Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

684results about How to "Improve authentication efficiency" patented technology

Device and method for identity authentication of person and identity card based on face recognition

The invention discloses a method and device for identity authentication of a person and an identity card based on face recognition. The method for identity authentication of a person and an identity card based on face recognition comprises the following steps: collecting the face image; detecting the position of the face and extracting the feature vectors according to the face image; confirming whether the user is a live object or not, if not, returning and collecting the face image again; if so, collecting the identity card information; transmitting the extracted feature vectors and the identity card information to the background for authentication; returning the authentication results and prompting the user, which are performed by the background; if authentication is passed, updating the local and remote databases. According to the invention, the authentication efficiency of the ''witness the same'' is improved. The method for identity authentication of a person and an identity card based on face recognition is convenient for large-scale application in various occasions, and can solve the technical problems that the authentication is inaccurate caused by the slight change of the face due to the passage of time, the authentication to the person without carrying the identity card is difficult, and the like.
Owner:BEIJING GZT NETWORK TECH

Motorcade establishment and management method and system based on block chain and PKI authentication mechanism

The invention belongs to the technical field of safety communication between motorcades in Internet of Vehicles, and discloses a motorcade establishment and management method and system based on a block chain and a PKI authentication mechanism. The method is mainly divided into two parts of motorcade establishment and group key agreement and update; the motorcade establishment part comprises the following main processes of member registration, member identity authentication and group head aggregate signature; and the group key agreement and update part comprises the following main processes ofgroup key agreement and group key update for dynamic joining and exiting of a vehicle. According to the method and the system, the block chain is combined with the PKI authentication mechanism, a problem of identity authentication of the vehicle, a server and an RSU in the Internet of Vehicles is solved; the motorcade establishment is completed based on an elliptic curve, a bilinear pairing technology and an aggregate signature; and the group key agreement and update can be realized based on a DDH difficulty problem, the forward and backward safety is achieved, and the safety of member communication in the motorcade is ensured.
Owner:XIAN UNIV OF POSTS & TELECOMM

VANET access authentication method adopting identity-based short group signatures

The invention provides a VANET anonymous access authentication method adopting identity-based short group signatures. The method comprises the following steps: each valid on-board unit obtains a private key, a signature public key, an initial pseudonym, and an initial trust value issued by a third-party trusted authority; each valid roadside unit obtains a signature private key, a signature public key, a group private key, and a group public key issued by the third-party trusted authority; two-way access authentication is carried out between each on-board unit and the corresponding roadside unit upon first access to a VANET by each on-board unit; one certain on-board unit signs a message and sends the signed message through broadcasting, and the on-board unit receiving the message authorizes a signature; a real identity of each on-board unit is calculated when the on-board unit is a malicious node or the real identity needs to be revealed; and the VANET carries out identification and revocation on the malicious nodes. The method provided by the invention has the advantages that an identity-based short group signature scheme is applied in the process of mobile communication among vehicle nodes of the VANET protocol, so that the identity-based short group signatures can be used to effectively protect the privacy of the vehicle nodes; and the malicious nodes can be efficiently and accurately identified and revoked through an evaluation mechanism, so that high scheme security can be effectively ensured.
Owner:郭明一

CAN bus authentication method and system based on broadcasting

The invention relates to a CAN bus authentication method and system based on broadcasting. The method includes the steps that completeness verification is conducted on all ECUs, seed secret keys are distributed for a gateway and the ECUs passing the verification; the gateway generates an encryption sequence, and the encryption sequence is sent to the ECUs passing the verification through broadcasting; the gateway and the ECUs passing the verification generate identical message authentication code (MAC) tables and identical synchronous counters, wherein the initial value of the counters is zero; the sending ECU attaches the MAC corresponding to the value of the counter of the sending ECU to the data field of a sending data frame; the gateway and the receiving ECU judge whether the MAC in the data field is identical with the MAC in the MAC tables corresponding to the counters of the gateway and the receiving ECU or not; if yes, the data frame is judged to be safe, and if not, the data frame is judged to be the illegal frame; the values of the counters of the sending ECU, the gateway and the receiving ECU are added by one, and whether the values of the counters of the sending ECU, the gateway and the receiving ECU exceed the preset threshold value or not is judged; if yes, an MAC table is generated again; if not, the next frame of communication is conducted, and communication of a next data frame is conducted. According to the CAN bus authentication method and system, due to the fact that a message authentication code is added to the data frames in communication, the attack on the CAN bus can be defended.
Owner:TSINGHUA UNIV

