Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

30results about How to "Build trust" patented technology

Decentralized Internet-of-Things cross-domain access authorization method and system

The invention discloses a decentralized Internet-of-Things cross-domain access authorization method and system, and the method comprises the steps: building a blockchain network after initializing a trust domain system, and setting authentication servers in a plurality of trust domains as blockchain nodes; generating a private key for the equipment in the corresponding domain through the authentication server in each trust domain, and storing the system information of each trust domain in the blockchain; when the equipment authentication server initiates a cross-domain authorization application, enabling the authentication server to perform authorization and threshold signature on the equipment through the intelligent contract; when the equipment performs cross-domain access, performing identity authentication on the equipment through an authentication server in an accessed trust domain; and if the identity verification is passed, querying authorization information of the equipment through the blockchain network, verifying an authorized threshold signature, and allowing the equipment to perform cross-domain access after the signature verification is passed. According to the invention, decentralized cross-domain access authorization of the Internet-of-Things equipment can be realized, and the autonomy and initiative of the trust domain are ensured.
Owner:GUANGZHOU UNIVERSITY

Cloud logistics platform and construction method

PendingCN110717716ARealize reasonable storageIncrease stickinessLogisticsLogistics managementBusiness enterprise
The invention discloses a cloud logistics platform and a construction method, and belongs to the technical field of cloud logistics. The invention provides the cloud logistics platform and the construction method of the logistics platform, and the logistics platform comprises a platform system architecture, a big data processing center and a user layer. The construction method of the logistics platform comprises the following steps: S1, constructing a logistics task; S2, establishing a service resource library; S3, constructing a logistics task and cloud logistics service resource combinationmodel; S4, performing big data mining and logistics demand prediction; S5, performing logistics storage planning and joint inventory optimization; and S6, performing logistics transportation and terminal distribution optimization. Through the cloud logistics platform, the relationship between the logistics resource provider and the logistics demand can be well communicated. Sharing and on-demand using of logistics resources, logistics capacity and logistics knowledge are achieved, selection, communication and service matching are provided for enterprises and individuals with logistics demandsthrough a public cloud logistics service platform, and logistics services which are obtained by users at any time, serve on demand, safe, reliable, high in quality and low in price are achieved.
Owner:安徽九州通智能科技有限公司

Financing method and equipment based on block chain intelligent contract technology

ActiveCN113240530AImprove turnover rateReduce malicious disruption of the financing marketDatabase updatingFinanceSmart contractOperations research
The invention provides a financing method and device based on a block chain intelligent contract technology. The method comprises the following steps: in response to a creation request of a fund borrower, creating a financing smart contract in a block chain system; enabling the financing intelligent contract to obtain financing information set by the fund borrowing party, fund borrowing party information and loan information set by the candidate fund loaning party; establishing a candidate fund loan party sequence, and when the financing smart contract starting time in the financing smart contract is reached, generating a loan strategy; and enabling the financing intelligent contract to select a fund loaning party according to the loan strategy, transfer a specified amount of fund from the account of the fund loaning party to the account of the fund borrowing party, generate a financing record, and write the financing record into the block chain system. In this way, more investors are promoted to participate in the financing plan, and financing activities are transparent and open, cannot be tampered and are more flexible; and a trust mechanism is established, so that the default rate, the investment threshold and the investment difficulty are reduced, and the fund flow rate, the financing efficiency and the social resource utilization rate are improved.
Owner:中通服创发科技有限责任公司

GPSR secure routing protocol implementation method based on block chain trust model

The invention provides a GPSR security routing protocol implementation method based on a block chain trust model. The method comprises the following steps of: S10, enabling a trusted authority (TA) to initialize vehicle network system parameters according to an RSA algorithm; S20, when the vehicle enters the Internet of Vehicles, performing network access identity authentication; S30, periodically broadcasting a real coordinate position after any node vehicle-mounted unit OBUi completes network access authentication, adjusting a trust value of the OBUi based on a Tmbore trust model, and completing node routing role judgment and block chain storage according to the trust value; and S40, performing secure routing calculation. According to the GPSR secure routing protocol implementation method based on the block chain trust model, the mobile edge computing technology and the block chain technology are combined, and the Tmbore trust model is designed and used for improving the security of a GPSR routing protocol, realizing secure and reliable storage of trust values and lightweight discrimination of authenticity and reliability of routing nodes, and improving the security of the GPSR routing protocol, and improving the security of the GPSR routing protocol is improved.
Owner:NANTONG UNIVERSITY +1

QR code payment method based on mobile phone business card, and system thereof

PendingCN111553678ASave operating timeReduce transaction implementation costsPayment protocolsBusiness cardComputer security
The invention relates to a QR code payment method based on a mobile phone business card, and a system thereof. The QR code payment method is realized by a payment system and a mobile phone business card system, and comprises the following steps: a request receiving step, a mapping establishment step, a distribution step, an account acquisition step, and a binding step. Therefore, the binding of the bank card information and the user business card can be realized. According to the QR code payment method based on the mobile phone business card and the QR code payment system based on the mobile phone business card, compared with traditional QR code card binding opening, a user does not need to download a client or input bank card information in the card binding work, and the user operation time is greatly shortened, and the card binding threshold is reduced, and the use willingness is improved.
Owner:CHINA UNIONPAY

