Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

74results about How to "Achieve mutual authentication" patented technology

Node discovering method and system in communication network

The invention provides a node discovering method and a node discovering system in a communication network. The method comprises the following steps that a source node sends discovery request messages to a next hop of node, and the discovery request messages carry the address information of the source node, the identity information of the source node, the address information of a target node and the challenge value generated by the source node; a node receiving the discovery request messages returns verification information, submitted to the source node by the node, to the source node; whether the node is a target node or not is judged according to the address information, and if the node is not the target node, the discovery request messages are transferred to the next hop of node of the node; after the source node receives the verification information returned by the target node, each node is verified according to the verification information submitted by each node; if the verification is completely passed, each node is determined to be trusted nodes. The method and the system provided by the invention have the advantages that the safety and the reliability of the communication transmission between network equipment can be ensured, and the communication delay is reduced.
Owner:INST OF INFORMATION ENG CAS +1

Regional health information sharing network system

The invention discloses a regional health information sharing network system, which is characterized in that an application terminal device of a community health service center, an application terminal device of a village clinics/service station, an application terminal device of a large and medium-sized hospital, and an application terminal device of a third party pay for medical insurance are all in two-way data connection with a medical health information sharing platform. The system is suitable for establishing cross-platform data sharing in a certain scope mainly based on residents, and builds up a perfect platform for the construction of regional health information. Based on the platform, a plurality of application systems of different fields and different structures can be added, thus the platform has excellent expansibility, and regional health information is shared and interacted. The system has strong data integration performance; a BG-MPI module provides a strong data pairing mechanism with high accuracy; and mutual authentication of multiple service modules can be realized. Compared with the prior art, the system has outstanding substantive characteristics and remarkable improvement.
Owner:上海新致百果信息科技有限公司 +1

Terminal equipment access authentication method and system based on edge computing

ActiveCN108810026AReduce complexityReduce overheadTransmissionLightweight cryptographyEdge computing
The invention discloses a terminal equipment access authentication method and system based on edge computing. The method comprises the following steps: S1, key sharing, sharing a key between the terminal equipment and the edge computing server; S2, system initialization authentication: accomplishing mutual initial identity authentication between the terminal equipment and the edge computing serveraccording to the key and the lightweight cryptography algorithm; S3, physical layer channel authentication modeling: verifying the data legality from the fourth-frame data by the edge computing server; S5, upper cryptography authentication: starting the upper cryptography authentication if the legality of the received data frame cannot pass the model authentication at the non-initialization authentication stage; and S6, physical layer channel authentication model updating: updating the physical layer channel authentication model when j data frames continuously received by the edge computing server in the coherent time need to start the upper cryptography authentication. Through the method disclosed by the invention, the complexity of the terminal equipment identity authentication is reduced, and the security and the authentication rate of the identity authentication are improved.
Owner:CERTUS NETWORK TECHNANJING

Identity-based authentication method and identity-based authentication system with secret key negotiation

An embodiment of the invention provides an identity-based authentication method and an identity-based authentication system with secret key negotiation. The identity-based authentication method mainly comprises the steps of generating and disclosing a system parameter by a server based on a safety parameter; transmitting identity identification of a user to the server by user terminal, generating the public key and the private key of a user by the server according to the identity identification and the system parameter of the user, and transmitting the public key and the private key of the user to the user terminal; and performing mutual authentication and session key negotiation by means of the public key and the private key of the user between the server and the user terminal. The embodiment of the invention provides the identity-based authentication method and the identity-based authentication system with secret key negotiation. The identity-based authentication method and the identity-based authentication system can realize mutual authentication between the client and the server. Furthermore in the mutual authentication process, session key is negotiated and authentication can be effectively and safely realized by means of basic operation on an elliptical curve. The identity-based authentication method and the identity-based authentication system can be widely applied in electronic commerce.
Owner:AEROSPACE INFORMATION

Lightweight authentication method and system based on Ethereum IoT entity, and intelligent terminal

The invention belongs to the technical field of network security communication, and discloses a lightweight authentication method and system based on Ethereum IoT entity, and an intelligent terminal.The method comprises the following steps: performing an Ethereum-based IoT entity hierarchical architecture deployment stage; performing an intelligent device registration stage; sending authentication request information; verifying the request information for the chameleon hash function and sending authentication information and response information; sending an authentication confirmation message; performing IoT inter-entity interaction information. The method and system are applied to all Internet of Things scenes, the consensus reaching time of the blockchain node is greatly reduced, and the trouble caused by the limitation of the processing capacity of the intelligent equipment is also solved; the hash value of the key information of the equipment is subjected to whole-network backup in the blockchain, so that the security of the identity of the terminal equipment is ensured; mutual authentication between entities of the Internet of Things is realized by utilizing the characteristics of the chameleon hash function, so that the authentication efficiency is improved, and all currently known attacks can be resisted.
Owner:XIDIAN UNIV

