Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

984 results about "Security validation" patented technology

Method for fast configuring remote video monitoring system

The invention discloses a method for fast configuring a remote video monitoring system. The method comprises the steps that (1) a wireless network access module is arranged on a monitoring camera; (2) currently available wireless networks are scanned by a monitoring client, a wireless network is selected and a wireless network password is input; (3) after receiving authentication information of the monitoring client, a monitoring server sends a safety verification code to the monitoring client; (4) the monitoring client converts an access point name, the password, the safety verification code and the authentication information to a two-dimension code picture, and the two-dimension code picture is placed in a shooting area of the monitoring camera; (5) the two-dimension code picture is shot through the monitoring camera and is analyzed, the monitoring camera has access to the wireless network, and an equipment serial number, the safety verification code and the authentication information of the monitoring camera are then sent to the monitoring server; (6) authentication is conducted on the monitoring client by the monitoring server according to information sent by the monitoring camera, and when the certification is passed, the monitoring camera and the monitoring client are bound to enter a monitoring module.
Owner:INST OF SOFTWARE - CHINESE ACAD OF SCI +1

Method and system for creating receipt on paper with embedded RFID tags therein

A central information processing system and method that issues receipts or tickets that can be securely validated at points of redemption. The method and system couple a client system with a server system and also couple at least one Radio Frequency IDentification (RFID) reader to the client system. The method and system read at least one identifier from a sheet with a RFID tag embedded therein with the RFID reader. The method and system also send the at least one identifier from the client system to the server system and receive from the server system at least one receipt image for printing on the paper with the RFID tag embedded therein. The method and system also print, at the client system, a receipt containing ticket information received from the server system. The server system further accepts at least one identifier that was read from a Radio Frequency Identification tag that was read from a sheet at the client system, records the at least one identifier, sends to the client system, in response to the accepting, at least one receipt image. Validation of the receipt or ticket includes reading, at a point of delivery, the at least one identifier from the Radio Frequency Identification tag and providing, in response to reading the at least one identifier, at least one of a good and a service.
Owner:FARRELL DAVID +2

Safety protection method for mobile terminal, mobile terminal, safety system and application method

The invention relates to a safety protection method for a mobile terminal, a mobile terminal, a safety system and an application method. The safety protection method is used for increasing the safety of the mobile terminal and is easy in operation. According to the safety protection method for the mobile terminal, a separate area is isolated on the mobile terminal and taken as a safety area, a third party application outside the safety area cannot access the application and data in the safety area, and a user is required to pass the safety verification in order to enter into the safety area. The safety system is characterized in that a cloud safety management platform is mainly used for performing mutual collaborative interlocking between the safety area of the mobile terminal, the system kernel of the mobile terminal and the cloud safety management platform, so that the running of the safety area under a safe and reliable environment is ensured, and the safety area is safe. A trust chain is built in the safety area, an application method for realizing the running access management for the application and data on the basis of the trust chain is adopted, and the biometric features recognition is taken as the verification for entering into the safety area, so that the safety is further promoted.
Owner:北京恒信安科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products