Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

20 results about "User identifier" patented technology

Unix-like operating systems identify a user by a value called a user identifier, often abbreviated to user ID or UID. The UID, along with the group identifier (GID) and other access control criteria, is used to determine which system resources a user can access. The password file maps textual user names to UIDs. UIDs are stored in the inodes of the Unix file system, running processes, tar archives, and the now-obsolete Network Information Service. In POSIX-compliant environments, the command-line command id gives the current user's UID, as well as more information such as the user name, primary user group and group identifier (GID).

Login method and system, computer device and storage medium

InactiveCN108769041AUser identity/authority verificationInformation accessUser identifier
The invention relates to a login method and system, a computer device and a storage medium. The method comprises the steps of acquiring a product trigger instruction via a logged-in page correspondingto a user identifier, wherein the product trigger instruction carries a product-party identifier; generating a product information access request according to the product trigger instruction, and sending the product information access request to a platform-party server, wherein the product information access request carries the user identifier, and the product information access request is used for indicating the platform-party server to generate a security token according to the user identifier; receiving the security token sent by the platform-party server, and generating a login request according to the security token; sending the login request to a product-party server corresponding to the product-party identifier, and receiving a verification result sent by the platform-party server,wherein the login request is used for indicating the product-party server to send the security token to the platform-party server for verification; and when the verification result is that the verification is successful, logging in the product-party server, and receiving product information returned by the product-party server. By adopting the method, a product-party system can be logged in quickly.
Owner:ONE CONNECT SMART TECH CO LTD SHENZHEN

Face recognition method, device, computer device and storage medium

PendingCN109241868AEnsure safetyImprove recognition efficiencyCharacter and pattern recognitionFeature vectorImage extraction
The invention discloses a face recognition method, a device, a computer device and a storage medium. The face recognition method comprises the following steps: obtaining an image to be recognized, extracting a feature vector to be recognized according to the image to be recognized; acquiring a feature similarity between the feature vector to be identified and each reference feature vector; takingthe user identifier corresponding to the reference feature vector with the highest feature similarity as the target user identifier; obtaining a target region in the image to be recognized according to the target user identifier, and extracting a target feature vector according to the target region; calculating the vector similarity between the target feature vector and the user-defined feature vector corresponding to the target user identification, and obtaining the recognition result according to the vector similarity. The face recognition method provided by the invention does not need multiple frames of images for comprehensive verification, does it need to train a complex neural network model in advance to realize, and can ensure the safety of the face recognition process and improve the recognition efficiency at the same time.
Owner:PING AN TECH (SHENZHEN) CO LTD

House-renting management system capable of opening locks based on Bluetooth or two-dimensional codes and method thereof

InactiveCN106530454ALow costProtection of rights and interestsData processing applicationsIndividual entry/exit registersStructure of Management InformationDimensional modeling
The invention discloses a house-renting management system capable of opening locks based on Bluetooth or two-dimensional codes and a method thereof and belongs to an intelligent house management system. The house-renting management system comprises a network server, an intelligent terminal and an intelligent lock body, wherein a database is arranged in the network server; the database at least comprises a lock body ID list, a user ID list and authorization relations between all lock body IDs and user IDs; the intelligent terminal is accessed to the network server via network; a lock cylinder main controller is arranged in the intelligent lock body and is accessed to a receiving device and a lock cylinder mechanical structure; landlords can remotely authorize the lock body IDs in the database of the network server through the intelligent terminal; tenants obtain dynamic unlocking keys through the intelligent terminal and can open the lock bodies through the dynamic unlocking keys. Through the house-renting management system capable of opening locks based on the Bluetooth or the two-dimensional codes and the method thereof, the operation is simple and convenient; the problem that the conventional keys are easily lost can be solved; meanwhile, the locks are opened by using the dynamic unlocking keys, so that the problem that the locks are changed when the tenants are changed can be solved; the house renting cost is effectively reduced; the conflicts between the landlords and the tenants can be reduced; and the rights of the landlords can be effectively guaranteed.
Owner:俞毅

Message subscription management apparatus and method

ActiveCN106095789AImprovements to detail storageReduce storageSpecial data processing applicationsArray data structureFirst generation
The invention discloses a message subscription management apparatus and method. The message subscription management apparatus comprises a receiving module used for receiving a new message created by a message creator, a first generation module used for generating a message identifier corresponding to the new message, an acquisition module used for acquiring a subscription user identifier of a subscription user of the message creator, and a storage module used for storing the message identifier in a preset storage region according to the subscription user identifier, wherein the preset storage region comprises subscription user identifier fields corresponding to the subscription user and message identifier array fields in one-to-one correspondence with the subscription user identifier fields, and the message identifier is stored in the message identifier array fields. According to the apparatus and the method, a message detail storage mode is improved, so that the data storage capacity is greatly reduced, the pressures of a server and a database are reduced, and the overall performance of the server is improved.
Owner:NUBIA TECH CO LTD

File transmission control method and device, equipment and storage medium

ActiveCN110247951ASolve the problem of linear growthIngress Bandwidth SavingsTransmissionLinear growthFile transmission
The embodiment of the invention discloses a file transmission control method, which comprises the following steps: receiving a file transmission request which carries a user identifier and a request type identifier; under the condition that the request type identifier is a file downloading type, if the user identifier represents that the user is an intranet user, starting an intranet local downloading scene, downloading a required file from an intranet server, and if the user identifier represents that the user is not an intranet user, preferentially starting an extranet downloading scene, and downloading the required file from an extranet server; under the condition that the request type identifier is a file uploading type, uploading the file; if the user identifier represents that the user is an intranet user, obtaining a user identifier; starting an intranet local uploading scene; and uploading the file to an intranet server and synchronizing the file to an extranet server, preferentially starting an extranet uploading scene if the user identifier represents that the user is not an intranet user, uploading the file to the extranet server and synchronizing the file to the intranet server, and solving the problem that the entrance bandwidth is linearly increased along with the increase of the access quantity of the user.
Owner:建信融通有限责任公司