Big data e-commerce shopping guide system

The invention relates to the technical field of business shopping guide, in particular to a big-data e-commerce shopping guide system. The big-data e-commerce shopping guide system includes a data acquisition module, the data acquisition module is connected with the business platform module in a signal connection mode. Meanwhile, the business platform module is in signal connection with the data storage module; data information in the business platform module is transmitted to the data storage module to be stored; the business platform module is in signal connection with the propaganda module;the business platform module comprises a mobile base station module. The mobile base station module receives the data information collected by the data acquisition module; the data is transmitted tothe cloud big database module through the wireless transmission module to be processed, the processed data is transmitted to the internal server module, and the data information is transmitted to theinternal computer control module through the internal server. Propaganda strength on commodities can be improved, and meanwhile the sales volume of the commodities is increased.
Owner:温州红秀招信息科技有限公司

Method and system for real world verification of a person and/or business identity at a central location for real and virtual world

InactiveUS20080301789A1New of revenueEffectively deter potential fraudDigital data processing detailsUser identity/authority verificationService provisionVirtual world
The method and system of the present invention provides a central location, such as the United States Postal Service® (USPS), a product that will advance them into the world of internet business and will in turn offer the opportunity for new sources of revenue. The method and system of the present invention has the facilities to verify a person's and / or businesses identity. The verification process can be done in the same manner as money order, check cashing and real P.O. boxes, which are currently limited to availability in the post office. If the user is verified at the central location, the user's e-mail address, domains, ISP, WSP, and Web Sites can be globally registered at one or more e-mail servers or service providers that participate with the verification. The e-mail server or service providers can attach a symbol of the identity verification on all e-mail sent by the e-mail server or service provider from the verified customer.
Owner:FOSTER FREDERICK D

Device and method for realizing offline social contact

PendingCN111464604AFull trust relationshipFully build trustSubstation equipmentData switching networksEmbedded systemInternet of Things
The invention discloses a device and a method for realizing offline social contact. The device comprises an offline connector module, an on-cloud service platform module and a terminal service module.The method is characterized in that the offline connector module comprises a mainboard part, a lithium battery, a GPS antenna, a charging coil, a shielding layer, a Bluetooth antenna and a GSM antenna. The mainboard part is designed based on a PCB, Bluetooth, a GPS module and GSM communication are additionally arranged on the PCB, a GSM antenna is arranged on one side of the GSM communication. The method comprises the steps that S1, bounding a seat; S2, reserving 'seats' online; S3, making an online seat appointment; S4, fulfilling offline appointment. A position function is used for reference, Internet of Things hardware is newly added as an anchor point, a B2B2C offline communication system is provided for merchants, an offline connector is used as a core device of the device and the method, and a position-based authentication effect is mainly provided.
Owner:杭州雄芯物联科技有限公司

Calculation method and calculation system of social-network user trust

The invention discloses a calculation method and a calculation system of social-network user trust. The calculation method of the social-network user trust includes: S100, calculation of a trust factor; and S200, calculation of a trust prediction value. By utilizing the calculation method and the calculation system of the social-network user trust of the invention, a trust relationship between users can be established without the need for providing trust attribute information of the users by the users. The calculation method has a very high prediction speed and higher prediction precision; successfully explains technical problems of trust propagation and trust imbalance in trust chains; successfully solves a technical problem that transmission of the trust often fails, and can ensure thattransmission of the trust always succeeds; can effectively filter out malicious users, is higher in security, and thus can ensure that a social network is more secure; and is more wider in a scope ofapplication , and has a huge market promotion value.
Owner:HENAN UNIV OF SCI & TECH

A microsatellite multiplex pcr method for paternity identification of oyster oyster

The invention discloses a microsatellite multiplex-PCR (Polymerase Chain Reaction) method for carrying out a paternity testing on crassostrea gigas. The microsatellite multiplex-PCR method comprises the following steps of extracting parent and offspring DNA (Deoxyribose Nucleic Acid); carrying out multiplex-PCR amplification on extracted DNA samples by using 18 microsatellite sites and M13 (-21) universal primers with fluorescent marks; detecting a fluorescent signal of an amplified product, and obtaining parent and offspring gene type data; carrying out genetic relationship identification on the parent and the offspring. The microsatellite multiplex-PCR method disclosed by the invention verifies that two groups of multiplex-PCR combinations are used for carrying out the paternity testing on 12 crassostrea gigas full-sib families, so that the identification success rate is up to 100 percent; a set of DNA mark-based paternity testing technology which is economic and effective and is high in accuracy is provided for the crassostrea gigas; by a genealogical relationship record obtained through microsatellite mark identification, producing places of individual crassostrea gigas can be traced back, so that a tracking and source tracing technology of crassostrea gigas products can be established, and powerful technical support can be provided for solving food safety problems which are increasingly concerned by people in nowadays society.
Owner:OCEAN UNIV OF CHINA

Rule based service level protocol management system and method

The invention relates to a rule based service level protocol management system and method. The method comprises that an interaction interface capable of customizing services is provided for a servicerequester, and a service level protocol in which services are selected is customized; a service request submitted by a user is received, a corresponding service level protocol matches the service request automatically, and a corresponding executer and execution time are configured according to the service level protocol; and a rule server provides a rule set for executing the service request and the service level protocol for the rule executer. The system and method have the advantages that different customized services and service strategies can be configured for different users flexibly, response time, update strategy, notification before overdue and the like can be configured, and rapid response to the users can be ensured; and the service level is quantified so that the users rely on aservice provider, and the service provider is helped to check service groups.
Owner:珠海国津软件科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products