Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

55 results about "Third party" patented technology

Application program control method based on two-time signature verification technology

An application program control method based on a two-time signature verification technology is achieved by performing two times of signing and two times of signature verification on application programs on an android terminal. Security detection is performed on the application programs through a reliable third-party security detection mechanism, the application programs passing the detection will be signed by the third-party security detection mechanism, and then the signed applications are returned to developers. When the application programs are installed on the intelligent android terminal, security detection is performed on the application programs first to see whether the application programs are signed by the third-party security detection mechanism or not, and signatures are verified; if signatures of the third-party detection mechanism do not exist or the signatures cannot pass verification, installation of the application programs is refused. Through the technical scheme, the application program control method based on the two-time signature verification technology has the advantages that signature information is fixed through introduction of the third-party detection signatures and a security control module of the android terminal so that secure application programs can be downloaded and installed in an android system through multiple channels, and while security of the android terminal is guaranteed, a flexible and efficient application program verification scheme is provided.
Owner:INST OF INFORMATION ENG CHINESE ACAD OF SCI +1

One-card control system and one-card control method of mobile phone Bluetooth swiping card

ActiveCN104340780ASolve the inflexibility of controlRealize integrated applicationElevatorsCard readerBluetooth
The invention discloses a one-card control system and a one-card control method of a mobile phone Bluetooth swiping card. The control system comprises a one-card control center, an elevator management module, a mobile phone Bluetooth card reader, an input and output module; the elevator management module is in communication connection with the mobile phone Bluetooth card reader; a card number transmitted from the mobile phone Bluetooth card reader is processed in real time to judge whether the received card number is effective, and the input and output module carries out corresponding output according to permission control registered by the card number, or floor permission information stored on the mobile phone card of a user is directly read, and the input and output module carries out corresponding output according to the control of the permission information. The third-party linkage communication interface of the elevator management module or the one-card control center is respectively connected with an intercommunication access control system and a parking lot management system through TCP/IP (Transmission Control Protocol/Internet Protocol) for linkage so as to realize seamless integration among systems. A mobile phone Bluetooth function is used for replacing a control method for starting an elevator by using a traditional card, so that the problem that the control for the elevator is not flexible through passive RFID (Radio Frequency Identification) and active RFID originally is solved; meanwhile, the third-party linkage communication interface or the one-card control center achieves linkage with intercommunication access control, parking lots or other third parties to realize integrated application of multiple systems, so that the degree of automation is further improved.
Owner:CHENGDU QIANFAN TECH DEV

Parking stall searching method and intelligent parking service system

InactiveCN106875737AIndication of parksing free spacesReservationsService systemThird party
The invention discloses a parking stall searching method and an intelligent parking service system. The method comprises steps that a vehicle owner obtains a destination coordinate according to the current position, screens to obtain a nearby parking lot according to the destination coordinate, informs a manager of the nearby parking lot through a third-party communication protocol and generates a reservation list; the manager obtains the reservation list through list competition, judges whether the reservation list is valid or not, if the reservation list is valid, keeps and locks the reservation list, locks a parking stall in the parking lot and corrects the corresponding parking stall state into a reserved state on a background server; and when the vehicle owner receives skipping information of the reserved state, a navigator plans a route to the parking stall. In the above screening process, by setting different dimensions and weights, a nearby parking lot with highest matching degree is screened. According to the invention, the vehicle owner user is assisted to reserve a parking stall; after the reservation is successful, the parking stall is kept in the parking lot; and a platform carries out navigation guidance, so the vehicle owner can successfully park the vehicle in the corresponding parking stall.
Owner:深圳迅停科技发展有限公司

