Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

91results about How to "Improve authentication security" patented technology

Method and system for implementing dynamic identity authentication

The invention discloses a system of realizing dynamic identification authentication, comprising an intelligent card, a cell phone, an authentication terminal and an authentication server. The invention further discloses a method for realizing the dynamic identification authentication, including the following steps: the intelligent card pre-stores a seed key and an algorithm; a dynamic password required by the authentication is generated by utilizing the algorithm, the seed key and an appointed authentication factor, and is sent to the cell phone which receives and displays the dynamic password; the user enters the dynamic password and user information into the authentication terminal and uploads the dynamic password and user information to an authentication server; the authentication server obtains the seed key of the user from the authentication server according to the user information and carries out the calculation of the seed key and the appointed authentication factor with the prestored algorithm, thus also generating the dynamic password; and comparison of the dynamic passwords at two terminals is carried out, thereby completing the authentication. The invention overcomes the existing defect that the identification authentication of the user is required, and the user additionally carries a dynamic password card and other identification authentication products, simultaneously, the problem about the service life of the password card is solved.
Owner:BEIJING HUADA ZHIBAO ELECTRONICS SYST

Block chain-based method for accessing power Internet of Things terminal

The invention provides a Block chain-based method for accessing a power Internet of Things terminal, comprising the steps of: connecting a to-be-accessed power Internet of Things terminal to a masternode, and initiating an authentication request; the master node responding to the authentication request, and randomly selecting nodes that meet the condition of a threshold number from the block chain to form an authentication group; encrypting a public key G and an identity ID of the to-be-accessed power Internet of Things terminal by using a private key to obtain a digital signature ciphertextX, and sending the identity ID, a terminal public value R and the digital signature ciphertext X to the master node; the master node encapsulating and sending the authentication request information toa member node of the authentication group; the authentication group running PBFT consensus algorithm, and obtaining an authentication result by performing distributed authentication through two-two exchanging of the authentication information between the nodes of the authentication group; generating a new block in the block chain, and returning confirmation information to the to-be-accessed powerInternet of Things terminal; and the power Internet of Things terminal returning encrypted confirmation information to an access gateway. The block chain-based power Internet of Things terminal access method can improve the security and efficiency of authentication.
Owner:JIANGSU ELECTRIC POWER CO

Method and device for recognizing user behavior based on prediction model

Embodiments of the present application disclose a user behavior identification method and apparatus based on a prediction model. The method includes: first user operation data for triggering a start-up target service is obtained, and first user identification information associated with the first user operation data is determined; based on user behavior recognition model of the target service, a target us behavior class correspond to that first user operation data and the first user identification information is determined, the user behavior identification model is obtained by training sampledata for starting the target service, and the sample data includes at least the first user behavior sample data and the second user behavior sample data; the user authentication of the target serviceis completed according to the target user behavior category and the target service is started, or the user authentication of the target service is disconnected. By adopting the embodiment of the present application, the user behavior category can be determined based on the regression algorithm, the identification accuracy rate of the user behavior category starting the target service is improved,and the user data security of the target service is improved.
Owner:PING AN TECH (SHENZHEN) CO LTD

Identity authentication method, user equipment and server

The invention discloses an identity authentication method, which is applied to a user equipment side, and comprises the steps of: sending an equipment authentication public key and an equipment unique identifier to an equipment authentication server for storage by the equipment authentication server; using an equipment authentication private key to sign a server authentication public key, and sending signature data and the equipment unique identifier to the equipment authentication server, so that the equipment authentication server retrieves the equipment authentication public key by means of the equipment unique identifier, performs signature authentication on the signature data, and returns a result to an identity authentication server for storage when the signature authentication passes; and using a service authentication private key for signing a user authentication public key, sending signature data to the identity authentication server so that the identity authentication server performs signature authentication by using the service authentication public key, and saving the user authentication public key when the signature authentication passes. The identity authentication method solves the security risk problem existing in registration of a user in the existing FIDO authentication standard. The invention further provides corresponding user equipment and servers.
Owner:GUOMIN RENZHENG TECH BEIJING CO LTD

