Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

54results about How to "Increase the difficulty of recognition" patented technology

Reliable encryption transmission system and method of quantum cryptography network

The invention provides a reliable encryption transmission system of a quantum cryptography network. The reliable encryption transmission system comprises an encryption processing module and a decryption processing module, the encryption processing module is composed of an encryption strategy unit, a service data buffering shunt unit, a classic encryption unit and a quantum encryption unit, and the decryption processing module is composed of a cryptograph classification unit, a cryptograph data buffering unit, a classic decryption unit and a quantum decryption unit. Meanwhile, the invention further provides a reliable encryption transmission method of the quantum cryptography network. The classic encryption mode and the quantum one-time pad encryption mode are adopted for transmitting service data in a shunt mode, the shunt proportion of the service data can be timely and correspondingly changed according to changes of the quantum secret key supply-demand relationship, on the basis that the safety is guaranteed, the continuity of service data encryption transmission is improved, and the reliability of service data encryption transmission is improved. Meanwhile, the consumption of quantum secret key data is reduced, quantum secret key generation loads of the quantum cryptography network are reduced, and the cost of service data encryption transmission of the quantum cryptography network is reduced.
Owner:SHANDONG INST OF QUANTUM SCI & TECH

Fingerprint and gesture identification-based door lock control system

InactiveCN104821022ASolve the problem of only unlocking with fingerprint recognitionAdd gesture recognitionCharacter and pattern recognitionIndividual entry/exit registersControl signalControl system
The invention discloses a fingerprint and gesture identification-based door lock control system. The system comprises a processing module, a driving mechanism and a door lock device, and also comprises a memory module, a gesture identification module and a fingerprint identification module, wherein the gesture identification module comprises, sequentially connected, an induction screen, a shooting unit, a gesture acquisition unit and a gesture identification unit; the fingerprint identification module comprises a fingerprint acquisition module and a fingerprint extraction module; the memory module is used for storing initialized set fingerprint image and fingerprint-based gesture image; the fingerprint acquisition module acquires fingerprint, and extracts through the fingerprint extraction module to obtain the fingerprint image; the processing module matches the fingerprint image with the initiated fingerprint image; and a control signal is output to the induction screen when matching is successful to make the induction screen provide an induction platform, the shooting unit is used to monitor the gesture motion on the induction platform, the gesture acquisition unit acquires the gesture motion to obtain the gesture image, the gesture identification unit identifies the gesture image and inputs an identification result to the processing module, and the processing module controls the driving mechanism to unlock according to the identification result. The system based on two identification modes has improved identification function and safety coefficient.
Owner:WUXI CITY CHONGAN DISTRICT TECH ENTREPRENEURSHIP SERVICE CENT

Method and system for dynamic gesture recognition

The invention discloses a dynamic gesture recognition method. The method comprises the following steps: shooting the gesture by a 3D camera to obtain a group of hand motion videos with n frames of images; identifying m hand feature points in each frame image respectively, obtaining spatial coordinate information of each hand feature point in the corresponding image frame, and obtaining a two-dimensional vector m*3 of hand feature in one frame image; forming a three-dimensional vector set n*m*3 from a two-dimensional vector set of hand features in each frame image; steps S1-S3 are repeated, acquiring a plurality of three-dimensional vector sets; The obtained plurality of the three-dimensional vector sets are used as training samples, a gesture name is marked on the training samples, and model training is performed on the training samples to obtain model parameters corresponding to the gesture names, so that dynamic gesture recognition can be performed with high accuracy.
Owner:杭州吉吉知识产权运营有限公司

Wiring method for reinforcing protection on important region of metal protection layer at top layer of chip

The invention relates to the field of chip technology and information safety. By the method, the wiring density of a metal wire at a top layer can be improved, the failure area of a shielding line ata key region is reduced, the difficulty on circuit analysis by an attacker is improved, the purpose of important protection on the key region of the chip is achieved, the attacker can be effectively prevented from acquiring internal data of the chip by attack means such as shooting analysis reverse engineering and FIB, and a safety coefficient of the key region of the chip is improved. The wiringmethod for reinforcing protection on the important region of the metal protection layer at the top layer of the chip, disclosed by the technical scheme comprises the steps of firstly, planning wiringregion area and a protection level of each region according to the size of the chip, and dividing a metal shielding layer at the top layer into several wiring regions; and secondly, wiring and fillingeach wiring unit according to a safety coefficient of the wiring region, wherein the wiring number of each region is gradually increased according to the safety level. The method is mainly applied toa chip design and manufacturing occasion.
Owner:TIANJIN UNIV

Method and device, storage medium, processor and terminal for generating verification code

The invention discloses a method and device, a storage medium, a processor and a terminal for generating a verification code. The method comprises the steps that at least one tag object is obtained, at least one tag object has preset tag information; according to the at least one tag object, a verification code picture is generated; according to the tag information of the tag object contained in the verification code picture, the tag information of the verification code picture is determined; according to the tag information of the verification code picture, at least one set of questions and answers corresponding to the verification code picture is generated. The method and device, storage medium, processor and terminal for generating the verification code solve the technical problem in the prior art that the implementation of a verification code scheme by using a dot or puzzle scheme needs a large number of databases and is easy to be solved by a machine recognition technology.
Owner:NETEASE (HANGZHOU) NETWORK CO LTD

