Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

112 results about "Identity correlation" patented technology

In information systems, identity correlation is a process that reconciles and validates the proper ownership of disparate user account login IDs (user names) that reside on systems and applications throughout an organization and can permanently link ownership of those user account login IDs to particular individuals by assigning a unique identifier (also called primary or common keys) to all validated account login IDs.

Method and apparatus for controlling multiple logical data flow in a variable data rate environment

A method and apparatus that enables incremental control the flow of downlink data on an external interface-by-interface basis, reducing the risk of repeatedly exhausting internal memory resources. A mobile device (300), having a plurality of device interfaces (328–330) for transmitting data received from a network (306) through a network controller (302), includes an identity associating layer (322) that associates identifiers with packet data protocol contexts corresponding to the plurality of device interfaces. A general resource indicator (334) generates a first indication in response to system memory of the mobile device being substantially exhausted, and a private resource indicator (336) generates a second indication in response to private resources corresponding to the plurality of device interfaces being substantially exhausted. A control processing unit (332) generates a flow control indication signal in response to the first indication, the second indication, flow control information corresponding to the plurality of interfaces, and the identifiers associated by the identity associating layer. A bit-map generator (338) generates a bit-map, based on the flow control indication signal, that is transmitted to the radio network controller, which interprets the bit-map to discretely control transmission of data from the radio network controller to the plurality of device interfaces.
Owner:GOOGLE TECH HLDG LLC

Input device to continuously detect biometrics

A method and system for correlating control surface finger pressures to identifying biometric characteristics of a user from a computer input device, such as a mouse. Pressure sensors attached to a computer mouse sense the biometric characteristics, which are correlated to identifying biometric characteristics using a correlation model. The correlation model is derived from a registration process in which a baseline biometric attribute-to-identity correlation is rendered based on statistical analysis of registration signals generated by users. During routine use, the correlation model is use to continuously authenticate the identity of the user from surface finger pressures on the computer mouse.
Owner:IKEHARA CURTIS SATORU +1

Vehicle identity authentication method based on virtual machine migration technology

The invention relates to the field of identity authentication of an internet of vehicles and discloses a vehicle identity authentication method based on the virtual machine migration technology. The vehicle identity authentication method based on the virtual machine migration technology comprises the following steps that a mobile on board unit sends an identity authentication request to a road side unit with an identity certificate of the mobile on board unit as a credential, after determining the legitimacy of the identity of the mobile on board unit, the road side unit turns on a virtual machine corresponding to the mobile on board unit, and identity relevant information of the on board unit is stored in the corresponding virtual machine; based on the position information of the on board unit, the current road side unit can determine the migration address, corresponding to the virtual machine, of the on board unit, namely, the network address of a target road side unit; when the connection between the on board unit and the current road side unit is interrupted and the on board unit is connected to the target road side unit, and the target road side unit detects the corresponding relation between the identity relevant information stored in the current virtual machine which is turned on and the identification certificate of the on board unit which requests identity authentication so that the identity legitimacy of the on board unit can be determined; the on board unit can have access to the virtual machine corresponding to the migrated on board unit through the target road side unit.
Owner:GUANGDONG UNIV OF TECH

Method for establishing and managing electronic diary by using WeChat platform

The invention discloses a method for establishing and managing an electronic diary by using a WeChat platform. The method comprises the following steps of paying attention to a public account having an electronic diary function by utilizing WeChat; sending diary information to the public account; saving the diary information to a cloud storage server and enabling the diary information to be associated with the identification of a user; storing the diary information as a diary of the user; obtaining position data of the user through an API (Application Program Interface) at the same time if the public account is authorized to read position information by the user, and storing the position data together with the diary information; enabling the user to check / download the diary at any time through a menu of the public account, and also enabling the diary to be directly published through a public account operator. The method for establishing and managing the electronic diary by using the WeChat platform, disclosed by the invention, is based on the WeChat platform, installation of software is not needed, the flow is saved, the use is easy, the privacy safety is ensured, the data are safer as cloud storage is adopted, and the user experience is good; in addition, the method is also applicable to QQ and other social platforms having public accounts and APIs, and the method comprises the steps of paying attention to QQ having an electronic diary function or the public accounts of other social software and then carrying out the same operation.
Owner:北京汇康益生科技有限公司 +1

Ciphertext conversion method in heterogeneous storage system, decryption method and decryption system

ActiveCN107086912ASafe and effective wayKey distribution for secure communicationPlaintextCiphertext
The invention provides a ciphertext conversion method in a heterogeneous storage system, a decryption method and a decryption system, wherein the ciphertext conversion method comprises the steps of: on the basis of the identity ID of an authorized visitor appointed by a data owner, and the public key pair and the private key pair of the system, obtaining an identity-based decryption private key associated with the identity ID of the authorized visitor; on the basis of the access strategy appointed by the data owner and the identity-based decryption private key, obtaining a conversion key through an attribute-based encryption method; and, on the basis of the conversion key, converting an identity-based ciphertext to obtain an attribute-based ciphertext. By means of the ciphertext conversion method in the heterogeneous storage system, the decryption method and the decryption system provided by the invention, on the premise that a plaintext is not leaked, the identity-based ciphertext is converted into the attribute-based ciphertext; the fact that two encryption systems independently operate and are not influenced mutually can be ensured; and thus, a safe and effective way is provided for sharing secret data by users of two sets of storage systems having different encryption algorithms.
Owner:STATE GRID CORP OF CHINA +2
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products