Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

192results about How to "Implement two-way authentication" patented technology

Identity-based unmanned aerial vehicle key management and networking authentication system and method

The invention belongs to the technical field of a device for verifying the identity or credentials of a system user, and discloses an identity-based unmanned aerial vehicle key management and networking authentication system and a method thereof. The ground authentication server is responsible for generating and distributing system parameters, identity information and keys required by the unmannedaerial vehicle for key management and network authentication. UAV authentication client is the main body of the system; Through mutual cooperation, the key pairs of UAV for network authentication canbe generated in a distributed manner, and the identity authentication and key agreement between UAV can be realized by using the key pairs. The invention improves the problem of unequal calculation of nodes in the key management of the UAV network existing in the prior art, enhances the reliability of the system, and realizes the key management of the UAV self-organization. The two-way authentication between UAV nodes ensures the credibility and authenticity of both sides of the communication. Using identity public key and bilinear pairing implementation, the computational overhead is less and the implementation efficiency is improved.
Owner:XIDIAN UNIV +1

Method and equipment for performing safety communication between T_Box equipment and ECU equipment in internet of vehicles system

The invention aims at providing a method and equipment for performing safety communication between T_Box equipment and ECU equipment in an internet of vehicles system. The method specifically comprises the following steps: the T_Box equipment send first information to the corresponding ECU equipment; the ECU equipment generates second information according to the first information, a hash value ofthe main key and the second random number generated by the ECU equipment; the T_Box equipment generates third information according to the second information, the first random number and the third random number; the T-Box equipment generates the first key according to the second information and the third random number, and identity identifier information of the T_Box equipment and an identity identifier of the ECU equipment; the T_Box equipment encrypts a to-be-issued instruction based on the first key; the ECU equipment generates a second key according to the third information, the second random number, the identity identifier information of the T_Box equipment and the identity identifier of the ECU equipment; and the ECU equipment decrypts the encrypted instruction according to the second key so as to acquire the instruction. Compared with the prior art, the safety communication between the T_Box equipment and the ECU equipment is realized.
Owner:BEIJING BAIDU NETCOM SCI & TECH CO LTD

Method, device and system of verification of safety association between terminal equipment and user card

The invention discloses a method, a device and a system of verification of safety association between terminal equipment and a user card. The method, the device and the system of the verification of the safety association between the terminal equipment and the user card are used for achieving two-way safety verification between the user card and the terminal equipment under the premise that functions of the user card are not expanded, wherein the method of the verification of the safety association between the terminal equipment and the user card comprises receiving a first verification request sent by the terminal equipment when the terminal equipment accesses a core network; searching for a first authentication key which corresponds to a user card identification in a corresponding relationship which is pre-stored between the user card identification and the first authentication key according to the user card identification carried by the verification request; carrying out encryption on a terminal identification and the user card identification carried in the verification request by using the first authentication key which is found, and obtaining a second to-be-verified terminal identification; confirming that the safety association verification between the terminal equipment and the user card passes when a first to-be-verified terminal identification and the second to-be-verified terminal identification are the same; and confirming that the safety association verification between the terminal equipment and the user card does not pass when the first to-be-verified terminal identification and the second to-be-verified terminal identification are not the same.
Owner:CHINA MOBILE COMM GRP CO LTD

Data transmission method and system based on hybrid encryption algorithm

The invention discloses a data transmission method and system based on a hybrid encryption algorithm, belongs to the field of encryption transmission, and aims to solve the technical problem of how torealize data transmission with high encryption speed and low encryption key management difficulty. The method comprises the following steps that bidirectional authentication is performed on a clientand a server based on a digital certificate of the server, and a communication channel between the client and the server is established after verifying that the server is legal; the client randomly generates an RSA key pair, and encrypts and sends the RSA key pair to the server through the digital certificate; one of the client and the server is used as a sending end, and the other one is used asa receiving end; the sending end randomly generates an AES secret key and a random number plaintext, carries out encryption transmission on plaintext data and the random number plaintext through the AES secret key, carries out encryption transmission on the AES secret key through an RSA secret key, and uses the random number plaintext as a signature to verify whether encryption transmission is successful or not. The system executes the data transmission method.
Owner:SHANDONG INSPUR COMML SYST CO LTD