Group path mobile handover authentication method based on mobile relay

The invention discloses a group path mobile handover authentication method based on a mobile relay, which is characterized by comprising the following steps of: S1, executing a stage of carrying out initial authentication; S2, executing a stage of carrying out switching authentication on the basis of a group path; S3, executing an internal switching process aiming at MMEs; S4, executing an inter-switching process aiming at the MMEs; S5, sending group switching command information; and S6, sending a group switching confirmation message. According to the group path mobile handover authentication method disclosed by the invention, the scheme is designed according to a 3GPP standard, and thus, communication equipment in the standard does not need to be changed, and the group path mobile handover authentication method can be applied to networks of all LTE-A mobile scenes; massive switching information can be integrated into one piece of group switching information, and signaling traffic between all the equipment and the MMEs is greatly saved, so that switching communication cost is greatly reduced, and signaling congestion on a link between a service network and a home network is reduced; and mutual authentication between a group of MRNs and a base station DeNB can be directly implemented, and all currently known attacks can be resisted to.
Owner:XIDIAN UNIV

Remote protocol authentication method based on biological features

The invention provides a remote protocol authentication negotiation protocol method based on biological features and belongs to the field of information safety. An efficient elliptic curve coding system is adopted. The method comprises the following steps that (1) system initialization is carried out to generate elliptic curve data; (2) a user submits register information to a server through a safe channel, and the server conducts data processing and then stores the information into an intelligent card and sends the information to the user through the safe channel; (3) a user needs to calculate login information and sends the login information to the server; (4) the purpose of authentication and key negotiation between the user and the server can be achieved through two times of hand shaking, and a session key is generated; (5) the user can achieve the purposes of changing a password and the biological features through the operation of the intelligent card without the assistance of the server. By means of the design, the protocol is high in safety, all mentioned known attacks can be resisted, meanwhile, dynamic identity is adopted, the anonymity of the user is protected, and the calculation performance is also greatly improved. The method is suitable for online education, remote medical and other remote authentication systems.
Owner:BEIHANG UNIV

Radio frequency fingerprint (RFF)-based wireless intelligent terminal access authentication method and RFF-based wireless intelligent terminal access authentication system

ActiveCN107612949AReduced complexity and overheadMeet the need for anonymityTransmissionAuthentication systemRadio frequency
The invention discloses a radio frequency fingerprint (RFF)-based wireless intelligent terminal access authentication method and an RFF-based wireless intelligent terminal access authentication system. The method comprises the following steps: S1, initialized registration entry: using a wireless intelligent terminal to encrypt a registered password input by a user, then transmitting the encryptedpassword to a server, and initiating a registration request to the server; using the server to complete the initialized registration entry according to the encrypted password and the RFF of the wireless intelligent terminal; S2, running login authentication: when the user requests to log in to the server, performing two-way legitimacy certification between the wireless intelligent terminal and theserver according to the initialized registration entry information, and managing the connection and disconnection of session between the wireless intelligent terminal and the server according to thecertification result. The RFF-based wireless intelligent terminal access authentication method and the RFF-based wireless intelligent terminal access authentication system which are provided by the invention can realize the mutual authentication between the wireless intelligent terminal and the server, thus reducing the complexity of identity authentication of the wireless intelligent terminal andimproving the safety of the identity authentication.
Owner:UNIV OF ELECTRONIC SCI & TECH OF CHINA

GNSS satellite clock state of health monitoring method

The invention discloses a GNSS satellite clock state of health monitoring method. Mutual effective verification can be performed for the satellite clock abnormal state by using multiple satellite clock difference data so that the problems of fault location difficulty, false alarm, early warning difficulty and poor timeliness causing various abnormal phenomena of the satellite clock can be solved,and long-term real-time monitoring of the state of health of the satellite clock can be realized. The method comprises the steps that the frequency and drift rate data are acquired through the primaryand secondary differential precision clock difference data, and the phase and frequency hop is detected by using the median method; fitting of the clock difference is performed by using the quadraticpolynomial so as to acquire the long time phase residual and the residual standard deviation; statistics of the frequency stability of the satellite clock is performed by using overlap hadamard variance; and finally various indexes are comprehensively evaluated, and the early warning information of the change of the satellite clock performance and the alarm information of the frequency and phasehop are given. The result proves that the satellite atomic clock state of health monitoring method using phase fitting residual based on multiple data sources is feasible.
Owner:SPACE STAR TECH CO LTD

