Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

75results about How to "Authentication is simple" patented technology

Method and device for authenticated access of a station to local data networks in particular radio data networks

The invention relates to methods, devices and systems for the authenticated access to a data network by means of a station (WH) compatible with a data network (WLAN), which permit an authentication of the station and user. A device, for example a mobile radio device, is used for the above, which is authenticated in another system. In addition to the authentication, in particular a charging of services in a data network or another communication system (GSM) which is accessible by means of the data network is thus possible.
Owner:MONARCH NETWORKING SOLUTIONS LLC

Method and apparatus for secure communication between user equipment and private network

It is an object of the present invention to provide a new technical solution of supporting special secure communication between user equipment which is located in an external network and an private network the user equipment belongs to. Specifically, transmitted data is encrypted / decrypted and authenticated by using pre-stored root keys corresponding to specific private networks and the agreed encryption / decryption and authentication algorithm at the user equipment and an access device. The manner of generating the encryption / decryption keys and authentication key is simplified, and the complexity of the access device at the private network end is reduced on the premise of not degrading the security grade. The technical solution of the present invention is highly flexible and extensible and can achieve better user experience.
Owner:ALCATEL LUCENT SAS

Element for security document comprising an optical structure

A security element adapted for integration into a security document. The security element having a substrate with a first face and a second face. An optical structure is disposed on the first face, and at least two patterns are inscribed on the second face. The two patterns are at least partially identical. The first pattern is observable at a first position on the second face through the optical structure along a first viewing angle. The second pattern is observable at a second position on the second face through the optical structure along a second viewing angle. Authenticity of the document may be verified by comparing the observed patterns.
Owner:ARJO WIGGINS SECURITY SAS

Personal authentication system

To reduce the vexatious complication of personal authentication when using an information technology device or a card, a combination of RFID tags worn by a user is stored when personal authentication is carried out. After that, the RFID tags are detected again in a situation where personal authentication is required. The continuous use of the previous personal authentication is permitted depending on the extent of coincidence between pieces of RFID information thus detected and the combination of stored RFID information, so that further authentication operations can be omitted. In addition, reference is made to a past archive when an RFID list is created. A weighted coefficient is then calculated based on the put-on frequency (put-on archive) in terms of a user's single article or a combination of such articles. The utilization of the weighted coefficient provides personal authentication with a high level of reliability.
Owner:MAXELL HLDG LTD

Identity authentication method and system, and computer readable storage medium

The invention discloses an identity authentication method and system, and a computer readable storage medium. The identity authentication method is applied to a receiving end and comprises the following steps: receiving a digital asset signature sent by a sending end, and decrypts the digital asset signature to obtain to-be-authenticated digital asset information; obtaining reference digital asset information issued by the sending end from a block chain, and detecting whether the to-be-authenticated digital asset information is consistent with the reference digital asset information; and if so, marking the sending end as a legal owner of the reference digital asset information. By adoption of the identity authentication method and system, the CA (Certificate Authority certificate authority center) does not need to authenticate the identity of the sending end by issuing a certificate to the sending end, so that the identity authentication process of the sending end is simple, convenient and feasible, and the time cost and the charge cost of the user are reduced.
Owner:SHENZHEN ECHIEV AUTONOMOUS DRIVING TECH CO LTD

System and method for encrypted communication

In an encryption communication using VPN technologies, a load on a VPN system becomes large if the number of communication terminals increases. When an external terminal accesses via an internal terminal an application server, processes become complicated because it is necessary to perform authentication at VPN and authentication at the application server. A management server is provided for managing external terminals, internal terminals and application servers. The management server authenticates each communication terminal and operates to establish an encryption communication path between communication terminals. Authentication of each terminal by the management server relies upon a validation server. When the external terminal performs encryption communication with the application server via the internal terminal, two encryption communication paths are established and used between the external terminal and internal terminal and between the internal terminal and application server.
Owner:HITACHI LTD

KPD (key position detection) authentication method and system for vehicle and smart key and vehicle base station

