Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

116results about How to "Protect information" patented technology

Method for generating and authenticating address automatically in IPv6-based internet and data structure thereof

Provided are a method for automatically generating an address in the IPv6-based Internet when a sender having a pair of a public key and a private key establishes a network connection, and a data format thereof. The method includes generating a CGA address and a CGA option based on the public key and a predetermined parameter, generating a signature option for verifying the CGA option, additionally generating a timestamp option in a case where a unidirectional message is transmitted to the network, and additionally generating a nonce option containing random numbers in a case where a bidirectional message is transmitted to the network, and adding the signature option, the timestamp option and the nonce option to a Neighbor Discovery (ND) option field to form an ND message, and transmitting the ND message to the network. When a host enters the network in a Zero Configuration over the IPv6-based Internet, the host can securely generate its own address without using a manual key. The method can also be applied to general IPv6 packet authentication or position authentication of a mobile node.
Owner:ELECTRONICS & TELECOMM RES INST

Proctoring System

A computer implemented method and system is provided for authenticating and monitoring an examination environment of a user. A proctoring software provided on a user's computing device communicates with a remote monitoring station via a server over a network. A data capture device provided on the computing device is configured to rotate and tilt to multiple angles to view and capture audiovisual data from the examination environment. A proctor administering the remote monitoring station authenticates the user based on an examination selected by the user. The proctor defines criteria comprising actions allowed for the user while taking the examination. The proctoring software monitors the examination environment for conformance to the defined criteria. The proctoring software transmits the monitoring information to the remote monitoring station based on transmission parameters determined by the server. The proctor controls actions of the user when the user is not in conformance with the defined criteria.
Owner:DEVSQUARE

Security system

A security system is provided, which can protect information within a mobile phone terminal when the mobile phone terminal is lost or stolen. The security system comprises an ASP to protect information on the mobile phone terminal having information storage unit to store information, and the ASP includes an instruction accepting unit to accept a protection instruction to protect information from a user of the mobile phone terminal and a cancellation instruction to cancel the protection of the information, an authentication unit to certify the user of the mobile phone terminal, and an instruction exhibiting unit to notify a portable communication terminal of the protection instruction and the cancellation instruction when the authentication unit authenticate the user, and the mobile phone terminal includes an instruction referring unit to receive the protection instruction and the cancellation instruction from the ASP, a protecting unit to perform a process of protecting the information according to the protection instruction and a canceling unit to perform a process of canceling the protection of the information according to the cancellation instruction.
Owner:NEC CORP

Information generation device, information reproduction device, and information recording device

An information distribution system is provided which can distribute a movie and so on while restricting the copying of information more widely and properly in the case where the information such as a movie is distributed via a network and so on. Change copy control information (XCI1, XCI2, XXI1, and XXI2) and normal copy control information (CCI1 and CCI2) are superimposed on reproduced information and are distributed. The change copy control information is used when a changing operation for changing the quality of reproduced information is performed, and the normal copy control information is used when the changing operation is not performed.
Owner:PIONEER CORP

Card information protection device and finance service equipment having the same

A card information protection device and a finance service equipment having the same are provided. The card information protection device is arranged between a transverse card inlet and a longitudinal magnetic card information reader, and comprises a magnetic card transverse admission port. A magnetic card conveying channel is arranged between the magnetic card transverse admission port and the longitudinal magnetic card information reader. A magnetic card rotating mechanism is arranged in the magnetic card channel. The magnetic card rotating mechanism is used for rotating a transversely-inserted magnetic card to longitudinal direction in order to convey the magnetic card into the longitudinal magnetic card information reader, and rotating the longitudinal magnetic card returned by the longitudinal magnetic card information reader to transverse direction in order to convey the transverse magnetic card out. The problem that the whole magnetic strip of the magnetic card information reader which allows a user to plug the magnetic card in the longitudinal direction is completely scanned by a card stealer device illegally arranged in a card plug-in buckle in the process of longitudinally inserting the magnetic card can be effectively solved, and thereby the problem that the magnetic card information is stolen illegally can be thoroughly solved.
Owner:GRG BAKING EQUIP CO LTD

Image composition beautifying method and system based on visual area proportion balance rule

The invention discloses an image composition beautifying method based on a visual area proportion balance rule. The method comprises the following steps: (1) inputting an image; (2) detecting an area segmentation line of the image and dividing the image into two areas; (3) obtaining an area to be optimized and an optimization strategy of the image by utilizing the visual area proportion balance rule and based on the area segmentation line; (4) calculating texture complexity of the area to be optimized; (5) performing optimization on the area to be optimized based on the optimization strategy, utilizing a rapid seam-insertion method to perform stretching or reducing on the area to be optimized when the texture complexity of the image is smaller than a preset threshold value of the texture complexity, and otherwise, utilizing a sample-based high-efficiency image restoration algorithm to perform stretching on the area to be optimized; and (6) outputting the optimized image. The invention further discloses an image composition beautifying system based on the visual area proportion balance rule. According to the image composition beautifying method and system based on the visual area proportion balance rule, the image composition is automatically beautified and the image is allowed to have a better esthetic visual effect.
Owner:SOUTH CHINA UNIV OF TECH

Adaptive image scaling method based on content

The invention discloses an adaptive image scaling method based on content, belonging to the field of image processing. In the method, the current slit reduction is weighted and then is combined with a mesh mapping process. The method comprises the following steps of: firstly, reducing an image by a slit reduction method, when a slit is in an important region, weighting energy of the important region near the slit to reduce the slit reduction of the important region and increase the slit reduction of a non-important region; and performing a mesh mapping process on the image subjected to the slit reduction process to enable the image to achieve a target size. The method not only scales the image information of the non-important region, but also effectively keeps proportion and detail of important image information after scaling, so that optimization of adaptive property of the image content is implemented.
Owner:BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products