Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

172 results about "Verification problem" patented technology

Digital watermark production and recognition method used for audio document

InactiveCN101345054AGuaranteed robustnessSolve the problem of copyright certificationSpeech analysisFrequency spectrumDigital watermarking
The invention discloses a digital watermark manufacture method and a recognition method used for audio files. The watermark is added in the audio digital file to be processed and taken as copyright marking information; the method of the invention is characterized in that the watermark is realized by adopting converted voiceprint information and comprises the steps as follows: a section of speech signals with copyright identification is colleted and a voiceprint watermark image is gained; the speech signal is converted into one-dimensional two-value sequence group; the gray-scale value of each matrix unit is presented by adopting an eight-bit binary number; the audio file where the watermark is to be inserted is divided into sections; frequency domain transformation is respectively carried out to each audio section so as to obtain the frequency spectrum file; a bit of one-dimensional two-value sequence group watermark data is embedded into each section of the frequency spectrum file; the embedding method is a method used for quantitatively modifying the frequency spectrum file coefficient; reverse conversion is carried out so as to obtain the audio data of the embedded watermark; the audio data is combined with the audio data which is processed so as to obtain the audio digital file with the digital watermark. Reverse separation operation is carried out during the recognition process. The method of the invention effectively solves the copyright verification problem of the digital audio product.
Owner:SUZHOU UNIV

Comprehensive verification system and method for identities and documentary evidences

The invention relates to a comprehensive verification system and method for identities and documentary evidences, and belongs to comprehensive credential verification systems and methods. According to the comprehensive verification system, a verification system website is established, and the verification system website serves as a verification center; the verification system website is connected with a terminal of the verification system website through a network to form a verification network system. Individual registration information and unit registration information are included in the verification system website, and are the bottom layer basic information of the verification system website. According to the method, a registration method and a verification method are included, unique verification email addresses are automatically generated by using identity numbers and organizing institution codes and serve as verification bases, and simple, convenient and reliable verification is achieved. Wrong identity cards, repeat identity cards and fake identity cards can be conveniently and fast found and screened, and the problem of train ticket wiped by ticket touts can be solved; fake official seals and credentials can be identified; the problem of social insurance and birth certificate verification can be solved.
Owner:SHANGQING IND SHANGHAI +1

System that employs inferencing for troubleshooting complex user authentication problems

A system that uses inferencing to deal with complex authentication problems such as those that occur when users authenticate themselves by means of tokens. A troubleshooter responds to a user's request for help by inputting an identification code for the user's token into the system. The system uses the identification code to obtain the current authentication state for the token from an authentication database and then inputs the authentication state to an inferencing system such as a knowledge base. The inferencing system uses the authentication state to make inferences concerning the problem. The inferencing process may involve obtaining further information from the troubleshooter an / or the authentication database and may also provide warnings of particular security problems to the troubleshooter. Eventually, the inferencing system reaches a solution, which may include advice that the troubleshooter is to give to the user. The solution may also involve a modification to the authentication database. When that is the case, an indication from the troubleshooter that the system is to modify the database causes the system to automatically perform the modification. In a preferred embodiment, communication between the troubleshooter and the system is via World Wide Web protocols.
Owner:PLUM SOFTWARE ASSOCS

Verification code of image array

The invention discloses a verification code of an image array. The verification code comprises a verification code module, a service logic module, a database and the like. According to the verification code of the image array, a series of relevant or random images are generated through a system according to verification code generation logic to form the image array, a verification problem is generated based on the content or representation of an object of the image array and displayed on a user side, a user is requested to read and comprehend the verification problem based on the image array according to prompts, the user reads the image array and the verification problem, the corresponding verification code is written, the system compares the verification answer written by the user with the answer corresponding the verification promoting mode, and if the two answers are the same, it is considered that the verification code of the use is correct. Due to the fact that the verification problem and the corresponding verification code used as the answer are generated based on the image array and the representation and semantics of the content, the safety of the system of the verification code is improved, and automatic identification of a machine program is effectively prevented.
Owner:SHANGHAI BOLU INFORMATION TECH

Two-dimensional code e-ticket generation method and system, two-dimensional code e-ticket verification method and verification terminal

The present invention relates to a two-dimensional code e-ticket generation method and system. The method comprises the following steps: A) generating a group of public keys and private keys for an assigned ticket business activity; B) distributing the only one number and verification inlet information for one ticket of the assigned ticket business activity; C) encrypting selected attribute information in the basic attribute information of the ticket including the only one number and the verification inlet information through adoption of the private keys to obtain the selected attribute information cryptograph of the ticket, wherein the public keys are used for supply the selected attribute information cryptograph to the verification terminal for decryption; and D) generating the two-dimensional code electronic ticket of the ticket through adoption of the basic attribute information and the selected attribute information cryptograph. The present invention further provides a two-dimensional code e-ticket verification method and a verification terminal. The true and false determination of an electronic ticket, the shunting of electronic ticket verification and eradicating of reusing of the electronic ticket are realized, and the safety verification problem of the electronic ticket in the non-network environment is solved.
Owner:AEROSPACE INFORMATION

Multithreaded program output uniqueness detection and evidence generation method based on program constraint building

The invention provides a multithreaded program output uniqueness detection and evidence generation method based on program constraint building. The output uniqueness verification problem is converted into a constraint solving problem by building a constraint expression according to the multithreaded program semanteme, a constraint solver is used for detecting whether different outputs are present and counter-example execution paths explaining different outputs are generated; the multithreaded program output uniqueness detection and evidence generation method comprises the steps of firstly, carrying out the instrumentation of the detected program, executing the program and obtaining an execution path, secondly, converting the execution path into a quantifier-free first-order logic expression covering all feasible thread interleaving according to the multithreaded program execution semanteme, thirdly, building a uniqueness verification condition aiming at the output result of once operation, and finally, verifying whether one path is present so that the output value is inconsistent with the operation result by use of the constraint solver. The method is capable of detecting whether the output of the multithreaded program is unique under given input; in case of non-uniqueness of the outputs, a counter-example sequence is shown to explain the trigger process of the non-uniqueness.
Owner:XI AN JIAOTONG UNIV

Fast response and support method for out-of-cabin in-orbit maintenance ground of spacecraft cabin

InactiveCN107255938AThe simulation verification method is simple and economicalThe verification result is accurateSimulator controlOrbitResponse capacity
The method provides a fast response and support method for the out-of-cabin in-orbit maintenance ground of a spacecraft cabin. The method comprises the steps of (1) providing a maintenance plan of the out-of-cabin fault equipment, wherein the maintenance plan comprises a maintenance transfer path, a maintenance operation process and a human-computer work efficiency evaluation standard; (2) establishing a three-dimensional model of a spacecraft cabin body, simulating the layout of all equipment outside the spacecraft cabin body, simulating and verifying the maintenance transfer path, judging whether the transfer path is blocked by external equipment or not; (3) testing and verifying the maintenance operation, recording the operation torque and the operation time; (4) judging whether the operation moment and the operation time conform to the human-computer work efficiency evaluation standard specified in the maintenance plan or not; (5) determining a maintenance scheme available for the out-of-cabin in-orbit maintenance of astronauts. Based on the method, the out-of-cabin equipment maintenance scheme of an in-orbit burst fault can be quickly determined. Therefore, the fast response capability within one hour can be realized. Moreover, the economical efficiency is excellent. The rapid verification problem of the large-mass external maintenance of a space station can be solved.
Owner:BEIJING SPACE TECH RES & TEST CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products