Method and system for certifying the presence of an operator

A method for certifying the presence of an operator includes a presence code (104) requested (202) at a given time instant (21, 22) to a first device (103) operable by a user (102); the first device (103) generates (203) the presence code (104), the presence code (104) including a portion generated according to an encoding algorithm (25), wherein the generated portion depends on the time instant (21, 22) and on an identifier (23) of the first device (103); a second device (105) operable by an operator (101) stores (204) the generated presence code (104); the presence code (104) is transmitted (109) to a third validation device (108); the third validation device (108) certifies (212) the presence of the operator (101) at the user (102) at the time instant (21, 22); the certification (212) including: providing the third validation device (108) with at least one piece of time information (21, 206, 306) about the time instant (21, 22), and further providing (205) the identifier (23) of the first device (103), wherein the presence code (104) is validated (208) by comparing it (26) with at least one second presence code (27) generated (25) by the third validation device (108) according to the same encoding algorithm (25) and according to the piece of time information (21, 206, 306) and according to the identifier (23), wherein certification (212) occurs if the comparison (26) shows a match between the presence code (104) and the second presence code (27).
Owner:SIXS S R L SOLUZIONI INFORMATICHE PER IL SOCIALE

User behavior recognition method and device based on slider verification code verification

The embodiment of the application discloses a method and a device for identifying user behavior based on slider authentication code verification. The method comprises the following steps: first user operation data for starting a target service is obtained, the first user operation data including first user identification information and first page operation data; A target slider verification codeis output to the user interface according to the first page operation data, and first slider operation data for user authentication based on the target slider verification code is obtained from the user interface; The user behavior identification model verified by the slider authentication code is determined according to the first user identification information, and a user behavior category corresponding to the first page operation data and the first slider operation data is determined based on the user behavior identification model; user authentication is completed or user authentication isdisconnected according to the user behavior category. By adopting the embodiment of the application, the user authentication security based on the slider authentication code authentication can be improved, the network attack of the slider authentication code authentication can be effectively prevented, and the security is higher.
Owner:PING AN TECH (SHENZHEN) CO LTD

Method for authenticating network identity

The invention discloses a method for authenticating a network identity, comprising the following steps: a client side sends an authentication request to a server side; the server side generates authentication information according to the authentication request and feeds the authentication information back to the client side, wherein the authentication information includes dynamic instructions and an authentication interface; the client side obtains user information input by a user through the authentication interface; the client side generates an authentication password through the user information; the server side generates an authentication comparing code according to the user information; the server side compares the authentication password with the authentication comparing code; and if the authentication password is identical to the authentication comparing code, the authentication is successful. The method combines the username and the password with a password authentication of a verification code and replaces the verification code with a subscript for obtaining the authentication password, so that the risk of revealing the password and the verification code is avoided, the network bandwidth required by the authentication is reduced and the authentication safety is improved.
Owner:北京信安世纪科技股份有限公司

Terminal, identity authentication method, authentication method for authentication center and terminal and authentication system

The invention discloses a terminal, an identity authentication method, an authentication method for an authentication center and the terminal and an authentication system. The identity authentication method comprise the steps of randomly displaying a text; collecting an audio/video formed by reading the text, wherein the text is read by a user; extracting feature data in the audio/video; and judging whether the feature data matches the feature data in a database or not, if the feature data matches the feature data in the database, performing identity authentication, otherwise not performing the identity authentication. According to the terminal, the methods and the system, the text content displayed on the terminal is replaced continuously, so the audios/videos formed by reading the texts are different, wherein the texts are read by the user, the user can be authenticated according to the changed mouth shape feature data, and an illegal user is prevented from counterfeiting the same audio/video to simulate identity authentication. Compared with a mode of authenticating an identity through utilization of a cipher, the method has the advantages that the cipher does not need to be set, the defect that the security is low due to the fact that the cipher is liable to lose and steal is avoided, the authentication is assisted without configuring an extra device, only field authentication is carried out, and the authentication security is improved.
Owner:上海仪电数字技术股份有限公司

Fingerprint sequential composition password authentification system

The present invention provides a fingerprint sequential composition password authentification system. The system comprises a fingerprint input terminal and a fingerprint authentification system, and is technically characterized in that the fingerprint authentification system is provided with fingerprint information and sequence authentification procedures for recording information and an input sequence of over two fingerprints within a set period of time so as to carry out sequence authentification, and the sequence authentification procedure forms a group of specific fingerprint sequential composition password by using the input sequence of information of more than two fingerprints of a person. When applying for an account, a person can organize and combine the input sequence of several random fingers among the ten fingers through the fingerprint input terminal, the sequential composition password authentification system not only records information of every fingerprint input by the authorizer, but also records the input sequence of the fingerprint information, thereby forming a group of specific fingerprint sequential composition password, and when being required for authentification, the authorizer shall input the password on the fingerprint input terminal according to the preset input sequence of the fingerprints, thus to pass the system authentification. The system provided by the present invention is a novel authentification system which combines biological characteristics and mathematics probability at the same time.
Owner:谭荣兵