Natural language processing model construction method and system, electronic equipment and storage medium

The invention provides a natural language processing model construction method and system, electronic equipment and a storage medium, and the technical scheme of the method comprises the steps: carrying out the information extraction through employing a combined extraction method, and mining the information of different granularities, including a word vector and a character vector corresponding topart-of-speech information; besides, negative sampling is performed on the original training data so that a batch of negative samples are obtained, the problem of low resources of the model can be solved and the identification difficulty of the model can be enhanced. According to the method, the implementation effect of unstructured text information extraction is improved, and the robustness of the model is improved.
Owner:BEIJING XUEZHITU NETWORK TECH

Interactive picture verification method based on semantic comprehension

ActiveCN111523105APrevent automatic identificationEasy to operateDigital data authenticationVerification problemAlgorithm
The invention belongs to the technical field of network verification, and discloses an interactive picture verification method based on semantic comprehension, which comprises the following steps: 1)generating a to-be-verified problem: randomly selecting a plurality of attributes from a basic attribute library for generating the to-be-verified problem, and randomly setting attribute values of theattributes; generating a to-be-verified problem according to the selected attribute and attribute value; 2) generating a specified number of verification pictures according to attributes and attribute values corresponding to the to-be-verified problem, generating a verification picture output sequence, generating non-verification pictures, and forming candidate code pictures according to the verification picture output sequence; 3) displaying the to-be-verified problem and the candidate code picture; 4) receiving pictures clicked by the user in the candidate code pictures, and recording a position sequence of the clicked pictures; and 5) comparing the position sequences of the verification picture output sequence and the click picture, if the position sequences are the same, the verification is passed, If the position sequences are different, the verification is not passed. The to-be-verified problem and the candidate code picture generated by the method are easy to identify and operate by a user, but are not easy to automatically identify by a machine.
Owner:闽南科技学院

Method and apparatus for suppressing passive wireless earphones through pulsed magnet field

The present invention relates to a method and an apparatus for suppressing passive wireless earphones through a pulsed magnet field. According to the method, a continuous pulse wave with the pulse duty factor of 50%:50% and a continuous pulse wave with the pulse duty factor changing within the range from 75%:25% to 25%:75% are adopted, a magnetic field coil is directly driven by superposition of base wave pulses and high-order harmonic pulses, an auditory discrimination mode of human is simulated, and reception of passive wireless earphones is suppressed, so as to interfere and destroy information transmission paths and conditions of cheating-used earphones. Various interference pulse signals are generated by a single chip microcomputer, and power complementary pair transistors are directly driven, the technology and the method are mature, reliable and easy to operate, and audio language classrooms or laboratory site facilities can be directly utilized.
Owner:胡建人

Method for detecting perception capacity of motion sinusoidal grating for brightness modulation

The invention discloses a method for detecting the perception capacity of a motion sinusoidal grating for brightness modulation. The method includes the steps that a grating motion function is established based on the grating average brightness, the grating contrast,, the grating space frequency, the grating motion speed and direction, the grating azimuth and the grating phase; a first value is taken as the grating phase, A or B is taken as the grating motion direction, under the condition that other values are fixed values, the grating contrast Cz is taken and substituted into the grating motion function, and a grating motion graph is obtained; the grating motion graph is displayed to a testee; when the grating motion direction input by the testee and the grating motion direction of the grating motion graph are identical, Cz=Cz*(1-R) is substituted into the grating motion function till the input grating motion direction and the grating motion direction of the grating motion graph aredifferent, and a target grating motion graph is output; or else, Cz=Cz*(1+R) is substituted into the grating motion function till the input grating motion direction and the grating motion direction ofthe grating motion graph are identical, and the grating motion graph is output; the perception capacity of the testee is acquired according to the grating contrast of the grating motion graph.
Owner:科飞云视(天津)高新科技有限公司

HPLC transformer area identification test system, test method, test device and processor

The invention provides an HPLC transformer area identification test system, a test method, a test device and a processor. The system comprises a first simulation transformer area which comprises a first transformer, a first main shielding box, a first sub-shielding box and a first attenuator, wherein the first main shielding box and the first sub-shielding box are electrically connected with the output end of the first transformer, and the first main shielding box and the first sub-shielding box are in communication connection through a first attenuator in sequence; a second simulation transformer area which comprises a second transformer, a second main shielding box, a second sub-shielding box and a second attenuator, wherein the second main shielding box and the second sub-shielding boxare electrically connected with the output end of the second transformer, and the second main shielding box and the second sub-shielding box are in communication connection through the second attenuator in sequence; a third attenuator, wherein one end of the third attenuator is in communication connection with the first communication shielding box, and the other end is in communication connectionwith the second communication shielding box; and test software which is in communication connection with an HPLC module. Compared with the prior art, the system improves the test efficiency.
Owner:STATE GRID BEIJING ELECTRIC POWER +1