Two-way authentication method and system

The invention relates to a two-way authentication method and system. The method comprises the following steps: forming, by an authentication device, a first digital signature of the key attribute information of an authenticated device; transmitting the first digital signature and a temporary public key of the authentication device to the authenticated device to be verified by the authenticated device; after the authenticated device verifies the received first digital signature, sending, by authenticated device, a second digital signature of the key attribute information of the authentication device and the temporary public key of the authenticated device to the authentication device to be verified by the authentication device; receiving and verifying, by the authentication device, the second digital signature; and sending, by the authenticated device, authentication success information, and performing encrypted data transmission by using the temporary public keys of the two parties. The authentication device and the authenticated device correctly the key attribute information of the opposite party and perform signature verification so as to achieve two-way authentication. The encrypted transmission of data interaction is realized, and the security of identity verification is further improved.
Owner:北京赛博兴安科技有限公司

Inter-satellite networking authentication system and method suitable for double-layer satellite network

The invention belongs to the technical field of information safety, and discloses an inter-satellite networking authentication system and method suitable for a double-layer satellite network. The system comprises a ground authentication server, a high-orbit satellite authentication client and a low-orbit satellite authentication client, wherein the ground authentication server is used for completing initialization of a satellite authentication system, namely generating and distributing identity information, a secret key and track parameters which are needed for authentication between the satellites; the high-orbit satellite authentication client and the low-orbit satellite authentication client are main bodies of inter-satellite networking authentication, and the inter-satellite identity authentication and key negotiation are realized through the interaction of authentication parameters. An authentication precomputation mechanism is designed by utilizing the characteristics that a satellite network clock is highly synchronous and a node operation trajectory can be predicted, so that the authentication efficiency between the satellites is effectively improved. According to the system and the method, safe and efficient identity authentication and secret key negotiation of a high-orbit satellite and a low-orbit satellite in a networking stage can be realized, and the system and the method can be applied to networking authentication between the high-orbit satellite and the low-orbit satellite.
Owner:XIDIAN UNIV +1

Network accessing method of automatic meter reading system

ActiveCN102832973ASolve the problem of unreliable joining the networkSolve the problem of not being able to automatically disengagePower distribution line transmissionUser identity/authority verificationElectricityAccess method
The invention discloses a network accessing method of an automatic meter reading system. The networking accessing method comprises the following steps of electrically starting and creating a network on an OFDM (Orthogonal Frequency Division Multiplexing) module at a concentrator side firstly, and then electrically adding the network on the OFDM module at an electric energy meter side. According to the network accessing method disclosed by the invention, the OFDM module adopts a mechanism of adding bidirectional authentication in the network, so the problem that an S-FSK power line carrier automatic meter reading system is unreliable in accessing the network is solved; a list file is maintained by a main module, so the problem that in the prior art, the list file work needs to be maintained in real time by a concentrator is solved; and meanwhile, the automatic separation can be carried out when an error network is added as the communication overtime time length is set, and thus the problem that in the prior art, the automatic separation cannot be carried out when an electric energy meter is added with the error network. Compared with the prior art, according to the network accessing method disclosed by the invention, several defects existing in the prior art are completely and effectively overcome, and the network accessing method of a power line carrier communication module with higher reliability is provided.
Owner:HUNAN UNIV +1

