Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

70results about How to "Implement two-factor authentication" patented technology

Key generation and distribution method for wireless communication system

The invention relates to the technical field of communication security, and more particularly to a key generation and distribution method for a wireless communication system. The key generation and distribution method comprises the steps that: a terminal and an access point generate physical layer keys based on wireless communication channel features of the two parties; an authentication center generates authentication data and a non-access-layer key by means of a root key associated with identity of the terminal and an access-layer authentication key; the terminal authenticates the access point and the authentication center by utilizing the root key, the access-layer authentication key and the received authentication data of the authentication center; the authentication center authenticates the terminal by utilizing the root key, the access-layer authentication key and received terminal authentication data; the terminal and the access point each generates a secondary access-layer encryption and integrity protection key; and the terminal and the access point can update a primary access-layer key and the access-layer authentication key synchronously at any time, and realizes updating and continuous authentication of the access-layer keys. The key generation and distribution method utilizes the uniqueness, reciprocity and time-varying property of the wireless channel, generates the physical layer keys at the terminal and the access point separately, introduces the physical layer keys into the access-layer keys and the authentication keys, realizes dual authentication of identity and path, and can prevent the attack pattern of acquiring the access-layer keys from a non-access layer.
Owner:THE PLA INFORMATION ENG UNIV

Verification code authentication method and system based on biological characteristics

The invention discloses a verification code authentication method and system based on biological characteristics, and the method comprises the steps: transmitting an authentication request, and receiving a verification code; generating a first private key and a first public key according to the acquired biological characteristics; performing hash operation on the biological characteristics to obtain a first private key, and performing elliptic curve encryption on the first private key to obtain a first public key; and signing the verification code according to the first private key, and sending the verification code and the signature information, so as to obtain an authentication result that authentication is completed by the first public key. The biological characteristic value of the user is taken as a private key, thedigital signature is performed on the verification code of the remote server, and the verification code is returned to the remote server; and the remote server authenticates the verification code and the signature information according to the user public key. The biometric features have uniqueness and non-reproducibility, network transmission and key management arenot needed, and the verification code is signed, so that the verification code has authentication, integrity and non-repudiation, and the security of the verification code is improved.
Owner:UNIV OF JINAN

Security authentication method and system, and computer readable storage medium

ActiveCN107819766ARealize the corresponding relationshipImplement one-to-one bindingMessaging/mailboxes/announcementsTransmissionUser inputComputer terminal
Embodiments of the invention provide a security authentication method and system, and a computer readable storage medium. The method comprises the following steps of collecting user information of a user logging in to the authentication system and first preset equipment hardware information of a mobile terminal used when the user logs in to the authentication system for binding before security authentication, and binding and storing the user information and the first preset equipment hardware information in a one-to-one manner; during a security authentication process, collecting the user information and second preset equipment hardware information of a mobile terminal used when the user logs in to the authentication system for authentication, instructing a communication device to send a short message verification code to the mobile terminal used for authentication by the user, and storing the short message verification code; receiving the verification code input by the user; and whenthe first preset equipment hardware information is successfully matched with the second preset equipment hardware information, and the verification code input by the user is successfully matched withthe short message verification code, passing the authentication.
Owner:BANK OF CHINA

Authentication method integrating mac authentication and web authentication

The invention is applicable to the Internet field and provides an authentication method integrating mac authentication and web authentication. The method comprises the steps that a logical net entity sends a first mac authentication request message to an authentication server; the authentication server returns a first mac authentication response message, and a re-directed URL and a session identity value are carried in the response message; the logical net entity returns the re-directed URL to terminal equipment; according to web authentication information, after confirming that a terminal user passes the web authentication, the authentication server returns a response message of passing the web authentication to the logical net entity; after receiving the response message of passing the web authentication, the logical net entity sends a second mac authentication request message to the authentication server, and the session identity value is carried in the second mac authentication request message; when confirming that the session identity value carried in the second mac authentication request message is received, the authentication server returns a message of passing the mac authentication to the logical net entity. By means of the method, the server mainly releases the re-directed url, and manual configuration on the logical net entity can be avoided, so that the configuration quantity is reduced.
Owner:FENGHUO COMM SCI & TECH CO LTD