Generation method, verification method and device for universal verification code of person and legal equipment

The invention discloses a generation method, a verification method and a device for a universal verification code of a person and legal equipment, and the method comprises the steps: generating a first background picture of the verification code, and storing the corresponding generation time; encoding the generation time by adopting an encoding rule to obtain encoded data corresponding to the generation time; dividing the first background picture into a plurality of time region pictures, and preprocessing the time region pictures to obtain a second background picture; performing region division on the second background picture to obtain a verification code character region picture, randomly generating a verification code character in the verification code character region picture, randomly generating a verification code character in the verification code character region picture, and adding an interference rule to the verification code character to obtain a universal verification code for people and legal equipment. And universal verification of people and legal equipment is realized. According to the verification code generated by the method, the universality between a person and legal equipment can be realized, the identification speed of the equipment is higher, and the authentication efficiency is high.
Owner:GUANGDONG UNIV OF PETROCHEMICAL TECH

Voice verification code implementation method and device

The invention relates to a voice verification code implementation method and device, and the method comprises the steps of: receiving a natural sound configuration parameter sent by user equipment, generating a voice verification code based on the natural sound and a plurality of sound options corresponding to the voice verification code according to the natural sound configuration parameter information, and when user access request verification information is received, broadcasting the voice verification code and the plurality of voice options corresponding to the voice verification code through the user equipment. Man-machine behavior verification method for visually impaired people can be implemented, and the machine identification difficulty is improved through the voice verification code based on the natural sound, so that the service loss caused by hostile attacks is avoided, and the overall security of the system and the service is improved.
Owner:北京顶象技术有限公司

Quantum cryptography network reliable encrypted transmission system and method

The invention provides a reliable encrypted transmission system of quantum cryptography network, which includes an encryption processing module composed of an encryption strategy unit, a business data buffering and shunting unit, a classical encryption unit and a quantum encryption unit, and a ciphertext classification unit and a ciphertext data buffer unit. , a decryption processing module composed of a classical decryption unit and a quantum decryption unit. At the same time, the present invention also provides a reliable encryption transmission method for a quantum cryptography network, which adopts a classical encryption method and a quantum one-time pad encryption method for split transmission of business data, which can be changed in time according to the change in the supply and demand relationship of quantum keys. The proportion of business data distribution, on the basis of ensuring security, increases the continuity of encrypted transmission of business data, and improves the reliability of encrypted transmission of business data; at the same time, it reduces the consumption of quantum key data and the quantum cryptography network. The quantum key generation load reduces the cost of encrypted transmission of quantum cryptographic network business data.
Owner:SHANDONG INST OF QUANTUM SCI & TECH

A detection method of brightness-modulated moving sinusoidal grating perception ability

The invention discloses a method for detecting the perception capacity of a motion sinusoidal grating for brightness modulation. The method includes the steps that a grating motion function is established based on the grating average brightness, the grating contrast,, the grating space frequency, the grating motion speed and direction, the grating azimuth and the grating phase; a first value is taken as the grating phase, A or B is taken as the grating motion direction, under the condition that other values are fixed values, the grating contrast Cz is taken and substituted into the grating motion function, and a grating motion graph is obtained; the grating motion graph is displayed to a testee; when the grating motion direction input by the testee and the grating motion direction of the grating motion graph are identical, Cz=Cz*(1-R) is substituted into the grating motion function till the input grating motion direction and the grating motion direction of the grating motion graph aredifferent, and a target grating motion graph is output; or else, Cz=Cz*(1+R) is substituted into the grating motion function till the input grating motion direction and the grating motion direction ofthe grating motion graph are identical, and the grating motion graph is output; the perception capacity of the testee is acquired according to the grating contrast of the grating motion graph.
Owner:科飞云视(天津)高新科技有限公司

A kind of otp memory and its data writing and reading method, security chip

The invention discloses an OTP memory, data writing and reading methods thereof and a security chip. The data writing method of the OTP memory includes the following steps: S1, carrying out block dividing on the OTP memory in physical space to form n+1 blocks of storage areas, wherein n is a positive integer which is greater than 1, and the n+1 blocks of storage areas include n blocks of data storage areas and one block of address storage area which is always in a readable state; S2, generating a random sequence through a random-number generator, randomly selecting one block from the n blocksof data storage areas according to the random sequence, and defining the same as an address recording area; S3, sequentially writing first addresses of n-1 blocks of data storage areas into the address recording area according to a random order, and writing to-be-stored data in each block of data storage area according to a successive order of writing; and S4, writing a first address of the address recording area into the address storage area which is always in the readable state. According to the data writing method and reading method of the invention, difficulty of acquiring the data, whichare stored in the memory, by a cracker can be increased, and storage security can be improved.
Owner:SHENZHEN GRADUATE SCHOOL TSINGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products