System and method for automatically adding watermarks to shot pictures

The invention provides a system and method for automatically adding watermarks to shot pictures. The method is characterized in that when a mobile terminal performs shooting, the watermarks are automatically added according to the setting of a user, the positions, the content and the sizes of the watermarks can be adjusted in the process of previewing, and finally the pictures with the watermarks are generated. According to the system and method, while shooting is achieved, the watermarks can be added, the effect of adding the watermarks can be previewed in advance, and besides, the content, the positions and the sizes of the watermarks can be modified in real time according to previewing results. In this way, the defect that the watermarks are not convenient to add by the utilization of a third party tool is overcome, besides, on the premise that mobile terminal hardware is not additionally arranged, the functions of the mobile terminal are added, and the competitiveness of the mobile terminal in the market is improved.
Owner:ARCHERMIND TECH NANJING

Internet of Videos resource release method and Internet of Videos sharing platform server

InactiveCN109302472AImprove effective utilizationClosed circuit television systemsData switching networksThird partyTransmission protocol
The embodiment of the invention provides an Internet of Videos resource release method and an Internet of Videos sharing platform server. The method comprises the following steps: receiving, by the Internet of Videos sharing platform server, a monitoring check request sent by a third party platform; transmitting the monitoring check request to a monitoring protocol conversion server after performing transmission protocol conversion on the monitoring check request; receiving a monitoring video code stream sent by the monitoring protocol conversion server; passively establishing a TCP connectionwith the third party platform; sending the monitoring video code stream to the third party platform through the TCP connection; in the process of sending the monitoring video code stream to the thirdparty platform through the TCP connection, monitoring whether the TCP connection is interrupted; and when the TCP connection is interrupted, releasing channel resources allocated by the Internet of Videos sharing platform server to the TCP connection. By adoption of the method, the channel resources allocated by the Internet of Videos sharing platform server to the TCP connection can be releasedin time, thereby releasing the Internet of Videos resources to improve the effective utilization rate of the Internet of Videos resources.
Owner:VISIONVERA INFORMATION TECH CO LTD

Digital identity authentication method and system based on secure two-dimensional code

ActiveCN108712382APrevent leakageSecure loginTransmissionDigital identityThird party
The invention provides a digital identity authentication method based on a secure two-dimensional code, comprising that: the third party application initiates an authorization login request; the identity authentication SDK obtains a session key from the server; the identity authentication SDK encrypts the information of the third party application through the session key, and sends the encrypted information and the authorized login request to the server; the server decrypts through the session key to obtain the information of the third-party application, generates a two-dimensional code and atwo-dimensional code url, and encrypts the two-dimensional code url by using a key, and the identity authentication SDK obtains the encrypted two-dimensional code url; the identity authentication SDKdecrypts the encrypted two-dimensional code url, then the third-party application jumps according to the two-dimensional code url to display the two-dimensional code; and the user scans the two-dimensional code for authentication to authorize the third-party application to log in. The invention also provides a digital identity authentication system based on the secure two-dimensional code to ensure the security of the authorization process and the secure login of the third-party application.
Owner:新大陆(福建)公共服务有限公司

Automatic design and type setting detail page manufacture method through visual identity combined with artificial intelligence

ActiveCN107622134AEliminate the hassle of repeated entryEasy to useBuying/selling/leasing transactionsSpecial data processing applicationsThird partyE-commerce
The invention discloses an automatic design and type setting detail page manufacture method through visual identity combined with artificial intelligence. The method comprises the steps of S1, establishing an information mapping and docking framework according to fields required by third-party e-commerce platforms; S2, performing intelligent automatic type setting according to product pictures; S3, forming a final commodity detail page after fine adjustment, review and confirmation, and uploading the finally formed commodity detail page on all the third-party e-commerce platforms in a full automatic mode. According to the automatic design and type setting detail page manufacture method through the visual identity combined with the artificial intelligence, the workload which must be completed manually for half day or even several days can be completed within few minutes, the efficiency is greatly improved, lots of labor and management costs are saved for a company, the company can havecommodity detail page introduction which is more normative and specialized than an original mode, thus commodities and products are introduced more thoroughly, and the method plays a better role in propaganda and can meet the using demand of a client better.
Owner:杭州时间线信息科技有限公司