Secure access control system and method for network terminal nodes

InactiveCN104796261AReal-time monitoring of identity informationReal-time monitoring of the access verification processUser identity/authority verificationNetwork terminationPrivate network
The invention discloses a secure access control system and method for network terminal nodes. A C/S (client/server) architecture is provided between a secure access client and a CA (certificate authority) authentication server, and another C/S architecture is provided between the secure access client and an RADIUS (remote authentication dial-in user service) authentication server; the two C/S architectures are used for user identity authentication and terminal access authentication, respectively. A B/S (browser/server) architecture is provided between a security management client and a security management server and is used mainly for registering and checking user information, setting network access group permissions and controlling and monitoring secure access in real time. The secure access control system and method has the advantages that the access terminals can be subjected to trusted identity authentication, trusted access authentication, terminal proxy authentication, network access permission control and network access state real-time monitoring; a trusted terminal access control system based on identity authentication is achieved and is stable and reliable and is high in authentication efficiency, violations such as NAT (network address translation) and proxy services can be detected and warned accurately, network states of terminal users are monitored and controlled through a web management interface, and the needs of private networks for safety management can be fully met.
Owner:CHANGAN UNIV

Identity verifying method, server, client side and system

The invention discloses an identity verifying method, a server, a client side and a system. The method comprises the steps that a first preset text message is sent to the client side corresponding to a current user; first sound data input by the current user according to the first preset text message are received; a first vocal print is generated according to the first sound data; whether the first vocal print is matched with a second vocal print of a legal user or not is determined, wherein the second vocal print is generated according to reference sound data input by the legal user according to a second preset text message, and one of characters composing the first preset text message is at least one of characters in the second preset text message; if the first vocal print is matched with the second vocal print of the legal user, it is determined that the current user passes the identity verification. The identity verification is achieved by matching the first vocal print of the current user with the second vocal print of the legal user, the configuration requirement for the terminal where the client side is located is low, accordingly, the application range is wide, the identity verification is not affected by the environment where the client side is located, the identity verification is more reliable, and the identity verifying efficiency can be improved.
Owner:TENCENT TECH (SHENZHEN) CO LTD

Block chain-based method for accessing power Internet of Things terminal

The invention provides a Block chain-based method for accessing a power Internet of Things terminal, comprising the steps of: connecting a to-be-accessed power Internet of Things terminal to a masternode, and initiating an authentication request; the master node responding to the authentication request, and randomly selecting nodes that meet the condition of a threshold number from the block chain to form an authentication group; encrypting a public key G and an identity ID of the to-be-accessed power Internet of Things terminal by using a private key to obtain a digital signature ciphertextX, and sending the identity ID, a terminal public value R and the digital signature ciphertext X to the master node; the master node encapsulating and sending the authentication request information toa member node of the authentication group; the authentication group running PBFT consensus algorithm, and obtaining an authentication result by performing distributed authentication through two-two exchanging of the authentication information between the nodes of the authentication group; generating a new block in the block chain, and returning confirmation information to the to-be-accessed powerInternet of Things terminal; and the power Internet of Things terminal returning encrypted confirmation information to an access gateway. The block chain-based power Internet of Things terminal access method can improve the security and efficiency of authentication.
Owner:JIANGSU ELECTRIC POWER CO

Communication method, device and system based on combined public key cryptography system

The invention provides a communication method, device and system based on a combined public key cryptography system. The method includes the steps of obtaining a private key of a first node from a secret key generating center through the first node, obtaining identification of a second node according to an adjacent node identification list, calculating a public key of the second node according to the identification of the second node, calculating a shared secret key parameter of the first node according to the secret key of the first node and the public key of the second node, then, calculating a shared secret key of the first node according to the shared secret key parameter of the first node, generating a first secret key verification code corresponding to the shared secret key of the first node, sending shared secret key verification information with the first secret key verification code to the second node, and receiving shared secret key response information from the second node. The calculation steps can be completed offline, the number of times of interaction between the nodes is lowered, and therefore when the first node starts verification, verification can be completed in a quite short period of time, and verification efficiency is improved.
Owner:HUAWEI TECH CO LTD

Authentication method and system based on fingerprints

The invention provides an authentication method and system based on fingerprints. The authentication method includes the steps that a server receives an authentication request, wherein the authentication request comprises identity information; the server generates challenge codes according to the authentication request and sends the challenge codes to a client side; the client side displays the challenge codes, and then a user of the client side inputs a first fingerprint sequence according to the challenge codes and a preset coding rule and sends the first fingerprint sequence to the server; the server acquires a corresponding prestored fingerprint set and a coding rule corresponding to the prestored fingerprint set according to the identity information and generates a second fingerprint sequence according to the challenge codes, the fingerprint set and the coding rule; the server matches the first fingerprint sequence with the second fingerprint sequence, and authentication is achieved when the first fingerprint sequence is matched with the second fingerprint sequence. According to the method based on the fingerprints, user authentication efficiency can be improved, the risk that the password of the user is stolen or cracked is reduced, and safety of the identity information of the user is improved.
Owner:TSINGHUA UNIV

