Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

302results about How to "Fast authentication" patented technology

Internet of Vehicles distributed authentication method based on controllable privacy

The invention discloses an Internet of Vehicles distributed authentication method based on controllable privacy, relates to the field of vehicle network communication safety, and specifically relates to an Internet of Vehicles distributed authentication method based on controllable privacy. The method specifically includes five following steps: system initialization; private key update of fake names and a part of signatures; message signature; message authentication of signatures; and real identity tracking and revocation. According to the method, the double hash chain is employed to establish the fake names, the communication cost for invalidating a vehicle identity is irrelevant to the numbers of the fake names and a part of the signature private keys of the vehicle, a vehicle user can update multiple parts of signature private keys by the adoption of one authorization, and the burden of trusted authority (TA) and road-side units (RSU) is reduced; when a message with a controversial signature occurs, the TA can distinguish whether the signature is forged by the RSU according to re-signature of the message uploaded by the vehicle, and the problem of non-repudiation in the distributed environment is solved. According to the method, the security is high, the cost is low, and the method is applicable to node high-speed movement, topology structure volatility, and large-scale VANET network.
Owner:JIANGSU UNIV

Method and equipment for performing registration based on authentication equipment

The invention discloses a method for performing registration based on authentication equipment. The method comprises the following steps: acquiring a uniform resource identifier by a client, acquiring an application ID according to the uniform resource identifier, and sending an equipment registration request obtained according to the application ID and a user identity input by a user to a server; receiving registration data returned by the server, and acquiring a client data object according to a challenge value in the registration data and the application ID; performing Hash operation on the client data object and the application ID respectively to obtain a challenge parameter and an application parameter, and transmitting registration request information consisting of the challenge parameter and the application parameter to the authentication equipment; receiving registration response information returned by the authentication equipment, and sending a key registration request consisting of the registration response information, the client data object and the registration data to the server; and receiving information returned by the server, judging whether the information is success information or not, if so, determining that the registration is successful, and otherwise determining that the registration fails.
Owner:FEITIAN TECHNOLOGIES

Authentication method and device based on authentication equipment

The invention discloses an authentication method and device based on authentication equipment. The method comprises: a client obtaining an application ID according to an obtained uniform resource identifier (URI), and sending an equipment authentication request obtained according to the application ID and the URI to a server; receiving the current authentication data sent by the server; obtaining a client data object according to the challenge value in the current authentication data, hashing the client data object and the application ID in the current authentication data to obtain client parameters, obtaining the key identifier in the current authentication data, and sending current authentication request information composed of the client parameters, the key identifier and a key identifier length to authentication equipment; receiving the authentication response information returned by the authentication equipment, and sending a signature verification request composed of the authentication response information, the client data object and the conversation ID in the current authentication data to the server; and receiving the information returned by the server, authentication being successful if successful information is returned, or else being failed.
Owner:FEITIAN TECHNOLOGIES

Method for mini-station to authenticate and log in virtual machine in cloud system and login system

The invention discloses a method for a mini-station to authenticate and log in a virtual machine in a cloud computing system and a login system. The method comprises the following steps that: (1) the mini-station logs in the cloud computing system by the login system; (2) the login system searches for the number of available virtual machines in the cloud computing system; (3) the login system starts the virtual machine in the cloud computing system according to virtual machine selection rules and executes steps (4) to (6) if the number of the available virtual machines is more than or equal to 1, otherwise returns information indicating that the cloud computing system does not have available resources to the mini-station, and the mini-station quits; (4) the virtual machine generates virtual machine login information, and transmits the virtual machine login information to the login system; (5) the login system transmits the virtual machine login information to the mini-station; and (6) the mini-station logs in the virtual machine. By the method and the login system, the mini-station can rapidly authenticate and log in the virtual machine, and the virtual machine is not required to be kept in a starting state so as to make safer the system and effectively save resources.
Owner:GCI SCI & TECH

Automobile use right sharing device, control device and intelligent automobile

The invention discloses an automobile use right sharing device, a control device and an intelligent automobile. The automobile use right sharing device comprises an information receiving module, an authorization data generating module and an information transmitting module, wherein the information receiving module is used for receiving automobile use right application information of an automobile use right applicant and automobile authorization result information of an automobile owner; the authorization data generating module is used for associating pre-stored characteristic information of the automobile use right applicant with automobile information to generate authorization data after receiving the automobile authorization result information agreed by the automobile owner; and the information transmitting module is used for transmitting the automobile use right application information when identity information of the automobile use right applicant passes through the verification, transmitting the automobile authorization result information when the automobile authorization result information is received and transmitting the authorization data. According to the technical scheme provided by the invention, automobiles are rapidly and reliably shared, the traveling mode is optimized, the traveling experience is improved, the traveling efficiency is increased, the traveling cost is reduced, and social problems, such as automobile tail gas pollution, road congestion and the like, due to the increasing of the automobiles are solved.
Owner:安徽奇点智能新能源汽车有限公司

