Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

188results about How to "Improve verification accuracy" patented technology

Authentication system and method based on intelligent mobile communication equipment

The invention provides an authentication system based on intelligent mobile communication equipment. The authentication system comprises more than one intelligent mobile communication equipment, more than one server, a client-side module and a server-side module; the client-side module is arranged in the intelligent mobile communication equipment and comprises an identification module, wherein the identification module is used for submitting an authentication request, acquiring identity information, identifying elements in the identity information and querying an authentication result; the server-side module is arranged in the server and comprises a certificate management module, an identity information management module and an authentication module and is used for realizing format and content management of various certificates, management of the identity information and authentication of effectiveness of the elements; the identity information comprises at least one element; and the client-side module and the server-side module are in data communication through a mobile communication network. The invention further provides an authentication method based on the intelligent mobile communication equipment. Due to adoption of the authentication system and method, the identity authentication can be rapidly, conveniently and accurately carried out.
Owner:ZHUHAI ZAIZHOU SOFTWARE TECH

Image watermark removal device

The invention relates to the technical field of image processing, in particular to an image watermark removal device. The image watermark removal device aims to provide a way of solving the technicalproblem that the picture quality of a restored image and face verification accuracy are low. In order to realize the purpose, the image watermark removal device can carry out watermark removal processing on a face image on the basis of a generative adversarial network model, wherein a generator in the generative adversarial network model can generate a corresponding watermark-free image corresponding to the face image, a discriminator can judge whether the integral image and the local image of the watermark-free image are true images or not; and an optimization module optimizes the generator and the discriminator. Furthermore, the device comprises a face recognition model to extract the face feature of a watermark-free original image and the face feature of the watermark-free image generated by the generator, and the generator and the discriminator are further optimized. By use of the technical scheme of the invention, while the high-quality watermark-free image can be obtained, information contained in the image is effectively protected.
Owner:INST OF AUTOMATION CHINESE ACAD OF SCI

Method and apparatus for acquiring images, and verification method and verification apparatus

In a verification apparatus, an image pickup unit picks up an image of an object to be verified. A calculation unit calculates, from the captured object image, a characteristic quantity that characterizes a direction of lines within the object image along a first direction or a characteristic quantity that characterizes the object image as a single physical quantity. Then a region from which data are to be acquired is set by referring to a characteristic quantity of the object image and, from this region, a characteristic quantity that characterizes a direction of lines within the object image along a second direction different from the second direction or a characteristic quantity that characterizes the object image as a single physical quantity is calculated. A verification unit at least verifies the characteristic quantity of the object image against that of a reference image along the second direction.
Owner:SANYO ELECTRIC CO LTD

Action recognition based living body face recognition method and system

The invention discloses an action recognition based living body face recognition method and system. The method includes steps of collecting a static face image of a user; outputting an action command generated randomly; collecting video information of the user responding to the action command; extracting an image in which the action of the user is matched with the action command in the video information as a dynamic face image; comparing the static face image with the dynamic face image, determining living body face recognition success when the matching degree is greater than a recognition threshold value or else determining living body face recognition failure.
Owner:南京合荣欣业金融软件有限公司

Lens module

A lens module includes a holder base, which is affixed to a circuit board and has bottom receiving holes for receiving LEDs or sensors on the circuit board and a top flange with a foolproof notch, a lens device press-fitted into the top flange and secured to the foolproof notch to ensure accurate positioning and having flat protrusions engaged into respective through holes in the holder base in alignment with the LEDs or sensors, and a top cover capped on the holder base to hold down the lens device and having through holes that receive convex portions of the lens device respectively.
Owner:INT CURRENCY TECH

Electronic device, firewall operation verification method and storage medium

The invention discloses an electronic device, a firewall operation verification method, and a storage medium. The verification method comprises the following steps: acquiring a source IP address and source port information of a client after receiving a request for acquiring service data sent by the client; traversing firewall white list generated in advance based on the source IP address and the source port information, querying a target IP address and target port information mutually mapped to the source IP address and the source port information in the firewall white list; executing an instruction for verifying the firewall operation by starting the corresponding thread count according to the mutually mapped target IP address and the target port information. The efficiency of verifying whether the firewall is in operation is improved, and the verification accuracy rate is improved.
Owner:PING AN TECH (SHENZHEN) CO LTD