The invention provides a KPD (key position detection) authentication method and system for a vehicle and a smart key and a vehicle base station. The method comprises the following steps of: sending encrypted and coded identity authentication information to the smart key through low frequency so as to initiate identity authentication and starting a timer; when the time of the timer reaches set time, sending a low-frequency carrier wave to the smart key through low frequency so as to initiate position authentication; receiving authentication results sent by the smart key through high frequency, wherein the authentication results include an identity authentication result obtained in a manner that the smart key decrypts and decodes the identity authentication information and a measurement result obtained through measuring the field intensity of the low-frequency carrier wave; and judging whether the identity and position of the smart key are legal or not according to the identity authentication result and the measurement result, and executing related operations when the identity and position of the smart key are legal. The method, the system and the vehicle base station, provided by the invention, have the advantages that the time for KPD authentication is greatly shortened, the probability that unstable factors appear in a communication process is reduced, and the practicability of PEPS (Passive Entry & Push Start Systems) is enhanced.
Owner:天津经纬恒润科技有限公司

Method and system for a traditional terminal user to access an IMS domain

Provided are an implementing method and a communication system for a traditional terminal user accessing an IMS domain. The method allocates an IMS domain user identification including a public identification and a private identification to a traditional terminal user on an AGF entity controlled by an AGCF entity, and establishes a mapping relation between the IMS domain user identification and the line identification of the user. When receiving a command or message for a certain user terminal sent from the AGF entity, the AGCF entity determines the IMS domain user identification of the user according to the mapping relation and sends a corresponding SIP message to the IMS domain.
Owner:HUAWEI TECH CO LTD

Method and apparatus for connection between electronic devices

Disclosed are a method and an apparatus for connecting electronic devices based on biometric information without a certification server. An electronic device includes a wireless communication unit configured to perform wireless communication with an external device; a biometric recognition module; a memory; and a processor connected to the wireless communication unit, the biometric recognition module, and the memory. The processor is configured to register, in the external device, authentication information for authenticating the external device through the electronic device, establish a communication connection with the external device through the wireless communication unit, receive a request for authenticating the electronic device from the external device in response to the communication connection, acquire biometric information corresponding to a user of the electronic device using the biometric recognition module in response to the authentication request, perform device authentication for the user based on at least the biometric information, encrypt authentication information when the authentication is successfully performed, and transmit the encrypted authentication information to the external device.
Owner:SAMSUNG ELECTRONICS CO LTD

Authentication system and method, and user equipment, authentication server, and service server for performing same method

Provided are an authentication system and method, and a user terminal, an authentication server, and a service server for performing the authentication method. According to embodiments of the present invention, a complex authentication procedure carried out in the conventional FIDO authentication technology is simplified using a second public key of which the integrity has been checked, so that a transaction occurring in an authentication procedure can be minimized. Such an authentication method is advantageously suitable to provide a service requiring fast authentication, such as security buying and selling or futures trading.
Owner:SAMSUNG SDS CO LTD

Method for performing user authentication and electronic device thereof

ActiveUS20160088241A1Economic efficiency be ensureSimplify authentication of userTelevision system detailsImage enhancementUser authenticationComputer security
Disclosed are a method and an electronic device for performing user authentication, the method including detecting a subject, determining a light-emitting parameter of a light source when the subject is to be photographed, and acquiring an image of the subject based on the determined light-emitting parameter.
Owner:SAMSUNG ELECTRONICS CO LTD

Method and device for calibrating measuring transducers of ultrasonic flow meters

The invention relates to a method for calibrating the transmitters of ultrasonic flow meters according to the transit time difference method. The object of the invention is to provide a method for calibrating the transmitters of ultrasonic flow meters, said calibration being able to be carried out independently of the other components of the meter, such as the acoustic transducers and the pipe in which the fluid flow being measured occurs. According to the invention, the measurement signals are generated by means of an artificial simulation of the measurement path. This allows the transmitter to be calibrated independently of the remaining components of the measuring apparatus, such as the measuring tube and the acoustic transducers.
Owner:FLEXIM FLEXIBLE INDMESSTECHN

ONU certificate method for PON system

The invention provides an ONU certificate method for a PON system, which comprises the following steps: ONU is first accessed to OLT and transmits local identification information to OLT; the certification information of a user is provided for the OLT, and authorization is obtained; and the identification information is added to a certification database to permit the accession of the ONU after the authorization is adopted. The invention simplifies the ONU certification of the OLT in the PON system.
Owner:ZTE CORP

