Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

33results about How to "Improve anti-cracking performance" patented technology

User identity authentication method and device and authentication service system

The invention is suitable for the field of computer security, and provides a user identity authentication method and device and an authentication service system. The method comprises the following steps: generating an authentication picture group and an authentication tag, and issuing the authentication picture group and the authentication tag to a client; receiving authentication information transmitted by the client, wherein the authentication information comprises a picture identifier of a picture selected by a user from the authentication picture group according to the authentication tag; and acquiring a tag of a picture corresponding to the picture identifier in the authentication information, and matching the tag of the picture corresponding to the picture identifier in the authentication information with the authentication tag in order to authenticate the identity of the user. The authentication method provided by the invention has high crack resistance and high security.
Owner:SHENZHEN TENCENT COMP SYST CO LTD

Method for directly and arbitrary separating code to encryption lock from software to implement protection of software protection

The invention provides a method for separating code to an encryption lock from an executable file directly comprising separating code to an encryption lock from an executable file directly, setting a clock timer and a random number generator in the intelligent card encryption lock, filling an interactive code for communication with the encryption lock in the vacancy of the executable file after the code is separated, the encryption lock dynamically decomposing, encrypting and protecting the code that is separated into the lock and needed to be executed continuously by using a specific protocol and algorithm, wherein a plurality of blocks are generated and the release of the block is determined by the normal executed time of the previous block, if the request for demanding the next block sent from the interactive code arrives in the encryption lock in the normal time period, an effective information will be released from the encryption lock, if not, an ineffective information is released. Moreover, a layer of encryption lock filter drive program is added to the encryption lock and the interactive code. Thereby, the illegal monitor and interception of the communication data in the communication link and system are prevented.
Owner:吴晓栋

Identity verification method and apparatus

InactiveCN104917724AImprove user experienceImprove the ability to resist crackingUser identity/authority verificationEmbedded systemDeclassification
The invention relates to an identity verification method and apparatus which have the advantages of being high in declassification capability and improving the normal user pass rate. The method comprises the following steps: a user terminal sending a verification code extracting request to a server; receiving and displaying a verification code picture returned by the server according to the verification code extracting request and an input interface, wherein the content of the verification code picture comprises multiple verification objects arranged according to a predetermined sequence, the content of the input interface comprises multiple objected to be selected, and the multiple objects to be selected at least comprises all the verification objects in the verification code picture; detecting touch control operation acting in the input interface, and when the touch control operation is preset touch control operation, obtaining the touch control position and time of the touch control operation; and sending the touch control position and time of the touch control operation to the server, and when the server determines the objects which the touch control operation acts on include and only include all the verification objects in the input interface and a touch control sequence is the same as the predetermined sequence according to the touch control position and time, approving verification.
Owner:TENCENT TECH (SHENZHEN) CO LTD

Steel bar truss floor deck

InactiveCN106567488AGood structural size consistencyReasonable forceFloorsBuilding reinforcementsArchitectural engineeringRebar
The invention discloses a steel bar truss floor deck which comprises a base plate and a plurality of steel bar assemblies. Each steel bar assembly comprises at least one bottom chord piece, an upper chord steel bar and two web member steel bars, wherein each bottom chord piece comprises two parallelly extending first steel bars and a first connecting steel bar which is connected with the first ends of the two first steel bars, and the bottom chord pieces are arranged above the base plate; the upper chord steel bar is arranged above the uppermost bottom chord piece; each web member steel bar is in an S shape, extends from one end of the upper chord steel bar to the other end of the upper chord steel bar, is fixedly connected with the top face of the base plate, the inner sides of the two first steel bars and the upper chord steel bar, and comprises a plurality of steel bar sections, and each steel bar section extends from one side of the upper chord steel bar to the other side of the upper chord steel bar; and the two web member steel bars are separately arranged on the two sides of the same position of the upper chord steel bar. The steel bar truss floor deck is rapid in construction progress, and the occupied area of a workyard is saved.
Owner:BEIJING URBAN CONSTR NORTH CONSTR

Shared key processing method and device, storage medium and electronic equipment

The invention relates to a shared key processing method and device, a storage medium and electronic equipment. The method comprises the following steps: generating a parameter matrix according to thesafety parameters; randomly generating a first private key matrix and a first noise matrix, parameter matrix, a first private key matrix and a first noise matrix, determining a first public key matrix, and removing information on a specified bit of each element in the first public key matrix so as to update the first public key matrix; sending the updated first public key matrix and the security parameters to a receiving end, so that the receiving end determines a second public key matrix according to the security parameters, and encrypts the shared key according to the updated first public key matrix and second private key matrix to obtain consensus information; receiving the second public key matrix and the consensus information sent by the receiving end, and decrypting the consensus information according to the first private key matrix and the second public key matrix to obtain the shared key. The communication bandwidth is reduced by removing information on a specified bit of eachelement in a public key matrix.
Owner:AEROSPACE INFORMATION

Information verification method based on audio frequency and device

The invention discloses an information verification method based on audio frequency and a device. The information verification method based on audio frequency comprises steps of randomly acquiring pre-stored audio frequency data from an audio frequency database, transmitting the above audio frequency data and sending mapped prompt information carried by the audio frequency data to the user terminal, receiving verification information returned by the user terminal according to the audio frequency data and the prompt information, determining whether accuracy of all characters in the verification information which are inputted by a user achieve a preset threshold corresponding to the verification mode according to the verification mode of the mapping of the prompt information, and if yes, verifying and passing the verification information inputted by the user. Compared with the prior art, the system adopts the same playing tones to play the verification prompt tones having the same durations. The embodiment of the invention improves the cracking resistance of voice verification codes and improves the safety of the voice verification and flexibility of information verification, and has a certain error tolerance performance in the process of verifying information.
Owner:TENCENT TECH (SHENZHEN) CO LTD

Verification code interference method and server

An embodiment of the invention discloses a verification code interference method. The method comprises the steps of drawing a foreground character on a blank drawing board to generate and obtain a character content picture, and performing Gaussian blur processing on a background picture to generate and obtain a blurred picture; performing image fusion processing on the background picture, the blurred picture and the character content picture to obtain a verification code picture; receiving a verification code obtaining request sent by a network server; and sending the verification code pictureto the network server, thereby enabling the network server to send the verification code picture to a user terminal for enabling the user terminal to display the verification code picture to prompt auser to input a check code and submit the check code to the network server for performing check. An embodiment of the invention furthermore discloses a verification code generation server. By adopting the method and the server, the anti-cracking capability of a verification code can be improved.
Owner:TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products