Mass D2D anonymous discovery authentication and key negotiation method

The invention belongs to the technical field of communication network security, and discloses a mass D2D anonymous discovery authentication and key negotiation method. The method includes an initialization authentication stage; an anonymous device discovery stage based on prefix encryption; a mutual authentication and key negotiation stage based on batch verification; and a key confirmation stage.According to the scheme design carried out according to the 3GPP standard, communication equipment in the standard does not need to be changed, and the method can be applied to networks of all LTE-A / 5G mobile scenes; the general structure of the equipment discovery and authentication mechanism provided by the invention can realize discovery, mutual authentication, key negotiation and identity privacy protection of adjacent equipment; according to the rapid key confirmation method based on the CRT mechanism provided by the invention, the signaling number is effectively reduced; the signaling overhead, the communication overhead and the transmission overhead are reduced; direct mutual authentication between a large number of D2D devices can be directly realized, and all known attacks at present can be resisted.
Owner:GUANGDONG OPPO MOBILE TELECOMM CORP LTD

Lightweight security access authentication method and application suitable for 5G network equipment

The invention belongs to the technical field of communication network security, and discloses a lightweight security access authentication method suitable for 5G network equipment and an application,comprising the following steps: selecting a large prime number, respectively selecting three variables for all registered SNs, registered UEs and registered MDs, and selecting two secure hash functions to realize system setting; completing service network registration and equipment registration for different entities; realizing access authentication and key agreement of a single UE; and realizingmass MD group access authentication and key agreement. According to the invention, the signaling cost, the communication cost and the storage cost are reduced, signaling overhead can be effectively reduced, and signaling conflicts can be avoided; in the LSAA protocol for massive MDs, the SN can complete the authentication of a group of MDs by directly verifying the aggregated message verificationcode, thereby effectively reducing the communication and calculation overhead. Extended Chebyshev chaotic mapping is used, each MD can securely negotiate a different session key with the SN and consume less overhead.
Owner:XIDIAN UNIV

Cloud service cluster management method and system

The invention belongs to the technical field of cloud computing, and discloses a cloud service cluster management method and system. The method comprises the following steps: a platform authenticationserver and cluster authentication servers of clusters generate authentication keys according to a preset key generation mode; when receiving a cluster management command for a target cluster, a cloudmanagement platform sends an authentication information acquisition request to the platform authentication server, so that the platform authentication server can generate authentication information according to the corresponding authentication key and feed the authentication information back to the cloud management platform; the cloud management platform sends a cluster management request with the authentication information to a target management server of the target cluster; the target management server sends the authentication information to a target cluster authentication server of the target cluster, so that the target cluster authentication server can authenticate the authentication information according to the corresponding authentication key; and if authentication is successful, the target management server executes the cluster management request. The method and system provided by the invention has the advantage that the authentication service safety can be improved.
Owner:CHINANETCENT TECH

Multi-means advanced detection method for water-rich karst tunnel

The invention relates to a multi-means advanced detection method for a water-rich karst tunnel. The multi-means advanced detection method comprises the steps of: acquiring a structural terrain in a tunnel region, and predicting an unfavorable geological structure and an engineering tunnel condition; carrying out geometric modeling, and determining a three-dimensional tunnel geological generalization model; determining corresponding layout parameters, and carrying out advance drilling layout on the tunnel face; performing cross-hole CT scanning, in-hole geological radar detection and induced polarization method detection on the completely-arranged tunnel face, and determining a wave velocity distribution image between two advance drill holes, a wave velocity map in the advance drill holes and geoelectricity data respectively; determining a position interval range for predicting the unfavorable geological structure according to the data consistency of the wave velocity distribution image, the in-hole wave velocity map and the geoelectricity data in multiple directions; and detecting according to the position interval range, and planning a construction scheme. Multi-means advanced geological exploration is adopted, information of seismic waves, electromagnetic waves and an electrical method is combined, the tunnel construction risk is effectively reduced, and safe construction is ensured.
Owner:云南楚大高速公路投资开发有限公司 +1

Single sign-on authentication method based on inadvertent pseudo-random function and signcryption