Recommendation information generation method and device, electronic equipment and readable storage medium

The embodiment of the invention provides a recommendation information generation method and device, electronic equipment and a readable storage medium. The method comprises the following steps: according to an association relationship among user identifiers, object identifiers and situation attribute parameters, obtaining user identifiers; determining a first node comprising a context attribute parameter and a second node comprising a user identifier, and a plurality of paths including a third node of the object identification, according to each sub-parameter value included in the first node on the plurality of paths and a third node, grouping the plurality of paths; obtaining multiple sets of paths, according to the respective path attribute values of the multiple groups of paths; generating recommendation information of the to-be-recommended object, by adoption of the method provided by the embodiment of the invention, the process of generating the to-be-recommended information is combined with the situation attribute parameters and the path attribute values in the historical data of the field to which the recommendation information belongs, so that the recommendation informationfor the to-be-recommended object is richer and has reference, and more surprise and attraction can be brought to the user.
Owner:BEIJING SANKUAI ONLINE TECH CO LTD

System and method for specializing transactions according to the service provider

ActiveUS20180025293A1Ticket-issuing apparatusReservationsService providerUser identifier
A method for enabling transactions on networks that deliver services to users includes communicating a transaction application and a respective user identifier to a mobile communication device via a wireless connection. A set of complementary modules is stored, remote from the mobile communication device. When one of the complementary module has been loaded on the user's mobile communication device, it enables the user of the device to specialize a transaction on at least one of the associated networks by selecting at least one variable of the transaction. Different complementary modules can be provided to the user's mobile communication device for specializing transactions on other service provider networks.
Owner:CONDUENT BUSINESS SERVICES LLC

Key management method and system supporting multiple key systems

The invention provides a secret key management method and system supporting multiple secret key systems, and the method comprises an initialization process: randomly generating a root main secret keythrough password equipment, and enabling a root main secret key threshold to be backed up to all root main secret key mother cards; generating a first-level public and private key through the passwordequipment, and generating a first-level certificate through self-signature; generating a root identification key through the cryptographic device; the symmetric key management comprises the followingsteps: dispersing a root master key to obtain a primary symmetric key; sequentially dispersing upper-level symmetric keys to obtain second-level to N-level symmetric keys; dispersing N levels of symmetric keys to obtain a user symmetric key; the asymmetric key management comprises the following steps: sequentially generating second-level to N-level public and private keys and user public and private keys through password equipment; sequentially generating second-level to N-level certificates and user certificates through signing and issuing of an upper-level private key; identification key management includes generating a user key by calculating parameter information including a user identifier and a root identifier key.
Owner:ZHENGZHOU XINDA JIEAN INFORMATION TECH

Base station account opening/closing method and system

The invention relates to a base station account opening/closing method and system. The base station account opening/closing method comprises the steps of acquiring first account opening/closing information of each base station from a production database platform, wherein the first account opening/closing information comprises a first identifier of each base station and a first parameter corresponding to the first identifier, and the first parameter is a parameter associated with the authentication mode; receiving second account opening/closing information of an issued target base station, wherein the target base station is a base station on which an account opening/closing operation is required to be carried out, the second account opening/closing information comprises account opening/closing region information of the target base station, a second identifier of the target base station and a second parameter corresponding to the second identifier, and the second parameter is a parameter associated with the authentication mode; and binding the second identifier and the second parameter with the account opening/closing region information and sending the second identifier and the second parameter to an authentication server so as to carry out an account opening/closing operation if the second parameter corresponding to the second identifier is matched with the first parameter corresponding to the first identifier and if the account opening/closing region information is matched with management region information.
Owner:COMBA TELECOM SYST CHINA LTD

Member level configuration method and device, computer equipment and readable storage medium

The invention relates to a member level configuration method and device, computer equipment and a readable storage medium. The method comprises the following steps: receiving a target user identifierand to-be-verified level configuration sent by a terminal, wherein the to-be-verified level configuration is user input obtained from a level creation interface, the level creation interface comprisesa basic information configuration control and a condition configuration control, and the condition configuration control comprises at least one of an upgrading condition input control, a level preservation condition input control and a degradation condition input control, and the to-be-verified level configuration comprises to-be-verified grade basic information and to-be-verified grade conditioninformation; verifying the to-be-verified level configuration according to the target user identifier and a preset verification database, wherein the verification database comprises verified level configurations corresponding to different user identifiers; and if the verification is passed, adding the to-be-verified grade configuration to a verification database, and sending a grade configurationsuccess message to the terminal. By adopting the method, the member level configuration efficiency can be improved.
Owner:GUANGZHOU HUADUO NETWORK TECH

Media Storage System

InactiveUS20090064210A1Digital data processing detailsFilamentary/web record carriersRelevant informationRemote control
A media storage system includes a disc input element for receiving a media disc, a disc output element for ejecting a disc, and a media reader for reading information from a disc. If insufficient information is readable from a disc, it may be obtained through a computer network. The system includes a disc transporter for moving received discs to respective internal storage locations. The system includes a data input device for entering disc catalogue data and a data output device such as a display for displaying disc catalogue data. The data input and output devices may be input buttons and a display on a remote control. Each disc and related information is associated with an identifier such that access to disc data may be by restricted by user identifier or content ratings.
Owner:SHYAM CONSULTANTS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products