Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

41results about How to "Avoid illegal attacks" patented technology

Method and device for identity authentication

The invention provides a method and a device for identity authentication. The method comprises the following steps of receiving a download request sent by a user through a terminal, wherein the download request carries an identification of the user; generating a private key file corresponding to the user according to the download request; sending an SDK (Software Development Kit) and the private key file to the terminal s to enable the terminal to use the SDK and the private key to encrypt identity information of the user so as to obtain authentication information; receiving a service call request carrying the authentication information; and authenticating the identity of the user according to the authentication information. According to the method and the device, the identity information of the user is written into the service call request, the identity information of the user is sent to the server while the service call request is sent to a server, so that the server can directly obtain the identity information from the service call request to verify the identity of the user, and thus the efficiency for service call in a system with the light-weight identity authentication need is improved and the waste of resources is reduced.
Owner:PEKING UNIV FOUNDER GRP CO LTD +1

Coding convention control transformation type information authentication method, and coding convention control transformation type information encryption/decryption method

The present invention relates to an information technology and an electronic technology, and mainly provides a coding convention control transformation type information authentication method, and a coding convention control transformation type information encryption/decryption method. According to the present invention, the coding convention control transformation is a technology core, defines a series of different transformation modes in a coding format and according to the artificial convention, and divides the to-be-transformed data into the control codes and the basic codes. The control codes transform the basic codes according to a coding defined control mode to generate a new data result, so that the information authentication or the information encryption/decryption is carried out according to the coding convention control transformation and the generated result. The coding convention control transformation type information authentication method, and the coding convention control transformation type information encryption/decryption method of the present invention are simple, easy, safe and reliable, are low in cost, are very suitable for the software program processing, and can be widely used in the fields, such as the daily life, the economy, the military, etc.
Owner:陈麟华

Identity card cloud authentication system and card reading system

The invention provides an identity card cloud authentication system and a card reading system. The identity card cloud authentication system comprises an edge router, an edge firewall, a core switcher, a dispatch server, a business region firewall, an authentication safety control module and a verification safety control module, wherein the edge router is used for transmitting a data package transmitted by a card reading terminal to the core switcher through the selected edge firewall. The core switcher transmits the data package to the dispatch server or the business region firewall. After the dispatch server receives the data package, the dispatch server selects an idle authentication safety control module, and transmits a corresponding identification to the card reading terminal. After the business region firewall receives the data package, the business region firewall transmits the data package to a first authentication safety module. A first authentication safety control module transmits a decrypted data package to a first verification safety control module. The first verification safety control module returns a corresponding first data package to the first authentication safety control module. The first authentication safety control module encrypts the first data package, and transmits the encrypted first data package to the card reading terminal.
Owner:TENDYRON CORP

Vehicle-mounted network protection method and system, storage medium and equipment

The invention provides a vehicle-mounted network protection method and system, a storage medium and equipment, and is applied to a diagnosis CAN line, the diagnosis CAN line is connected with external diagnosis equipment and a communication interface of a vehicle, the method comprises the following steps: obtaining an access request message sent by target diagnosis equipment, verifying the legality of the access request message, and if the access request message is legal, sending the access request message to the target diagnosis equipment; if yes, performing security authentication on the target diagnosis equipment and judging whether the target diagnosis equipment passes the security authentication or not, and if yes, opening an access channel between the target diagnosis equipment and the vehicle. According to the diagnosis CAN line, the legality of the access request message of the target diagnosis equipment is verified, and the security authentication is carried out on the target diagnosis equipment, so that the purpose of dual protection on the vehicle-mounted network can be achieved, the security of the vehicle-mounted network is effectively guaranteed, and the vehicle-mounted network is prevented from being illegally attacked.
Owner:JIANGLING MOTORS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products