Network configuration method, network configuration device, electronic equipment and readable storage medium

The invention relates to the technical field of communication, and provides a network configuration method, a network configuration device, electronic equipment and a readable storage medium, the network configuration method comprising: receiving a network distribution request of equipment to be accessed to a network; determining an equipment identifier of the equipment to be accessed to the network based on the network distribution request; determining a check code based on the equipment identifier; controlling an optical transmitter to flicker according to a target frequency based on the check code so as to be received by an optical receiver of the equipment to be accessed to the network; receiving a verification result fed back by the equipment to be accessed to the network; and determining that the verification is passed, and sending the distribution network information. According to the network configuration method provided by the embodiment of the invention, an optical signal isused as a verification medium when the network configuration request is received, and the light cannot penetrate through a wall, so that the safety of the network configuration can be ensured, and thepotential safety hazard and risk existing in the later period can be reduced.
Owner:MIDEA SMART TECH CO LTD +1

Dynamic token working method and dynamic token working system

The invention a dynamic token working method and a dynamic token working system. The authentication requirements of users are divided into two categories in advance, namely login authentication requirements and signature authentication requirements during signature in the transaction processes (after login); after the dynamic token is activated successfully, the dynamic token generates corresponding login private keys and signature private keys for the two categories of the authentication requirements in advance. Subsequently, when a user has the transaction requirement and needs login or signature authentication, the dynamic token generates a corresponding login answer-back code or a signature answer-back code for the user according to the login private key or the signature private key in combination with a challenge code input by the user at the moment. Obviously, according to the dynamic token working method, different calculation private keys are set for different authentication requirements of the users, and therefore, the private keys of the dynamic token are not easy to break, and the working mechanism and the working flow of the dynamic token are safer; besides, dual authentication during the transactions of the users is realized, the difficulty for lawbreakers to reversely infer the working principle of the dynamic token is improved, and the security of user accounts is guaranteed.
Owner:CHINA CONSTRUCTION BANK

Two-factor authentication method based on photoplethysmography sensor

ActiveCN111444489APersistent mobile two-factor authenticationSecure Mobile Two-Factor AuthenticationDiagnostic signal processingDiagnostics using lightTime domainAdaptive filter
The invention relates to a two-factor authentication method based on a photoplethysmography sensor, and belongs to the technical field of mobile computing application. The photoelectric volume pulse wave sensor is used for collecting heartbeat signals of a user. A semi-blind source separation technology and an adaptive filtering technology are utilized to carry out noise removal processing on heartbeat signals interfered by motion artifacts, and pure heartbeat signals are extracted. And time domain and angle domain coordinate conversion is carried out on the extracted heartbeat signals. And the geometrical characteristics are extracted from the converted heartbeat signals, and a series of characteristics capable of uniquely identifying the user are obtained after conversion and encryptionalgorithm processing. Heartbeat signals are collected through the photoelectric volume pulse wave sensor of the intelligent wrist strap device, and double-factor authentication of a user is achieved.According to the invention, high-security identity authentication is supported, and the user is allowed to re-register the alternative credentials so as to resist replay attacks and man-in-the-middleattacks. A user does not need to keep still, and a common verification method can be used at the same time.
Owner:BEIJING INSTITUTE OF TECHNOLOGYGY

Fingerprint registration method and device and fingerprint verification method and device

The invention relates to a fingerprint registration method and device and a fingerprint verification method and device. The fingerprint registration method comprises the following steps: acquiring a fingerprint to be registered; generating a registration fingerprint template according to the fingerprint to be registered; performing abstract operation on the registered fingerprint template to obtain a first hash value; wherein the first hash value is used for verifying that the fingerprint template for fingerprint verification is a registered fingerprint template during fingerprint verification; storing the registered fingerprint template; and sending the first hash value to a main control unit for storage. Abstract operation can be performed on the registered fingerprint template to obtainthe first hash value.According to the invention, the first hash value is stored in the main control unit, and when fingerprint verification needs to be carried out, whether the fingerprint template of the comparison fingerprint is the registered fingerprint template or not needs to be verified in addition to the comparison fingerprint, so that dual verification is realized, the fingerprint template is prevented from being replaced, and the safety of fingerprint verification is improved.
Owner:广东华芯微特集成电路有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products