG CHINT ELECTRIC CO LTD

Authentication service cluster-based portal keep-alive system, method, authentication system and method

ActiveCN105516171ASolve the problem that it cannot be sent to the access control device normallyTransmissionIp addressCluster based
The invention relates to a WLAN security access technology and discloses an authentication service cluster-based portal keep-alive system, method, authentication system and method. The objective of the invention is to solve a problem that a portal message cannot be normally sent to access control equipment due to inconsistency of access control equipment keep-alive and load portal service nodes. The portal keep-alive system of the invention includes access control equipment which continuously sends keep-alive messages carrying equipment serial numbers to a load balancer through NAT equipment, the NAT equipment which performs NAT conversion on source IP addresses and source ports in the keep-alive messages, transmits converted IP addresses and ports to the load balancer, and stores mapping relations of the IP addresses and port numbers before and after conversion, the load balancer which balances the keep-alive messages onto a certain portal service node, and the portal service node which stores the equipment serial numbers, the IP addresses and port numbers after the NAT conversion, and the correlation relationship of the IP address of the portal service node which receives the keep-alive messages after receiving the keep-alive messages. The systems and methods of the invention are suitable for portal authentication in enterprise authentication service clusters.
Owner:MAIPU COMM TECH CO LTD

Equipment unlocking method and device, terminal equipment and medium

The invention discloses an equipment unlocking method and device, terminal equipment and a medium and belongs to the technical field of computers. The method comprises a step of outputting a graphic authentication code generated based on a random number and a lock equipment serial number, a step of receiving verification information returned by a terminal based on a scanned graphic authenticationcode, wherein the verification information is obtained by encrypting a private key pair random number set based on a corresponding lock equipment serial number, a terminal serial number and a number of unlocking times, a step of decrypting the verification information by using a stored public key to obtain the random number, the terminal serial number and the number of unlocking times, and a stepof carrying out information verification based on the random number, the terminal serial number and the number of unlocking times included in the verification information, and executing an unlocking operation when the verification is successful. In this way, remote data processing by a server is not required, the cumbersome steps of the information verification are simplified, and the maintenancecost of equipment unlocking is reduced.
Owner:BEIJING HAITAI FANGYUAN HIGH TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products