Authentication method and system

The embodiment of the invention provides an authentication method and system, and the method comprises the steps: enabling a device side to transmit a first authentication request to a server, whereinthe first authentication request comprises a first identification of the device side and a first random number, and the first random number is a character string which is generated by the device siderandomly; receiving a second authentication request sent by the server, wherein the second authentication request is a request sent by the server after the server performs the authentication of the device side based on the first identification and the authentication is passed, and comprises the first random number and a second random number, and the second random number is a character string generated by the server randomly; judging whether the first random number in the second authentication request is the same as a first random number stored locally or not: giving a first authentication reply to the server when the first random number in the second authentication request is the same as the first random number stored locally, so as to notify the server that the authentication is passed.According to the embodiment of the invention, the method reduces the requirements for the storage space of the device side to a certain degree, and reduces the production cost of the device side to acertain degree.
Owner:HANGZHOU EZVIZ NETWORK CO LTD

Mobile secure storage equipment with multiple data protection functions

The invention provides mobile secure storage equipment with multiple data protection functions. The mobile secure storage equipment comprises a storage module, a wired communication module, a wireless communication module, a key management module, a power management module and a central control system. Encrypted data are stored in the storage module; the wired communication module comprises an USB (universal serial bus) interface, and data can be exchanged between the wired communication module and host equipment; authentication data and business data can be transmitted between the wireless communication module and a home location register; the key management module is responsible for mutual authentication between the storage equipment and an application platform and encryption and decryption of data exchanged between the host equipment and the storage module; the power management module is responsible for charging internal batteries when the mobile secure storage equipment is externally connected and utilized via a USB, the various modules of the mobile secure storage equipment are powered by external power sources at the moment, and necessary working power is provided for the wireless communication module by the internal batteries when the mobile secure storage equipment is not externally connected and utilized via the USB; an operating system runs in the central control system, and the central control system manages the various modules of the mobile secure storage equipment in an integrated manner, schedules the various modules according to set working processes and manages communication of the various modules according to the set working processes. The mobile secure storage equipment has the advantages that various fused protection means are adopted, and accordingly the security of the mobile secure storage equipment can be improved.
Owner:SHANGHAI ZHONGYI COMM TECH ENG

SIP (System In Package)-based security certificate registering method

The invention provides an SIP (System In Package)-based security certificate registering method. The method comprises the steps of transmitting a register data package into an SIP server by an SIP client; starting a register authentication module after the SIP server receives the register data package, transmitting an anauthorized data package, taking an authenticated activating grouped data, and requiring the SIP client to provide authentication information, wherein the authenticated activating grouped data comprises a public key certificate including an SIP server and a secrete key negotiating parameter; transmitting the register data package with register information including access authentication request grouped data by the SIP client according to user information, wherein the access authentication request grouped data comprises the public key certificate of the SIP client and the secrete key negotiating parameter of the SIP client; packaging the SIP server and the public key certificate of the SIP client into a certificate authentication request grouped data package by the SIP server and transmitting the SIP server and the public key certificate of the SIP client to a credible authentication server to verify; verifying whether a result is legal by the SIP server; and verifying the authentication result by the SIP client, and successfully approving by the SIP client if the authentication result is passed.
Owner:JIANGSU CAS JUNSHINE TECH

Access authentication method of electric automobile

The invention relates to an access authentication method of electric automobiles. The method comprises the following steps that: access authentication systems of the electric automobiles are established; access authentication between the electric automobiles and a charging station is carried out; and the charging station carries out batch signature authentication on the electric automobiles. According to the invention, identity aggregate signatures are introduced into identity validity inspection of the electric automobiles, and bidirectional authentication and session key negotiation are designed between the electric automobiles and the access authentication systems, so that the reasonable usage of the information resources in the station is ensured, and the safety of the whole network system is fundamentally ensured. The batch signature authentication mechanism enables the charging station to verify a plurality of electric automobile terminal signatures in the aggregate manner, the calculation load is lightened, and the performance is improved. The typical identity aggregate signature system is composed of five algorithms: system initialization, private key generation, signing, aggregation and aggregate verification, user identity information can be used to replace a public key thereof, the problem of high certificate cost is solved, and by compressing the plurality signatures into one, the high-efficiency verification is carried out.
Owner:STATE GRID CORP OF CHINA +2
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products