Method for realizing security key authentication of pure electric vehicle

The invention discloses a method for realizing the security key authentication of a pure electric vehicle. The method comprises the steps: waking up a smart key, feeding back a high-frequency key coordinate signal and a unique key ID of the smart key to a vehicle body controller; generating a first random number by the vehicle body controller and encrypting the Key ID, the first random number anda low-frequency wake-up signal by the vehicle body controller and the smart key based on an HITAG2 algorithm; completing authentication of the vehicle body controller and the smart key under the condition of consistence of the vehicle body controller and a ciphertext obtained by smart key encryption; generating a second random number Key and a third random number Key1 by the vehicle body controller and sending the second random number Key and the third random number Key1 to an overall vehicle controller; generating a fourth random number Key2 and a fifth random number Key3 by the overall vehicle controller and replying the fourth random number Key2 and the fifth random number Key3 to the vehicle body controller; and carrying out two-way authentication by the vehicle body controller and theoverall vehicle controller by using the second random number Key, the third random number Key1, the fourth random number Key2, the fifth random number Key3, and a conventional number A to realize starting of a pure electric vehicle.
Owner:浙江新吉奥汽车有限公司

Mass Internet of Things equipment authentication method, storage medium and information data processing terminal

The invention belongs to the technical field of Internet of Things security, and discloses a massive Internet of Things equipment authentication method, a storage medium and an information data processing terminal. The massive Internet of Things equipment authentication method comprises the steps: IOT equipment interacts with a smart city operation center IOC, and equipment initialization is completed through a secure channel; the equipment initialization stage is completed, and an aggregator AG is selected through the IOC to perform aggregator authentication; after the aggregator authentication is completed, the IOT equipment completes group authentication under the assistance of the AG; and after the group authentication is completed, the intra-group equipment completes session key negotiation under the assistance of the AG. According to the method, the equipment with the high trust value is selected as an aggregator to assist the IOC to carry out group certification on other equipment, so that remote certification of massive IOT equipment is more reliable and efficient. Meanwhile, a reputation mechanism is used for supervising the trust value of the equipment, and the situation that the whole system network is affected due to the fact that the successfully authenticated equipment is dealt with by an attacker is prevented.
Owner:XIDIAN UNIV

Financial terminal authentication method and device

The invention provides a financial terminal authentication method and a financial terminal authentication device. Authentication information is generated in combination with a bank card number, biological characteristics and a conventional password, specifically, the authentication information is generated in combination with three parameters including the bank card number, the biological characteristics and the conventional password of a user by using a one-way hash function through an operation; the authentication information stored in a bank system server is neither the password and the biological information of the user nor the information of the encrypted password and the encrypted biological information; if any of the three parameters is different, the entirely different authentication information is generated; and the generated authentication information cannot be falsified and cannot be obtained through a password cracking method. According to the financial terminal authentication method and the financial terminal authentication device, the safety problem that the authentication information is stolen and cracked can be prevented, and the final authentication information generated by the same original authentication information such as the same password and the same biological information in a bank system are completely different, and thus the method is high in authentication safety.
Owner:HUNAN UNIV OF FINANCE & ECONOMICS

Authenticator and realization method thereof

The invention discloses an authenticator and a realization method thereof and belongs to the technical field of identity authentication. When the authenticator receives a registration command, the authenticator generates an authentication key pair, correlates and stores the authentication key pair and key token information contained in the registration command. The authenticator establishes registration assertion data according to the authentication key pair, forms registration command response according to the registration assertion data and a state code expressing performance success and returns the registration command response to an authenticator interface. When the authenticator receives a signing command, the authenticator obtains an authentication private key according to the key token information contained in the signing command, establishes signing assertion data according to transaction data contained in the signing command and the authentication private key, forms signing command response according to the signing assertion data and the state code expressing the performance success and returns the signing command response to the authenticator interface; and the authenticator interacts with a background server through the authenticator interface. The authentication private key does not appear in network transmission of an interaction process and does not need to be pre-stored at the background server, so the authentication information can be effectively prevented from being leaked.
Owner:FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products