Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

451results about How to "Not easy to be stolen" patented technology

Method for local area network access authentication of casual user

The invention relates to a method for implementing a user access authentication in a local area network, especially to a method for implementing a casual user access authentication in a public local area network. Firstly an internal user applies a casual user name and a key for the casual user through the authentication of a authentication server, the authentication server dynamically generates the casual user name and the key, then the casual user name and the key are stored in a user list of the authentication server, simultaneously the casual user name and the key are transmitted to a mobile phone of the internal user, the casual user uses the casual user name and the key for access authentication, and visits the authorized network resource after the authentication of the authentication server. The method of the invention adopts a double-factor and strong authentication system, the internal user is authenticated once, and the casual user is authenticated twice. The method can greatly improves the system safety, the casual user name and the key are all dynamically generated which are not easy to steal with high safety, and the management process for the casual user is simple and standard.
Owner:CHINA MOBILE GROUP DESIGN INST

Smart phone user identity authentication method based on gyroscope behavior characteristics

The invention discloses a smart phone user identity authentication method based on gyroscope behavior characteristics. The method comprises the following steps: extracting sensor behavior data corresponding to different operation events according to time information of screen touch operation by analyzing gyroscope behavior data generated during screen touch operation of a smart phone user to generate sensor behavior characteristics; establishing an identity authentication model of the user based on the behavior characteristics; performing identity authentication on the smart phone user. The method disclosed by the invention has the advantages that the method is easy to operate, and any additional equipment does not need to be added; the behavior characteristics of the mobile phone user in an authentication process are described by using gyroscope operation behaviors on the basis of not changing the user habit to lay a basis for user identity judgment, so that smear attack and observation attack can be effectively prevented, and extensive safety and adaptability are achieved.
Owner:XI AN JIAOTONG UNIV

Digital watermark production and recognition method used for audio document

InactiveCN101345054AGuaranteed robustnessSolve the problem of copyright certificationSpeech analysisFrequency spectrumDigital watermarking
The invention discloses a digital watermark manufacture method and a recognition method used for audio files. The watermark is added in the audio digital file to be processed and taken as copyright marking information; the method of the invention is characterized in that the watermark is realized by adopting converted voiceprint information and comprises the steps as follows: a section of speech signals with copyright identification is colleted and a voiceprint watermark image is gained; the speech signal is converted into one-dimensional two-value sequence group; the gray-scale value of each matrix unit is presented by adopting an eight-bit binary number; the audio file where the watermark is to be inserted is divided into sections; frequency domain transformation is respectively carried out to each audio section so as to obtain the frequency spectrum file; a bit of one-dimensional two-value sequence group watermark data is embedded into each section of the frequency spectrum file; the embedding method is a method used for quantitatively modifying the frequency spectrum file coefficient; reverse conversion is carried out so as to obtain the audio data of the embedded watermark; the audio data is combined with the audio data which is processed so as to obtain the audio digital file with the digital watermark. Reverse separation operation is carried out during the recognition process. The method of the invention effectively solves the copyright verification problem of the digital audio product.
Owner:SUZHOU UNIV

Mobile payment method and equipment for implementing same

The invention relates to an electronic payment technology, in particular to a mobile payment method, and a mobile terminal and a payment processing system for implementing the mobile payment method. According to the invention, the mobile payment method comprises the following steps of: acquiring an iris image of a user by using the mobile terminal which is provided with an image acquisition unit; determining the identity of the user according to the acquired iris image; and with the payment processing system, performing payment processing by using a judgment result. Compared with the conventional mobile payment method, the embodiment of the invention has the advantages that: by using iris information as the authentication information of the identity of the user, the safety of the payment service of a mobile phone is greatly improved; and by using the iris information, the burden on password memorization of the user is eliminated. In the embodiment of the invention, the safety capacity of a smart card technology is fully utilized in the processing of the iris information. Moreover, a camera serves as the standard hardware configuration of the mobile terminal such as the mobile phone, so system hardware can be less modified by using the iris information, stead of password inputting.
Owner:CHINA UNIONPAY

Method for storing cipher key

The method includes steps: setting up transformation algorithm for cipher key data in advance; generating original cipher key data by cipher key generator, random sequence generator generates several pieces of random numbers correlated to the original cipher key data at same time; carrying out transformation operation for original cipher key data and correlated several pieces of random numbers by using transformation algorithm for cipher key data setup before; storing up transformed cipher key data and each random number correlated to original cipher key data in storage media independent to each other. Comparing with prior art, the invention lowers complexity of cipher key storage step in cipher key management procedure, and raises security mechanism in storing cipher key.
Owner:HUAWEI TECH CO LTD

File transmission method, device and system based on block chain

The invention provides a file transmission method, device and system based on a block chain. A sender encrypts a to-be-transmitted file by utilizing a public key in a unique digital certificate of a receiver to obtain a digital envelope; and the sender uses an own unique digital certificate as the identity identifier for entering a block chain, and sends the digital envelope to the receiver basedon the block chain. Correspondingly, the receiver uses the own digital certificate as the identity identifier for entering the block chain, receives the digital envelope sent by the sender based on the block chain, and uses a private key in the own digital certificate to decrypt the digital envelope to obtain a to-be-received file. Both the sender and the receiver of the file use the digital certificate as the identity identifier for entering the block chain, the file is transferred on the block chain in a digital envelope form, and only the receiver with the corresponding digital certificatecan decrypt the file. Files are transmitted between the sender and the receiver based on the block chain, so that the files cannot be easily stolen by others.
Owner:JINAN INSPUR HIGH TECH TECH DEV CO LTD