The invention belongs to the technical field of information security, and discloses a single sign-on (SSO) authentication system and method based on an inadvertent pseudorandom function (OPRF) and signcryption. The single sign-on authentication method includes a system initialization parameter stage, a user / service provider (SP) registration stage, an information retrieval stage and a user and SPbidirectional authentication stage. According to the invention, the OPRF and the signcryption scheme are combined, i.e., the OPRF value is obtained by blinding the password of the user through the OPRF and is used for encrypting the signcryption private key of the user, and the ciphertext is stored in the storage provider end. Before login, the user recovers the OPRF value and decrypts the retrieved ciphertext to obtain the signcryption private key, thereby realizing bidirectional authentication with the SP. The invention provides a security enhancement function for password leakage threats, an SP does not store a password or a password derivative value, a client accidentally leaks the password, and an enemy cannot counterfeit the password as the SP to deceive a user. According to the invention, common attacks in an SSO authentication system can be resisted and bidirectional authentication can be completed efficiently.
Owner:XIDIAN UNIV

Unmanned sightseeing boat cluster monitoring system and information sharing method

The invention discloses an unmanned sightseeing boat cluster monitoring system and an information sharing method, the unmanned sightseeing boat cluster monitoring system comprises an unmanned sightseeing boat and a monitoring center, the unmanned sightseeing boat is provided with a boat end controller, boat end communication equipment, navigation equipment, obstacle avoidance equipment, camera equipment and interactive terminal equipment, and the monitoring center is provided with a central controller, central communication equipment and a server. The unmanned sightseeing boat exchanges data with the monitoring center through the communication device. The interactive terminal device plays image information or tour guide information of the unmanned pleasure boat; the central controller is used for monitoring the operation of each unmanned pleasure boat in an overall planning manner according to the monitoring data of the navigation equipment and the obstacle avoidance equipment; unmanned sightseeing boat cluster scheduling is realized through sharing navigation data, the recognition capability of water area obstacles is improved through sharing obstacle avoidance data, live-action sharing among multiple unmanned sightseeing boats is realized through a 5G communication technology, the requirement of passengers for multi-line sightseeing during single-time boat taking is met, the safety of the sightseeing boats can be ensured, and the performance of the unmanned sightseeing boats is maximized.
Owner:青岛无疆技术有限公司

Method, system and equipment for implementing multicast service effective authentication and key distribution protocol

The invention belongs to the technical field of satellite communication information security, and discloses a multicast service effective authentication and key distribution protocol implementation method, system and equipment, and the multicast service effective authentication and key distribution protocol implementation method adopts a 5GAKA mechanism to realize deduction of a shared key between UE and BM-SC; a group multicast service registration mechanism is adopted; distributing and updating a multicast service group key based on the Chinese remainder theorem CRT; mutual identity verification and a key protocol between the UE and the BM-SC are safely realized in multicast service registration, and a key is updated when a group member relationship changes. According to the invention, the communication overhead and the calculation overhead are reduced, and the problem of signaling conflict when massive users access the BM-SC at the same time to obtain the multicast service is avoided; the key management efficiency is improved, and meanwhile, the security of multicast service data transmission can be ensured; and the previous and later multicast service data cannot be obtained under the condition that the new member joins and the old member quits.
Owner:XIDIAN UNIV

Integration system and method for correlation analysis among multiple omics data sets

The invention provides an integration system and method for correlation analysis among multiple omics data sets. The method comprises the following steps: processing each type of omics original data to obtain an omics data file corresponding to the type of the omics original data, and processing phenotypic original data to obtain a phenotypic data file; adding two types of omics variables in the omics variables of the various types of omics data files into a variable set, and combining the omics variables in the variable set in pairs to generate a plurality of omics single-dimensional data pairs; performing dimension reduction processing on each type of omics data file to obtain a combined variable corresponding to the type; combining the various types of combined variables in pairs to generate a plurality of combined variable data pairs; combining the various types of combined variables with the phenotypic data files in pairs to generate a plurality of omics and phenotypic data pairs;and performing correlation analysis on the omics single-dimensional data pairs, the combined variable data pairs and the omics and phenotype data pairs to respectively obtain respective correlation relationships and corresponding correlation parameters, and outputting the respective correlation relationships and the corresponding correlation parameters. The invention provides an effective methodfor comprehensively analyzing the biological information of the system and is capable of discovering the linear correlation relationship among the multiple omics data and finding out the nonlinear correlation pair with the function relationship and without the function relationship, thereby having comprehensive functionality.
Owner:SHANGHAI SIXTH PEOPLES HOSPITAL
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products