Authentication method and system based on block chain

ActiveCN109359691ARealize online certificationLower Authentication RestrictionsMetadata audio data retrievalDigital data protectionChain networkAuthentication
The invention provides an authentication method and system based on a block chain. The method comprises the following steps: a user node generates credential information and basic credential information; after signing, the user node sends a credential verification request to a verification device; The verification device verifies the validity of the signature, and if the verification passes, the user voice print information and the verification head image, as well as the verification basic information; The authentication device matches the authentication basic information with the certificatebasic information, If the matching is successful, the certificate image encrypted by the user's voiceprint key is decrypted according to the user's voiceprint information and a preset algorithm, so that each participating node determines whether the user node has successfully verified the certificate information, and if the matching is successful, the authentication success message is written intoa block and broadcast to a block chain network. Thus, the online authentication of the certificate information is realized, the authentication limitation is reduced, and the authentication efficiencyand security are improved on the basis of guaranteeing the authentication reliability.
Owner:全链通有限公司

Method and device for controlling visitor access control system based on image recognition

The invention provides a method and device for controlling a visitor access control system based on image recognition, wherein the method comprises the following steps: receiving identity identification information of a target visitor input by a user; determining whether the user has a permission for setting a visitor access control; if so, extracting image feature information in an authenticationimage, and storing the information in a feature database; and opening the access control after determining, based on the image recognition, that the visitor is the target visitor according to the image feature information in the feature database. The method realizes that the information of the target visitor is pre-recorded by the user, whether the visitor is the target visitor is determined by the image recognition technology according to the pre-recorded image feature information when the target visitor comes and will pass the access control, and authentication without using a password, Bluetooth, or a visitor's mobile phone is realized by opening the access control after the determination, thereby avoiding the cumbersome steps of manually inputting a password and pulling out the terminal, improving the authentication and management efficiency of the access control, and improving the user experience.
Owner:BEIJING QDING INTERCONNECTION TECHNOLOGY CO LTD

Medical big data processing method based on body area network and cloud computing

The invention discloses a medical big data processing method based on a body area network and cloud computing. The method comprises the steps that a physiological sensor senses user physiological data, generates a symmetric key for encryption of data through utilization of an APTEEN protocol and a Diffie-Hellman key exchange protocol, signs the data through utilization of a Merkle tree and transmits the processed data to a mobile device; the mobile device decrypts the data uploaded by the physiological sensor, verifies a user identity and completeness of the transmission data and sends verified user data to a cloud server for data storage and data analysis; and the cloud server stores a data analysis result and sends the data analysis result to the mobile device. According to the method, the medical data is stored and protected through adoption of a transmission encryption technology, so the problem that the privacy of a patient is leaked is effectively solved; and the data is transmitted to the cloud server in real time through a wireless network, redundancy eliminated storage and real-time decision analysis problems for the real-time transmission data are solved through utilization of a big data technology, and the security protection and real-time analysis of the medical big data are realized.
Owner:HUAQIAO UNIVERSITY

Identity authentication method and system based on biological characteristics and memory medium

The invention discloses an identity authentication method based on biological characteristics and relates to the technical field of biological characteristic data processing. The method comprises the steps of obtaining and reconstructing identity information of a registered user; collecting biological characteristic information of the registered user and generating biological characteristic data; through adoption of a preset key generation method, generating an encryption key through utilization of the biological characteristic data of the registered user; encrypting the reconstructed identity information through utilization of the encryption key, thereby generating a ciphertext; collecting the biological characteristic information of a to-be-authenticated user and generating the biological characteristic data; generating a decryption key through utilization of the biological characteristic data of the to-be-authenticated user; decrypting the ciphertext through utilization of the decryption key and generating a plurality of pieces of decrypted data; and screening the decrypted data consistent with a reconstruction rule, carrying out reverse reconstruction to generate to-be-identified data, screening the to-be-identified data with the highest occurrence frequency as the identity information of the to-be-authenticated user, and judging the user as the registered user. The invention also discloses another identity authentication method based on the biological characteristics.
Owner:武汉真元生物数据有限公司

Realization system and method for safely visiting and storing intranet data by mobile equipment

The invention discloses a realization system and a method for safely visiting and storing intranet data by mobile equipment. The method comprises the following steps: judging whether the mobile equipment is registered or not by a security management platform; carrying out mutual authentication on the registered mobile equipment; allowing the accession to the intranet after the authentication success; rejecting the accession to the intranet of unregistered mobile equipment and authentication failed mobile equipment; invoking an encryption module when a monitoring module discovers that the mobile equipment is about to store the intranet data in the intranet into the mobile equipment per se; selecting corresponding encryption methods by the encryption module under the monitoring of the monitoring module according to the confidentiality levels of the intranet data for encrypting the intranet data to be stored into the mobile equipment; and inquiring whether the encryption data is confidentiality data or not by a decryption module to the monitoring module in the intranet when the encryption data stored in the mobile equipment needs to be decrypted, and then, selecting corresponding methods for decrypting the encryption data. The invention implements different encryption and decryption methods according to different confidentiality levels, improves the encryption and decryption efficiency and data confidentiality, integrally utilizes the mutual authentication method and the encryption and decryption method, and improves the security of the intranet data.
Owner:JINAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products