http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-105117622-B

Outgoing Links

Predicate Object
classificationCPCAdditional http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F2221-2111
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F2221-2135
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G10L17-00
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F2221-2115
classificationCPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06V20-95
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06V40-172
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-31
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-40
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-44
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-32
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-36
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06V20-48
classificationIPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F21-44
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F21-31
filingDate 2015-03-25-04:00^^<http://www.w3.org/2001/XMLSchema#date>
grantDate 2017-05-17-04:00^^<http://www.w3.org/2001/XMLSchema#date>
publicationDate 2017-05-17-04:00^^<http://www.w3.org/2001/XMLSchema#date>
publicationNumber CN-105117622-B
titleOfInvention Authentication method and system using video signature
abstract Methods and apparatuses, including computer program products, are described for authentication using a video signature. A computing device receives a request to access a secure resource, and the request includes a first video segment comprising a plurality of visual and audio elements. The computing device analyzes one or more of the plurality of visual and audio elements in the first video segment to determine a value associated with each of the one or more analyzed elements. The computing device calculates a total score for the first video segment based upon the value associated with each of the one or more analyzed elements. The computing device compares the total score for the first video segment to a score associated with a second video segment associated with the computing device. The computing device determines whether access to the secure resource is permitted based upon the comparison step.
priorityDate 2014-03-25-04:00^^<http://www.w3.org/2001/XMLSchema#date>
type http://data.epo.org/linked-data/def/patent/Publication

Incoming Links

Predicate Subject
isDiscussedBy http://rdf.ncbi.nlm.nih.gov/pubchem/taxonomy/TAXID154026
http://rdf.ncbi.nlm.nih.gov/pubchem/substance/SID419563342
http://rdf.ncbi.nlm.nih.gov/pubchem/anatomy/ANATOMYID370703
http://rdf.ncbi.nlm.nih.gov/pubchem/taxonomy/TAXID36181
http://rdf.ncbi.nlm.nih.gov/pubchem/compound/CID5282448
http://rdf.ncbi.nlm.nih.gov/pubchem/anatomy/ANATOMYID154026
http://rdf.ncbi.nlm.nih.gov/pubchem/anatomy/ANATOMYID36181
http://rdf.ncbi.nlm.nih.gov/pubchem/taxonomy/TAXID370703

Total number of triples: 30.