GPS determined location based access to linked information and delivery thereof

ActiveUS20180174130A1Web data indexingSatellite radio beaconingThird partyElectronic communication
Various methods are provided for facilitating access to linked information to GPS or short-range wireless equipped devices. One example method may comprise receiving, via a network, an indication of an interaction between a primary device and a third-party device, the indication comprising at least a first element and a second element, the first element indicative of user identification information and the second element indicative of at least one of a location or a bounded region, determining, as a function of at least the first element and the second element, a data object that upon validation is configured for use a subsequent interaction, and transmitting, to a mobile device, an electronic communication comprising an indication, configured for rendering on the mobile device, of the data object.
Owner:GROUPON INC

Third-party application authorization and authentication method based on multi-domain collaborative architecture

ActiveCN107018128ASafe and reliable authorized accessTroubleshoot authentication issuesTransmissionThird partySoftware engineering
The invention belongs to the technical field of computer applications, and discloses a third-party application authorization and authentication method based on multi-domain collaborative architecture. Multi-domain collaborative layered architecture is adopted, and consists of a plurality of layers of domains; each domain consists of an Internet of things platform, sensor equipment and a third-party application; permission management and partition are performed on each domain in a layered way; each target domain administrator audits authorization information; after pass of auditing, a plurality of domains through which auditing information passes can be taken as a resource group; and a developer finishes developing work according to an authorization result. Through adoption of the third-party application authorization and authentication method for use among a plurality of domains of the layered architecture, safe and reliable authorization access between a platform and a third-party application is ensured, and a rapid and convenient channel is provided for data interaction between the platform and the third-party application. Compared with a conventional third-party application permission authentication method, the method has the advantage that the authentication problem between a platform permission administrator, a third-party application developer and a platform user in the multi-domain collaborative architecture is solved.
Owner:陕西沃傲信息科技有限公司

Session keeping method, session keeping device, readable storage medium and electronic equipment

ActiveCN110913011AReduce contentSave bandwidthTransmissionThird partyEngineering
The invention relates to a session keeping method, a session keeping device, a readable storage medium and electronic equipment. The method is applied to a gateway, and comprises the following steps:when a first HTTP message carrying first Cookie information sent by a client is received, obtaining a gateway session ID and server session identification information from the first Cookie information; if determining that the first HTTP message is sent to the server according to the gateway session ID, determining a first target service node used for receiving the first HTTP message from a plurality of service nodes of the server; and if the identification information of the first target service node is matched with the identification information of the service node in the server session identification information, sending a first HTTP message carrying second Cookie information to the first target service node. Thus, a third-party middleware does not need to be additionally deployed to store the gateway session and the server session, and the gateway session and the server session do not need to be stored in the Cookie information, so that the problems in related technologies can be avoided, and the communication efficiency is ensured.
Owner:NEUSOFT CORP +1

Radio resource control connection method and device, and computer storage medium

ActiveCN108430070AEasy to useReduce transmission delayConnection managementHigh level techniquesThird partyAir interface
The embodiment of the invention discloses a radio resource control connection method and device, and a computer storage medium. The method is applied to a mobile terminal, and comprises the followingsteps: detecting an operation state of a third-party application, wherein the operation state is used for representing the operation condition of the three-party application; when the operation statemeets a preset acceleration policy, sending a random data packet to a base station, wherein the random data packet is an illegal internet protocol IP data packet sent by a packet data convergence protocol PDCP layer to the base station; and based on the response of the base station to the random data packet, maintaining the connection with the radio resource control RRC of the base station. Therefore, the transmission delay of data from the mobile terminal to an air interface is shortened, the instantaneity of data transmission is improved, and the use performance of the mobile terminal is improved as well.
Owner:GUANGDONG OPPO MOBILE TELECOMM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products