Verification code display method, verification code display device and mobile terminal

The invention provides a verification code display method. The verification code display method comprises the steps as follows: obtaining a short message; judging whether the content of the short message contains a verification code or not, and returning to the step of obtaining the short message if the content of the short message does not contain the verification code; analyzing the content of the short message if the content of the short message contains the verification code so as to obtain the verification code; and using a floating window to display the obtained verification code. The invention further provides a verification code display device and a mobile terminal. The verification code display method, the verification code display device and the mobile terminal of the invention could automatically analyze the verification code from the content of the short message and use the floating window to display the obtained verification code without needing a user to manually extract and record the verification code in the short message such that the user could perform identity authentication quickly by using the short message. The verification code display method, the verification code display device and the mobile terminal of the invention provide excellent user experience.
Owner:TENCENT TECH (SHENZHEN) CO LTD

File ownership proof method based on convergence encryption

The invention discloses a file ownership proof method based on convergence encryption, which mainly solves the problem in the prior art that the security of taking a hash value as an ownership evidence is bad. The implementation steps are as follows: step 1 of generating a system parameter, a server key and a user key by a key generation center; step 2 of detecting whether the user is a first user that uploads files by the server; step 3 of performing block encryption on the files by the first uploading user and uploading the files; step 4 of issuing an ownership proof request by the server, generating an inquiry value and transmitting the inquiry value to the client; step 5 of performing ownership proof the client receives the inquiry value; step 6 of performing ownership verification after the server receives a reply by the server, and after that, continuing to upload a bidirectional authentication between the user and the client. According to the file ownership proof method based on the convergence encryption provided by the invention, a signature of an original data block is adopted as an evidence of owning the files, thus the security of the evidence can be improved, the network upload bandwidth and cloud server storage overhead can be reduced, and the method can be used for supporting a cloud storage system across client data deduplication.
Owner:XIDIAN UNIV

A method and system for certificating vehicle identity

The present invention discloses a method and system for certificating a vehicle identity, and belongs to the field of mobile communication. The method includes: a road side unit RSU certificates an agent vehicle and acquires a session key of the agent vehicle when the certification is passed; the agent vehicle constitutes a vehicle group, and receives second information sent by vehicles within the RSU communication scope; the second information is sent to the RSU after encrypted using the session key of the agent vehicle, so that the RSU certificates the vehicles in the RSU communication scope in a batch according to the second information; and the RSU sends a false identity identification of the vehicle which does not pass the certification within the RSU communication scope to the vehicles in the RSU communication scope. The system includes: an acquiring module, a sending module, a certification module, a generating module and an encryption module. The present invention acquires a private key of the agent vehicle through the agent vehicle, which avoids the problem of secret key hosting; moreover, the RSU sends the false identity identification of the vehicle which does not pass the certification to the vehicles in the RSU communication scope, which considers revocation for illegal vehicles.
Owner:JIANGSU UNIV

Imaging device based on vein pattern and backside pattern of finger and multimode identity authentication method

The invention discloses an imaging device based on vein pattern and backside pattern of a finger and a multimode identity authentication method, wherein the imaging device comprises an acquisition support on which a concave finger putting area is arranged; a visible light imaging device which is arranged at one side of the concave finger putting area of the acquisition support and used for acquiring the back picture of the finger; a near infrared imaging device which is arranged at the other side of the concave finger putting area of the acquisition support and opposite to the visible light imaging device, and used for acquiring the vein picture of the finger by the irradiation of a near infrared light supply; and the bar-shaped near infrared light supply which is arranged on the acquisition support and used for irradiating near infrared light to the finger from the side of the finger. The identity authentication method comprises a logon procedure and an authentication procedure, and the adopted biological features thereof comprise the backside pattern and vein pattern of the same finger. The invention also relates to identity authentication equipment comprising the imaging device, which has better anti-counterfeit performance, and can effectively improve the stability and applicability of a biometrics identification system.
Owner:SHENZHEN GRADUATE SCHOOL TSINGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products