An underwater communication system based on continuous variable quantum key distribution and method realization method thereof

The invention discloses an underwater communication system based on continuous variable quantum key distribution and a realization method thereof, belonging to the technical field of free space quantum communication. The optical signal is outputted to the receiving end through the cooperation of a first laser, a first electro-optic intensity modulator, a signal source, a first beam splitter, a second electro-optic intensity modulator, a first electro-optic phase modulator and a tunable laser attenuator at the transmitting end; The second laser generates local oscillation light, which is modulated by the second electro-optical phase modulator, the local oscillation light and the optical signal outputted from the transmitting end enter the homodyne detector for detection, and finally the security key is established within the effective distance. The invention applies the continuous variable quantum key distribution technology to the underwater optical communication system, the optical signal is not easy to be stolen by a third party, and the safe underwater communication system is realized. Heterodyne detection is used to filter the ambient stray light, which also achieves good detection effect in the daytime and the environment with background light.
Owner:CENT SOUTH UNIV

Fingerprint identification and authentication circuit of mobile terminal

A fingerprint identification and authentication circuit of a mobile terminal is used for identifying fingerprints of a user when the mobile terminal enters procedures requiring authentication. The fingerprint identification and authentication circuit comprises an inputting module, a switching module, a scanning driving module, an identification driving module, a fingerprint sensing module, a sensing module, a signal processing module, a clock control module, a fingerprint imaging module, an I / O (input / output) control module and a master control module; and when the mobile terminal enters the procedures requiring authentication, a touch command inputted by a user is received, and a touch mode of the mobile terminal is switched into the fingerprint sensing module. A fingerprint image inputted by the user is acquired and is compared to a pre-stored fingerprint image, if the fingerprint image is consistent to the pre-stored fingerprint image, the user is permitted to enter the procedures requiring authentication, and if the fingerprint image is not consistent to the pre-stored fingerprint image, the user is forbidden from entering the procedures requiring authentication. Fingerprints belong to biological characteristics and are unique. After the fingerprints serve as procedure entering conditions, the user does not need to memorize an account and a corresponding password, and data of the account and the password are not easy to steal.
Owner:NANCHANG OUFEI BIOLOGICAL IDENTIFICATION TECH +3

Security certification system based on virtual reality helmet brain grain collection

The invention discloses a security certification system and method based on virtual reality helmet brain grain collection. The system comprises a data access module, a brain grain generation module and a security certification module, wherein the data access module generates a first brain grain feature parameter corresponding to identity information of a user according to a preset brain grain local database; the brain grain generation module acquires a second brain grain feature parameter generated under stimulation to the user based on audio and video signals; the security certification module compares the first brain grain feature parameter with the second brain grain feature parameter, and carries out recognition and security certification on the identity of the user according to a comparison result. The security certification system solves the problem that no brain grain collection-based security certification system is provided at the present in the prior art, and has the advantage that a brain grain password is not liable to steal, copy and abuse; under an extreme condition, if the brain grain password is leaked, the user can reset the brain grain password conveniently.
Owner:CHINA ACADEMY OF ELECTRONICS & INFORMATION TECH OF CETC

Cable subsurface buoy real-time internal wave monitoring device installed on ocean platform

The invention discloses a cable subsurface buoy real-time internal wave monitoring device. The device comprises a power supply, an industrial personal computer, a steel cable, a customized cable and a plurality of internal wave measurement probes, wherein the plurality of internal wave measurement probes are all composed of conductivity temperature depth systems and current needles, the customized cable is connected with the power supply and the industrial personal computer respectively, the plurality of internal wave measurement devices are arranged on the customized cable, and spaces are kept among the plurality of internal wave measurement devices, the customized cable is fixed on the steel cable, one end of the steel cable is fixed on a deck of a ocean platform and the other end is movably connected with a weight, and the customized cable is fixed on the deck of the ocean platform by an inclined steel cable. According to the invention, the internal wave monitoring device is constructed based on the ocean platform, so that the cable subsurface buoy real-time internal wave monitoring device installed on ocean platform is not easy to steal and lose, the safety of the measurement device is ensured; the real-time power supply of the measurement device and real-time data collection can be achieved; and compared with a self-contained subsurface buoy internal wave monitoring device, the cable subsurface buoy real-time internal wave monitoring device installed on ocean platform is greatly improved in the timeliness of data.
Owner:CHINA NAT OFFSHORE OIL CORP +2

Cloud data integrity verification method and system based on biological characteristics

The invention relates to the technical field of network security, in particular to a cloud data integrity verification method and system based on biological characteristics. The method comprises: the system is initialized and generates public parameters; a client uploads biological characteristic identity, and a key generation central server generates keys for a user; the client uploads files and tags to a cloud server; an auditing server transmits a challenge value to the cloud server, the cloud server computes a response value by utilizing the challenge value, user data and the tag and transmits the response value to the auditing server, and the auditing server verifies the validity of the response value in order to check whether the cloud server completely saves the data of the client. According to the cloud data integrity verification method and system based on the biological characteristics, complex key management load of the traditional verification protocol is simplified, and the system complexity is reduced; and meanwhile, fault tolerance, which the cloud data integrity auditing scheme based on identity does not have, is provided, so that the practicability is better. The invention further relates to a system of the cloud data integrity verification method based on the biological characteristics.
Owner:SHAANXI NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products