Member authentication system

A user calls a specific number of an authentication center (member authentication device) from a mobile terminal in a state of caller line identity presentation and hangs up the mobile terminal after one ring. The authentication center can recognize the number of the mobile terminal of the caller in spite of the hang-up of the call as long as the phone number of the caller is presented during the ring. The member authentication device searches a database in the authentication center to compare the caller's number on the mobile terminal with the member registered caller's numbers for verification. Member authentication is thus executed and its result is outputted.
Owner:IONOS

Device authentication system

An authenticating device generates authentication base data and verification data. The authenticating device embeds the verification data in the authentication base data to generate authentication data. The authenticating device transmits the authentication data to a device to be authenticated. In the device to be authenticated, the verification data is extracted from the transmitted authentication data, and verification reply data is generated on the basis of the extracted verification data. The device to be authenticated generates reply base data, and embeds the verification reply data in the reply base data to generate authentication reply data. The device to be authenticated transmits the authentication reply data to the authenticating device. The authenticating device extracts the verification reply data from the transmitted authentication reply data. The authenticating device compares the original verification data and the extracted verification reply data to decide whether or not the device to be authenticated is genuine.
Owner:JVC KENWOOD CORP A CORP OF JAPAN

"Internet of Things+" industrial ecosphere shared all-win platform

The invention discloses an "Internet of Things+" industrial ecosphere shared all-win platform, which comprises an ecosphere enterprise product terminal, an enterprise customer shared APP user terminaland a shared background management system built on a cloud server, wherein the ecosphere enterprise product terminal is connected to an Internet of Things gateway; the Internet of Things gateway andthe enterprise customer shared APP user terminal are connected to the cloud server through WIFI, 4G or NB-IOT; and the shared background management system is divided into an enterprise edition sharedbackground management system and a shared Internet of Things background management system through different settings of the use permission of functional modules. According to the "Internet of Things+"industrial ecosphere shared all-win platform, the generalization performance is wide, most of the requirements of most enterprises in the industry can be met, and the time and cost are greatly saved.
Owner:四川芯波智创物联技术有限公司

Face authentication and face recognition method

The invention provides a face authentication and face recognition method. The eye-open image and the eye-close image of a person under authentication are acquired by the camera of a mobile terminal, and whether the face is a live face is judged by comparison of the eye area of the eye-open image and the eye area of the eye-close image so that the risk of criminal obtaining benefits by stealing others' photos for authentication can be simply and effectively prevented. Then whether the face image on the ID card is matched with the eye-open image of the face is judged, and the person can enter an operation platform if the judgment result is yes, wherein the constant features of the face are selected in matching: the distance between the corners of the mouth, the distance between the corners of the eyes, the distance between the left and right boundaries of the face, the distance between the upper and lower boundaries of the face and the distance between the corners of the mouth and the left and right boundaries so that feature vectors are constructed, and the problem of low recognition rate caused by the change of the age and the hair styles can be greatly solved.
Owner:湖南联信科技有限公司

Electronic key system

Provided is an electronic key system capable of providing an instruction to an automobile through a portable device having biometric authentication of a user. When biometric information of a wearer is detected by a biometric recognition sensor, a portable device worn on a user determines with a biometric authentication unit whether or not the detected biometric information is matched with biometric information of a previously-registered user. When the biometric authentication unit authorizes that the wearer is a registered user, the portable device enables, through a communication control unit, near-distance wireless communication with a control unit mounted on an automobile through a wireless communication device. Thus, the portable device can provide an operational instruction to the automobile through wireless communication with the control unit.
Owner:TAYAMA SHUICHI +1

Security chip based on PUF and zero knowledge proof, application method, system and medium

The invention discloses a security chip based on PUF and zero knowledge proof, an application method, a system and a medium. The security chip based on PUF and zero knowledge proof comprises a PUF circuit module, a ChipID generation circuit module, a zero knowledge proof circuit module and a main control module. The zero knowledge proof circuit module comprises a first execution circuit used for generating a publicable zero knowledge identification number PID and a second execution circuit used for generating a proof code P. An identity authentication application method comprises the step of realizing the identity authentication method based on the lightweight security chip based on the security chip. The identity authentication method does not need a complex interactive protocol. The request end and the server end only need to execute zero knowledge proof calculation. Compared with a digital signature and authentication method based on a public key cryptographic algorithm, the identity authentication method is simpler and has the advantages of good universality, high security, low authentication overhead, simple authentication process and the like.
Owner:北京智涵芯宇科技有限公司