Station entrance identity authentication method based on two-dimensional code

The invention relates to a station entrance identity authentication method based on a two-dimensional code. The method particularly includes the following steps: S1) providing an electric operation and maintenance communication management and control system for collecting and storing identity information of operation and maintenance workers to generate identity identification information; S2) encrypting the identity identification information to generate a cipher text by a system; S3) converting the cipher text into a two-dimensional code image by the system and sending the two-dimensional code image to a mobile terminal of the operation and maintenance workers; S4) providing a two-dimensional code scanning device, so that when the operation and maintenance workers enter the station for maintenance and show the two-dimensional code image on the mobile terminal, the two-dimensional code scanning device scans the two-dimensional code and analyses the identity information of the workers, and sends the analyzed identity information to the system for identification; and S5) receiving the verification result from the system by the two-dimensional code scanning device. The method solves the problem of identity identification of the operation and maintenance workers through the two-dimensional code and data encryption technologies.
Owner:STATE GRID FUJIAN ELECTRIC POWER CO LTD +1

Bill acceptor

A bill acceptor is constructed to include a housing, the housing having a base for holding a banknote for examination, a first light emitter adapted to emit infrared light onto the banknote carried on the base of the housing for examination, a second light emitter adapted to emit ultraviolet light onto the banknote for visual examination, an image sensor adapted to pick up infrared light reflected from the banknote carried on the base of the housing and to convert received light signal into image signal, and a display adapted to display image signal obtained from the image sensor for verifying the authenticity of the banknote.
Owner:INT CURRENCY TECH

Dual wireless signal electronic lock and unlocking method thereof

The invention provides a dual wireless signal electronic lock and unlocking method thereof. The dual wireless signal electronic lock comprises a first lock and a second lock. The first lock and the second lock are fixedly connected. The first lock comprises a position information module, a safety locking module and an electronic locking module. The position information module is used for obtaining geographic position information of the position and comparing the geographic position information with preset geographic position information, if the geographic position information is matched with the preset geographic position information according to the comparison result, the electronic locking module is controlled to be unlocked, and if the geographic position information is not matched with the preset geographic position information according to the comparison result, data receiving is cut off; the safety locking module is used for verifying that a worker initiating the unlocking operation has the unlocking condition; the electronic locking module is used for locking the first lock. The dual locks are adopted for locking, the safety coefficient is high, the first lock performs unlocking by adopting the geographic position information unlocking mode, on the basis of control of the safety locking module, the safety is high, and damage is not likely to be caused.
Owner:林琳

Person and credential verification system and method based on deep learning

The invention relates to a person and credential verification system and method, in particular to a person and credential verification system and method based on deep learning and belongs to the field of security guarding. The system comprises a training subsystem and a person and credential verification subsystem; the method includes a training process and a person and credential verifying process; the training process includes adopting a plurality of on-site facial images of known identities and credential photos to train the training subsystem; the person and credential verifying process includes utilizing the module parameters acquired through the training process, comparing the plurality of on-site acquired images of a discharged person with the credential photos corresponding to the information acquired by a credential reading module, and outputting the verification result whether the person consistent with the credential or not automatically. By the aid of the system and method, the credential photos and a plurality of facial photos acquired through an on-site video monitoring device can be compared effectively, the adaptability to facial angles, on-site environment, light emission and other factors is high, the accuracy of person and credential verification is high, and the discharging speed is high.
Owner:BEIJING ZHONGDUN SECURITY TECH DEV

No-load cutting-in modeling and experimental method of double-fed type wind-driven generator

The embodiment of the invention provides a no-load cutting-in modeling and experimental method of a double-fed type wind-driven generator. The modeling method comprises the following concrete steps: firstly, establishing a mathematical model for no-load cutting-in control of the double-fed type wind-driven generator; simulating a small-step cutting-in switch element in the double-fed type wind-driven generator by utilizing a valve switch which is controlled by binary control words in a real-time digital simulator (RTDS) of an electric power system; and realizing the simulation control of the double-fed type wind-driven generator from the no-load state to the cutting-in state by controlling the switching-on and the switching-off of the valve switch. The technical scheme of the invention can be implemented to realize the real-time simulation process of the double-fed type wind-driven generator from the no-load state to the cutting-in state, and the simulation model is used for carrying out the no-load cutting-in experiment on a variable-flow controller system of a practical double-fed type wind-driven generator, thereby providing real and accurate simulation environment and improving the verifying accuracy.
Owner:NORTH CHINA ELECTRIC POWER UNIV (BAODING)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products