Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

219results about How to "Implement identity authentication" patented technology

Intelligent running machine

The invention relates to the field of exercise equipment, in particular to an intelligent running machine. The intelligent running machine comprises a running machine body, a tablet personal computer which is arranged on the running machine body, a flexible array pressure sensor which is arranged on the running machine body, a control module which is arranged on the tablet personal computer, a data acquisition module and a motor drive module. An internet function is integrated in the control module of the running machine, and each running machine uploads a relationship model and a training program which are established according to individual characteristics through network to a server for storage so as to realize identity authentication. Multiple kinds of training modes and virtual scenes are integrated in the control module; the training program which meets an exerciser is customized in a personalized way; foot pressure distribution information of the exerciser, which is detected bythe flexible array pressure sensor, and the real-time heart rate which is sent by a heart rate monitoring module are received in real time; running speed, gradient and the like can be adjusted automatically; safety of the exerciser can be guaranteed; and training modes can be enriched and training efficiency can be improved.
Owner:HEFEI INSTITUTES OF PHYSICAL SCIENCE - CHINESE ACAD OF SCI

Safety communication secret key negotiation interaction scheme

The invention provides a method for safety communication between an application on a mobile terminal and a network server. Shared secrets of a user and a server are overlapped and bound with an identification code of mobile intelligent terminal equipment and a mobile phone number of the user by utilizing a cryptology; then the obtained product is applied to an identity authentication system to implement authentication on a client side; a digital certificate and a digital signature mechanism are utilized to implement authentication on the server; a session key is established with a network server by utilizing a Differ-Hellman secret key negotiation protocol so as to carry out safety data communication. The method is characterized in that the shared secrets are overlapped and bound with identification code of the machine and the mobile phone number of the user and the shared secrets are updated regularly; even though information is stolen by an attacker, a system still cannot be influenced. The user not only needs to provide a login password, but also needs to use the system on designated equipment. The method can ensure that the user carries out safety communication with the server on internet by the mobile equipment.
Owner:QINGDAO WEIZHIHUI INFORMATION

Digital signature method for escrowing private key of mobile terminal

The invention discloses a digital signature method for escrowing the private key of a mobile terminal. The mobile terminal needs to provide digital signature service in the development of e-government application, however, at present, the mobile terminal is lack of a safety condition providing a private key saving digital signature, the private key is likely to be stolen by a hacker at the mobile terminal, so that the digital signature cannot be realized directly by the mobile terminal. The invention provides a digital signature technology for the mobile terminal. The digital signature technology comprises the mobile terminal, a signature server and a KMC server cipher machine. The signature server is responsible for managing the signature private key of the user, all private keys of the system are encrypted and then saved in the cipher machine, the encrypted user' private key is mastered by the user, and the cipher machine is only communicated with the signature server. When a certificate is downloaded by a user, the terminal application packs a Hash value in digital signature and user identity information together to form digital signature request message, the digital signature request message is sent to the signature server through a short message, after the user request validation is passed, the cipher machine is called, and after the user' private key is digitally signed, the result is returned to the user to complete the digital signature process.
Owner:QINGDAO WEIZHIHUI INFORMATION

Identity-based unmanned aerial vehicle key management and networking authentication system and method

The invention belongs to the technical field of a device for verifying the identity or credentials of a system user, and discloses an identity-based unmanned aerial vehicle key management and networking authentication system and a method thereof. The ground authentication server is responsible for generating and distributing system parameters, identity information and keys required by the unmannedaerial vehicle for key management and network authentication. UAV authentication client is the main body of the system; Through mutual cooperation, the key pairs of UAV for network authentication canbe generated in a distributed manner, and the identity authentication and key agreement between UAV can be realized by using the key pairs. The invention improves the problem of unequal calculation of nodes in the key management of the UAV network existing in the prior art, enhances the reliability of the system, and realizes the key management of the UAV self-organization. The two-way authentication between UAV nodes ensures the credibility and authenticity of both sides of the communication. Using identity public key and bilinear pairing implementation, the computational overhead is less and the implementation efficiency is improved.
Owner:XIDIAN UNIV +1

Intelligent charging access system for electric automobile

The invention discloses an intelligent charging access system for an electric automobile. The intelligent charging access system for the electric automobile comprises an intelligent charging leading system and a vehicle certification system based on a wireless communication network. The intelligent charging leading system comprises a central server, a mobile communication network, the Internet, a charging station end data collecting system and a vehicle-mounted information collecting terminal. The intelligent charging access system can provide accurate charging station distribution information for a user, and the user is led to be access to a specific charging pile in a charging station to be charged according to the vehicle information of the user. The central server can accept inquiry of various modes from a user end and combine with the battery parameter of the automobile and the preferences or requirement of the user to make a reasonable charging planning and decision scheme. The vehicle certification system is used for achieving identity certification and the payment condition of legal users, so that the fact that illegal automobiles occupy limited charging resources (such as charging files and electricity) is avoided, and the privacy of the user and the safety of data are protected.
Owner:SHANDONG TIANHAI TECH