Method and apparatus for secure communication between user equipment and private network

ActiveUS7853783B2Simple secure communication schemeAuthentication is simpleTransmissionSecure communicationExtensibility
It is an object of the present invention to provide a new technical solution of supporting special secure communication between user equipment which is located in an external network and an private network the user equipment belongs to. Specifically, transmitted data is encrypted / decrypted and authenticated by using pre-stored root keys corresponding to specific private networks and the agreed encryption / decryption and authentication algorithm at the user equipment and an access device. The manner of generating the encryption / decryption keys and authentication key is simplified, and the complexity of the access device at the private network end is reduced on the premise of not degrading the security grade. The technical solution of the present invention is highly flexible and extensible and can achieve better user experience.
Owner:ALCATEL LUCENT SAS

Single sign-on method, single sign-on device, single sign-on equipment and computer readable storage medium

The invention relates to the technical field of network security, and discloses a single sign-on method, which comprises the following steps: receiving a first login request sent by a client, and verifying user information in Redis; if the verification result is correct, generating a session and an authentication identifier ticket with the session; sending the ticket and the system address corresponding to the first login request to the client, and authorizing the client to log in the system address; storing the session in the Redis on the basis of a shiro framework; receiving a re-login request sent by the client and the ticket, and judging whether a session corresponding to the ticket exists in the Redis or not on the basis of the shiro; and if the session corresponding to the ticket exists in the Redis, authorizing the client to log in the corresponding login address in the re-login request based on the session corresponding to the ticket. The invention further discloses a single sign-on device, single sign-on equipment and a computer readable storage medium. According to the invention, the burden of system data storage is reduced, and the data processing speed of the system iseffectively improved.
Owner:CHINA PING AN PROPERTY INSURANCE CO LTD

Cuvette and method for authenticating a cuvette

A cuvette (10) for storing a biological sample to be analyzed by means of a predefined detection technique is disclosed. The cuvette (10) is formed from a moldable material that contains particles (15a, 15b) at a concentration within a predefined range. The particles (15a, 15b) are randomly distributed, in order to form a unique pattern. Moreover, the particles (15a, 15b) have measurable physical properties, so that the unique pattern is detectable using the detection technique that is used to analyze the biological sample. The unique properties obtained by the randomly distributed particles (15a, 15b) render copying nearly impossible, since it is more complicated to distribute the particles in a predetermined pattern than to let them distribute randomly.
Owner:KONINKLIJKE PHILIPS ELECTRONICS NV

Image reading apparatus and method of controlling image reading apparatus

An image reading apparatus having a security function that realizes highly precise authentication and high operability while suppressing an increase in manufacturing cost. An original 10 is placed on a platen glass 12, and an authentication card 80 is placed on a security information reading section 101. An image sensor 25 reads an image of the original 10 placed on the platen glass 12 and security information stored in the authentication card 80 placed on the security information reading section 101. A control section 4 controls processing of the image of the original 10 read by the image sensor 25 in accordance with the security information read by the image sensor 25.
Owner:CANON KK

Open id authentication method using identity selector

Provided is an Open ID authentication method using an identity selector, which can simplify the authentication of an open ID and reduce phishing and hacking risks by automatically performing an open ID-based login process without the need to manually input an open ID uniform resource locator (URL) to a login window.
Owner:ELECTRONICS & TELECOMM RES INST

Output system, output method, output data storage apparatus, and output data relay apparatus

InactiveUS20160080374A1Efficient user authenticationSimple user authentication managementDigital data processing detailsMultiple digital computer combinationsOutput deviceSystem usage
An output system includes a first system that performs authentication using user information including first authentication information and outputs from an output apparatus output data specified using the first authentication information, and a second system that provides the output data to the first system. The second system includes a storage unit that stores output data in association with pre-authentication information, a unit that provides the pre-authentication information to the first system, and a unit that provides the output data to the first system. The first system includes a storage unit that stores the first authentication information, an authentication unit that performs authentication with respect to the pre-authentication information provided by the second system, a cooperation unit that specifies the output data associated with the pre-authentication information that has been successfully authenticated, and a storage unit that stores the specified output data in association with the first authentication information.
Owner:RICOH KK
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products