Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

79results about How to "Implement security authentication" patented technology

Method and system for implementing authentication and data safe transmission

The invention discloses an authentication and safe transmission of data realizing method. A terminal safety device and an authentication terminal after being connected negotiates to have a same data to be used as a root key, and at the same time negotiates to have a same dispersion factor and a same algorithm, the negotiated root key and dispersion factor generate a same session key used as a symmetrical key by using the algorithm, and then, safety authentication and data encryption and decryption can be performed and safety data interaction between the two ends can be realized. The invention also discloses a system for realizing authentication and safe transmission of data, and the system comprises a terminal safety device, an authentication terminal and an authentication server. According to the invention, randomness of the session key for data encryption transmission can be assured, even though a session key is decrypted, the safety of the whole system can be assured, and at the same time, atom manipulation for safety authentication and safe transmission of data can be realized for avoiding that in the current authentication process, once a password is verified by the terminal safety device, limits of authority are totally released and potential safety hazard is generated, therefore, authentication safety is improved greatly.
Owner:BEIJING HUADA ZHIBAO ELECTRONICS SYST

Vehicular electronic secure communication system and communication method

The invention provides a vehicular electronic secure communication system. The vehicular electronic secure communication system comprises a secure chip, a vehicular electronic system and an automobile service platform; the vehicular electronic system and the automobile service platform perform bidirectional identity authentication; the vehicular electronic system comprises an ECU control system; the ECU control system and the automobile service platform perform bidirectional signature authentication through the secure chip; and, after bidirectional signature is successfully verified, the automobile service platform and the ECU control system are in encrypted communication. The invention further provides a communication method of the vehicular electronic secure communication system. The communication method comprises the following steps that: (1), the vehicular electronic system and the automobile service platform perform bidirectional identity authentication; (2), after verification is successful, the ECU control system of the vehicular electronic system and the automobile service platform perform bidirectional signature authentication through the secure chip; and (3), after verification is successful, the automobile service platform and the ECU control system are in encrypted communication through a session key output by the secure chip.
Owner:ZHENGZHOU XINDA JIEAN INFORMATION TECH

Wireless network access authentication system and method based on radio frequency fingerprint and biological fingerprint

The invention discloses a wireless network access authentication system and a wireless network access authentication method based on a radio frequency fingerprint and a biological fingerprint. The system provided by the invention comprises a radio frequency module, a radio frequency fingerprint processing module, a fingerprint information storage module, a user information processing module, a fingerprint information authentication module, a connection authentication request sending module, a connection authentication request processing module and an access service module. According to the method provided by the invention, the radio frequency fingerprint of a wireless terminal used by a user for applying for accessing a wireless network is authenticated, after the radio frequency fingerprint is authentication, the biological fingerprint of the user using the wireless terminal to access the wireless network is authentication, and after the biological fingerprint of the user is authenticated, the user is allowed to use the wireless terminal to access the wireless network. According to the system and the method provided by the invention, the secure access to the wireless network is achieved through authenticating the wireless terminal and the user applying for using the network.
Owner:XIDIAN UNIV

Method and terminal for provision and loading of executable module

The invention provides a method and terminal for provision and loading of an executable module. Processes executed by the provision method on a host computer end comprise that Hash calculation is carried out to the executable module, so that a Hash table of the executable module can be obtained; signing is carried out at least aiming at the Hash table of the executable module, so that signing information can be obtained; and packaging is carried out at least aiming at the Hash table of the executable module, the signing information and the executable module, and a packaged data packet is issued, so that a target end can load the executable module in the data packet after the target end checks the data packet at least based on the Hash table of the executable module, the signing information and the executable module and after the data packet passes the checking. The method and terminal disclosed by the invention are applied in issuance and loading of the executable module, wherein the signing is carried out to the information such as the Hash table of the executable module, and the mobile communication terminal carries out authentication before loading the executable module, so that safety certification of the executable module can be implemented, and injective attacks made by the executable module to a system can be avoided.
Owner:ZTE CORP

Internet of Things authentication system and Internet of Things authentication method

The invention discloses an Internet of Things authentication system and an Internet of Things authentication method. The Internet of Things authentication system comprises a first user terminal for accepting an interactive communication request of a user, generating a remote authentication request message carrying binding relationship information, and sending the remote authentication request message to a first target device; a first rich communication suite server for realizing message forwarding between the first user terminal and the first target device in a process of establishing establishing a binding relationship among the first user terminal and/or a rich communication account and the first target device, and authenticating the binding relationship; and the first target device forstoring the binding relationship information, receiving the remote authentication request message, detecting whether the binding relationship information is consistent with the stored binding relationship information, if yes, indicating that the authentication is passed, and accepting the interactive communication request of the first user terminal. The Internet of Things authentication system disclosed by the invention can conveniently and effectively realize the secure interaction between a user and the device and between the device and the device in the Internet of Things environment by means of the instantaneity, security and standardability of the RCS service.
Owner:ZTE CORP

Wireless tool control system and method for vehicle assembly and fabrication technique

Disclosed are a wireless tool control system for automobile assembling and manufacturing techniques and a method thereof, which realize self-adaptive safety certification, working data tracking, preventing and collecting errors in the producing process of all wireless tools on the automobile assembling and manufacturing line, and realize real-time control, data process and working record storage simultaneously. The wireless tool control system comprises at least one wireless tool, an Ethernet network of the automobile manufacture production line, an enterprise firewall embedded in the Ethernet network of the automobile manufacture production line, and a production line monitor center which is connected with the Ethernet network of the automobile manufacture production line and is provided with a human-machine interface, wherein a control system of the wireless tool is provided with a quality control servo unit, the quality control servo unit is provided with a data storage system, the data storage system is provided with a quality data base, the control system of the wireless tool is equipped with at least one Ethernet serial server and is embedded with a safety certification system, and the safety certification system allocates one identification certificate for each wireless tool, and each identification certificate is different from each other.
Owner:广州信邦智能装备股份有限公司

Security authentication method for realizing multi-cloud management and control across public network

The invention discloses a security authentication method for realizing multi-cloud management and control across a public network. The method specifically comprises the following steps: establishing abidirectional authentication network channel between a management and control cluster and a cloud computing cluster through a group of reverse proxy servers; in the management and control cluster, the management and control service directly uses an HTTP protocol to access the reverse proxy service; after the management and control cluster reverse proxy server receives the request, a self-signed SSL client certificate is used to access the reverse proxy server of the cloud computing cluster through HTTPS to complete authentication of the management and control cluster; meanwhile, the cloud computing cluster returns a self-signed server certificate, and the management and control cluster also uses the same self-signed CA certificate to complete authentication of the cloud computing cluster;and after the bidirectional authentication is completed, unloading the HTTPS protocol by the cloud computing cluster reverse proxy service, and accessing the target service by using the HTTP protocolto realize security management and control. According to the method, manpower and financial resources can be saved, the method is safer, meanwhile, the control service can realize control by directlyusing the HTTP protocol to access the reverse proxy service, and the control is flexible and convenient.
Owner:杭州端点网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products