Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

122results about "Digital data authentication" patented technology

Authentication system and method

InactiveUS20090193264A1Digital data authenticationCoded identity card or credit card actuationAuthentication systemStrong authentication
A strong authentication method and system using a Secure ICC component coupled with a Personal device, and relying on the existing cryptographic protocols and keys for managing the secure ICC to generate One-Time-Passwords when the necessary authentication keys or cryptographic protocols are not already present in the Secure ICC configuration for that purpose.
Owner:ACTIVIDENTITY

Methods of authenticating a user for data exchange

ActiveUS20170364912A1Digital data authenticationCommerceUser authenticationData exchange
A method of facilitating the exchange of data between a user having a computing device, and a remote entity, where a first connection has been established between the user and the remote entity, and where the user has associated data exchange information with an application on the computing device, the data exchange information defining properties of the data to be exchanged between the user and the remote entity. The method comprises establishing, at a server, a second connection to the computing device; enabling retrieval of a user authentication attribute associated with the data exchange information; enabling retrieval of a device authentication attribute associated with the data exchange information;enabling authentication of the user using the user authentication attribute; and enabling authentication of the computing device using the device authentication attribute, where data may be exchanged between the computing device and the remote entity in accordance with the data exchange information following authentication of the user and the computing device.
Owner:ECKOH UK

Program protection method and device

The embodiment of the invention discloses a program protection method and device. The method comprises the following steps of encryption at a program generation stage: acquiring a first secrete key; acquiring a second secrete key and a mark of a designated category; encrypting the designated category by utilizing the second secrete key; encrypting the attribute information of the second secrete key by utilizing a public key of the first secrete key; decryption at a program running stage: decrypting encrypted data of the attribute information of the second secrete key by utilizing a private key of the first secrete key; judging whether the to-be-loaded category belongs to the designated category or not according to the mark of the designated category, and decrypting the to-be-loaded category by utilizing the second secrete key if the to-be-loaded category belongs to the designated category. The first secrete key and the second secrete key are used for doubly encrypting the program, so that the source code of the program can be effectively protected; meanwhile, the program is also distinguished, and only the designated category is encrypted, so that the encryption and decryption efficiency can be improved; moreover, the mark of the encrypted category is further encrypted and protected by the second secrete key, so that the safety of the program is further protected.
Owner:BEIJING AUTONAVI YUNMAP TECH CO LTD

Touch-screen-terminal customized lock screen system

The invention relates to a touch-screen-terminal customized lock screen system which comprises a lock-screen attribute setting subsystem and a lock-screen password setting subsystem. The lock-screen attribute setting subsystem is used for setting personal attributes of a touch-screen terminal lock screen, and the lock-screen password setting subsystem is used for setting passwords for the touch-screen terminal lock screen; the lock screen attribute setting subsystem comprises password lock-screen background setting modules, a floating-window display content setting module and a password pattern setting module; the password lock-screen background setting modules include background image setting modules and a background music setting module which are used for setting background images and music of the password lock screen; the floating-window display content setting module is used for setting floating-window display content, the floating-window display content can be displayed in a floating-window displaying mode in the touch-screen terminal lock screen state, and the floating-window display content is used for reminding users of some important information content; the password pattern setting module is used for setting password patterns. By the arrangement, personalized touch-screen-terminal customized lock screen system high in interestingness can be customized.
Owner:SUZHOU TIANPING ADVANCED DIGITAL TECH

Man-machine identification method and device based on sliding track and electronic device

The invention discloses a man-machine identification method and device based on a sliding track and an electronic device, and the method comprises the steps: collecting a sliding track point of a current sliding operation, and judging whether the current sliding operation meets a preset verification rule or not; if the current sliding operation meets the verification rule, multi-dimensional feature information of the current sliding operation is obtained; processing the multi-dimensional feature information according to a pre-established man-machine identification model, and determining a classification result of the multi-dimensional feature information; and judging whether the current sliding operation is a machine simulation operation or not according to a classification result of the multi-dimensional feature information. According to the method and the device, the accuracy of identifying human behaviors and machine behaviors can be improved.
Owner:GUANGZHOU DUOYI NETWORK TECH +2

Identity identification method and identity identification system based on electrocardiosignals

InactiveCN105469037ASmall amount of calculationFast recognitionDigital data authenticationPhysiological signal biometric patternsEcg signalIdentity recognition
The invention discloses an identity identification method and an identity identification system based on electrocardiosignals. The method comprises steps that, to-be-identified heart beat characteristics of electrocardiosignals of a to-be-identified user are extracted; a preset class group classifier is utilized to classify the to-be-identified heart beat characteristics, and class groups of the to-be-identified heart beat characteristics are determined; similarity between heart beat templates in a template database of the class groups of the to-be-identified heart beat characteristics and the to-be-identified heart beat characteristics is calculated, and a user corresponding to the heart beat template having the largest similarity with the to-be-identified heart beat characteristics is determined to be the to-be-identified user. As the heart beat templates in the template database of the class groups of the to-be-identified heart beat characteristics are only a part of heart beat templates in a template database of various class groups, computational complexity is low, so the method effectively solves a problem that the to-be-identified heart beat characteristics are required to compare with all heart beat templates in a total template database during identity identification, and thereby a large-scale identity identification system can be established.
Owner:KUNSHAN BRANCH INST OF MICROELECTRONICS OF CHINESE ACADEMY OF SCI

Automated monitoring, detection, and reporting of unauthorized movement and/or theft of vehicles and cargo

A method and an enhanced electronic logging device (ELD) enable a load lock feature of a vehicle that assists with automated theft detection, reporting, and tracking of stolen vehicles / cargo. The processor of the ELD enables the ELD to register the operator MCD to receive notifications generated by a load lock module and present on a display of the ELD at least one selectable option for activating a load lock of the vehicle, the load lock identifying that the operator has parked the vehicle and has triggered the ELD to report any movement of the vehicle that occurs while the load lock is activated. The processor generates and transmits a notification of unauthorized movement or a potential theft of the vehicle in response to receiving an input from the movement detection device indicating that the vehicle is moving or being moved from a parked location while the load lock is activated.
Owner:OVERHAUL GRP INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products