Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

35results about How to "Enable secure interactions" patented technology

Method and system for implementing authentication and data safe transmission

The invention discloses an authentication and safe transmission of data realizing method. A terminal safety device and an authentication terminal after being connected negotiates to have a same data to be used as a root key, and at the same time negotiates to have a same dispersion factor and a same algorithm, the negotiated root key and dispersion factor generate a same session key used as a symmetrical key by using the algorithm, and then, safety authentication and data encryption and decryption can be performed and safety data interaction between the two ends can be realized. The invention also discloses a system for realizing authentication and safe transmission of data, and the system comprises a terminal safety device, an authentication terminal and an authentication server. According to the invention, randomness of the session key for data encryption transmission can be assured, even though a session key is decrypted, the safety of the whole system can be assured, and at the same time, atom manipulation for safety authentication and safe transmission of data can be realized for avoiding that in the current authentication process, once a password is verified by the terminal safety device, limits of authority are totally released and potential safety hazard is generated, therefore, authentication safety is improved greatly.
Owner:BEIJING HUADA ZHIBAO ELECTRONICS SYST

Internet of Things authentication system and Internet of Things authentication method

The invention discloses an Internet of Things authentication system and an Internet of Things authentication method. The Internet of Things authentication system comprises a first user terminal for accepting an interactive communication request of a user, generating a remote authentication request message carrying binding relationship information, and sending the remote authentication request message to a first target device; a first rich communication suite server for realizing message forwarding between the first user terminal and the first target device in a process of establishing establishing a binding relationship among the first user terminal and/or a rich communication account and the first target device, and authenticating the binding relationship; and the first target device forstoring the binding relationship information, receiving the remote authentication request message, detecting whether the binding relationship information is consistent with the stored binding relationship information, if yes, indicating that the authentication is passed, and accepting the interactive communication request of the first user terminal. The Internet of Things authentication system disclosed by the invention can conveniently and effectively realize the secure interaction between a user and the device and between the device and the device in the Internet of Things environment by means of the instantaneity, security and standardability of the RCS service.
Owner:ZTE CORP

Information security collection and interaction system based on cloud server

The invention provides an information security collection and interaction system based on a cloud server. The system comprises an information collection module and a cloud server, the information collection module comprises an aggregation node, cluster heads and sensor nodes, each sensor node collects sensing information of a monitored position and sends the sensing information to the corresponding cluster head, and the aggregation node transmits the sensing information collected by the cluster heads to the cloud server; the cloud server is provided with a database with a plurality of databasepartitions, and the cloud server allocates corresponding access permission levels to the perception information collected by the cluster heads according to the identifiers of the cluster heads and stores the perception information collected by the cluster heads in the database partitions corresponding to the access permission levels of the cluster heads. Collection of the perception information is achieved through the Internet-of-Things technology, the corresponding access permission levels are distributed to the perception information of the different cluster heads through the cloud server,it is guaranteed that the perception information is only transmitted to a user with access permission or checked by a user with permission, and safety is high.
Owner:广州路昌科技有限公司

Method for safely transmitting data between wireless ad hoc networks

The invention discloses a method for safely transmitting data between wireless ad hoc networks. The method comprises the following steps that: a node constructs a node public key table; a sending node sends a data message to a receiving node; the receiving node sends a response message to the sending node after receiving the data message and carrying out security check; the sending node sends a data confirmation message to the receiving node after receiving the response message and carrying out security check and data comparison; and the receiving node receives the data confirmation message and selects to reserve or discard the data according to the type of the data confirmation message. According to the method, on the basis of a network architecture of the wireless ad hoc network, a hash algorithm, a public key cryptographic algorithm and an encryption authentication technology are fused, and a brand-new data security transmission method is designed, so that security interaction of data between internal nodes of the wireless ad hoc network is realized. The method is wide in application range, easy to implement, safe and reliable, and can be used in some network environments with extremely high security requirements.
Owner:JIANGSU ZHENGHETONG INFORMATION TECH CO LTD

Security interaction system and method, electronic equipment and storage medium

PendingCN114528580AUnlimited interaction time and information volumeEnable secure interactionsDigital data protectionInteraction deviceElectronic equipment
The invention relates to a safety interaction system, which comprises a man-machine interaction system and a man-machine interaction device, the man-machine interaction system comprises a safety application and a safety service, and the safety application generates or receives corresponding secret spelling and/or secret sound spelling between one-time plaintext and ciphertext generated by the safety service. The method comprises the following steps: displaying and/or playing to a user or an administrator, and enabling the user or the administrator to carry out autonomous, unlimited and unlimited man-machine security interaction in a contact or non-contact manner through a standard keyboard, mouse, voice or gesture manner under the condition that the existing man-machine interaction equipment and application software and a security mechanism thereof are not changed at all; and the security of the interacted plaintext information is protected. The invention further discloses a secure interaction method, electronic equipment and a storage medium. According to the invention, through one-time man-machine security interaction, no plaintext appears in the whole process, and the leakage risk that sensitive information is secretly shot, eavesdropped, screenshot, secretly recorded, intercepted and the like in the man-machine interaction process is effectively avoided.
Owner:浙江智贝信息科技有限公司

Webpage-based Method and system for realizing secure interaction of group information

The invention discloses a webpage-based method for realizing the secure interaction of group information, comprising the steps that a communication server authenticates the authority of a received group information instruction which is sent by a source user; after the authority is approved, the communication server authenticates the authority of a target user receiving the group information instruction; and after the authority of the target user is approved, the communication server authenticates sends the group information instruction to the target user. The invention also discloses a webpage-based system for realizing the secure interaction of group information, comprising the source user, the communication server and the target user, wherein the communication server authenticates the authority of the received group information instruction which is sent by the source user; after the authority is approved, the communication server authenticates the authority of a target user receiving the group information instruction; and after the authority of the target user is approved, the communication server sends the group information instruction to the target user. By the method and the system, the secure interaction of group information can be realized without installing and downloading any software.
Owner:SUZHOU CODYY NETWORK SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products