Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

209 results about "Identification key" patented technology

In biology, an identification key is a printed or computer-aided device that aids the identification of biological entities, such as plants, animals, fossils, microorganisms, and pollen grains. Identification keys are also used in many other scientific and technical fields to identify various kinds of entities, such as diseases, soil types, minerals, or archaeological and anthropological artifacts.

Performance markers to measure benchmark timing of features in a program

A method, apparatus, and article of manufacture provide a mechanism for inserting performance markers into programs to obtain and provide data regarding the run-time benchmark timing of the programs. The computing system has an init module for determining if the benchmark timing data is to be collected during the operation of the application program, a performance marker module for obtaining and storing the benchmark timing data for later retrieval, and an uninit module for formatting and storing the obtained benchmark timing data into memory that permits retrieval after the termination of the application program. The init module is executed before any benchmark timing data is collected. The performance marker module is executed each time benchmark timing data is to be collected. The uninit module is executed after all benchmark timing data desired has been collected. The method and computer data product relate to a computer implemented process that inserts one or more code markers into the application program at locations within the application program corresponding to the point at which benchmark timing data is desired and that determines if benchmark timing data is to be collected at each code marker by checking for the existence of processing modules identified by an identification key within a system registry.
Owner:MICROSOFT TECH LICENSING LLC

System and method for carrying out security protection on phone information based on coincidence of fingerprint and navigation keys

The invention discloses a system and a method for carrying out security protection on phone information based on the coincidence of fingerprint and navigation keys. The system comprises an upper phone cover, a bottom phone cover, and a main circuit board, wherein the main circuit board is arranged between the upper phone cover and the bottom phone cover, the main circuit board is provided with a navigation key, the navigation key is provided with a fingerprint acquisitor, and the fingerprint acquisitor is correspondingly arranged in a key hole of the upper phone cover. Compared with the prior art, the system and method disclosed by the invention have the advantages that: through setting a navigation operation key and a fingerprint identification key of a smart phone as an operation key, when a user of the phone carries out operation through fingerprints, the fingerprints of the user are identified, thereby not only ensuring the identification on the identity of the user and realizing the information security, but also avoiding verbose phone operations, so that the user realizes two modes (namely, security authentication and phone operation) through an action, in such a way, the operation efficiency of the phone is improved, and the information security is ensured.
Owner:SHENZHEN GIONEE COMM EQUIP

Identity identification key system for rented automobile and control method

The invention discloses an identity identification key system for a rented automobile and a control method. The system comprises a user terminal, a server, a controller, a remote communication module, an automobile door identity identification module and a one-key start identity identification module, wherein the controller, the remote communication module, the automobile door identity identification module and the one-key start identity identification module are arranged on the automobile. A user can communicate with the server through the user terminal and obtain the use right of the automobile after paying a deposit or passing identity authentication, then the user terminal obtains identity information of the user through an identity identification module arranged on the user terminal and sends the identity information of the user to the server, the server sends the identity information of the user to the controller of the automobile through the remote communication module of the automobile, and the user can open an automobile door through the automobile door identity identification module of the automobile and start and drive the automobile through the one-key start identity identification module. By the adoption of the system, after the identity information of the user is successfully uploaded, the user terminal does not need to be carried in the following use process, use is convenient and quick, the system is simple in structure, low in cost and high in safety degree, and the automobile can be rented without a key in a self-service manner.
Owner:XIAMEN UNIV OF TECH

Service broker for processing data from a data network

A method and system for communication between server-less computing devices or clients in computers communicating over networks, such as the World Wide Web (WWW) using stateless protocols, e.g., HTTP. In this scheme there are two classes of clients which can operate independently or can be combined in computer communicating over the network: a) Clients that issue commands and request status or data, and b) clients which function as service brokers for provide services and processing commands, updating status and providing specific data. Based on the description of the latter client device it would resemble a server device but without accessible TCP / IP ports. Each service providing device is authenticated, retains a unique identity and establishes a soft state with the globally accessible server or servers. All devices and clients can compile and process a globally common command language established between all communicating network clients. The central server includes a CGI processing program and a database to retain client specific information. The server database represents a collection of queues, each having a client unique identifiable status, pending commands and / or data components. In this scheme commands and signaling transmitted between the servers and clients utilize standard HTTP protocol semantics and HTML or standard markup language syntax. Clients encapsulate or embed information as parameters passed to HTTP CGI as a set of standard HTTP conversations. A CGI processing program converts, parses or processes each conversation and passes arguments with or without data to queues. Each conversation is includes a client identification key(s) and commands which are structured as attribute-value pair tuples. The service-handler client connects to the central server and accesses the client queue on the central server to check for any pending commands or update their status in either synchronous or asynchronous manner. The synchronous server access scheme is regulated temporally by either deterministic clocking on server response or by a server based adaptive algorithm which can monitor network and client activities and optimize client access patterns.
Owner:XANBOO

Cotton remote sensing monitoring method based on phenological analysis

ActiveCN108363949ARealize remote sensing automatic extractionAccurate and fast extraction resultsCharacter and pattern recognitionIdentification keyClassification methods
The invention belongs to the field of agricultural remote sensing, and particularly relates to a cotton remote sensing monitoring method based on phenological analysis. The cotton remote sensing monitoring method comprises the steps of: combining regional cotton spectral signature analysis and interferencing crop phenological analysis, and making cotton identification key time phases clear; acquiring a remote sensing image of a key phenological period, and preprocessing the remote sensing image; performing multi-scale segmentation on a multi-time-phase image, constructing classifiers in a layered manner, and extracting cotton information primarily; performing secondary segmentation on a cotton information primary result and possible mixing and separating objects, combining cotton spectralfeatures and texture features to construct a classifier, removing mixing and separation, and supplementing cotton information omitted in extraction; and merging extracted cotton information subclasses, outputting and drawing a graph. The cotton remote sensing monitoring method based on phenological analysis realizes automatic extraction of cotton planting information through combining phenological period analysis of cotton and interferencing crops with a layered classification method based on the remote sensing image, fully considers the spectral difference and texture features of the cottonand interferencing crops, makes the cotton planting information extraction result more precise and rapid, and is easy to popularize and use.
Owner:TWENTY FIRST CENTURY AEROSPACE TECH CO LTD

Method for automatically updating identification private key and password system

The invention relates to a method for automatically updating an identification private key and a password system. The method comprises the following steps: when a password module or a background detection program detects that a new identification private key needs to be obtained for a user, using a security credential stored in a user computer locally to apply an identification key service system to obtain the new identification private key; after the identification key service system verifies the validity of the security credential, generating the new identification private key for the user, using an identification public key corresponding to a previous time period of the time period corresponding to the updated identification private key to encrypt the generated updated identification private key, and then returning the encrypted updated identification private key to the password module or the background detection program to be stored locally; and if the password module or the background detection program discovers that the encrypted updated identification private key is stored in the user computer locally and that a user identification private key for decrypting the encrypted updated identification private key is available, then performing decryption by sung the private key of the user to obtain the updated identification private key.
Owner:WUHAN UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products