Method for encryption authentication on Ad hoc network transmission layer protocol

The invention discloses a method for encryption authentication on an Ad hoc network transmission layer protocol, which comprises five parts and 18 steps, wherein the five parts are a configuration stage, an authentication stage, a key negotiation stage, an encryption process and a key update flow. The encryption authentication method of the invention is applied to a hand shaking process in the end-to-end communication between two nodes in a multihop Ad hoc network, wherein the two nodes pass through message authentication code verification (MAC) for mutual verification; after the authentication successes, key negotiation is performed by using an elliptic curve diffie-hellman (ECDH) algorithm; and a subsequent message is encrypted by using a shared key acquired in the key negotiation process as a key material and by using an advanced encryption standard (AES) algorithm, and a key update flow is initiated in a communication process. In the authentication and key negotiation process, an exclusive or gate (XOR) algorithm is used for encrypting authentication information and key negotiation information, the safety is high, the efficiency is high, the system expense is small, and the encryption strength is high; and thus, the method has a promising application prospect in the technical field of wireless networks.
Owner:BEIHANG UNIV

Quantum key distribution method and system with bidirectional identity authentication function

ActiveCN109327308AThe certification process is simple and practicalIncrease profitKey distribution for secure communicationBell stateQuantum gate
The invention belongs to the technical field of network information and discloses a quantum key distribution method and system with a bidirectional identity authentication function. A communication participant uses a binary character string representing the user identity to carry out preparation of a Bell state; encoding and particle exchange are carried out according to a same convention; Bell-based measurement is finished so as to achieve entanglement exchange of the Bell-state particles; after a bitwise XOR operation is carried out, a Pauli gate operation is carried out on any side of bothsides of communication so that the particles in the hand are converted into the Bell-state particles the same as the particles on the opposite side; and both the sides of communication can obtain a same binary character string so as to finish the distribution of secret keys. The quantum key distribution method and system with a bidirectional identity authentication function in the invention improve the use ratio of resources produced during authentication of both the sides of communication; according to the agreement announced by both the sides of communication can identity authentication andkey distribution be realized without the intervention of a third side; the required quantum state is the Bell state of two particles; and the preparation is relatively easy.
Owner:CHENGDU UNIV OF INFORMATION TECH

Method and device for controlling multicast service access by customer device in access network

The invention provides a method used for controlling the user equipment to access in the multicasting service in the network access equipment and network authentication equipment of the access network and a device thereof; wherein, the invention also provides a method used for controlling the user equipment to withdraw the multicasting service in the network access equipment of the access network and a device thereof; for the user equipment which applies for certain multicasting service, only the status of the user equipment needs to be authenticated; when the user equipment passes the authentication, the network authentication equipment sends the multicasting service access authority corresponding to the user equipment to the network access equipment and memorizes the multicasting service access authority in the network access equipment; detailedly, when the user equipment applies for certain multicasting service in the multicasting service, the network access equipment judges whether the user equipment has the access authority of the multicasting service according to the multicasting service authentication information memorized wherein, and needs not to carry out the status authentication on the user equipment when each multicasting service of the multicasting service is applied by the user equipment.
Owner:ALCATEL LUCENT SHANGHAI BELL CO LTD

Remote safe meter reading method

The invention discloses a remote safe meter reading system, comprising a background management center, a collection module and front-end equipment. A remote safe meter reading method comprises the following processes: 1) sending a meter reading command by the collection module; 2) reporting the command to the background management center; 3) validating the identity of a gatherer; 4) extracting an identity (ID) of the collected front-end equipment; 5) generating a new session key; 6) encrypting the extracted ID information and metering reading command; 7) transmitting information to the front-end equipment, and transmitting the session key to the collection module and the front-end equipment; 8) decrypting and confirming information by the front-end equipment; 9) reading data by the remote meter reading module; 10), packaging and encrypting the ID information, collected data and MAC check code and then transmitting to the collection module; 11) receiving the ID information and data; 12) uploading the data to a safety server; and 13) storing and updating information by the safety server. The functions of identity authentication and data encryption are achieved in the remote meter reading process, and the security level is greatly improved.
Owner:山东微分电子科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products