Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

37results about How to "Improve authentication speed" patented technology

Household appliance, communication system and method for household application and cloud server and cloud server

The invention discloses a household appliance, a communication system and method for the household appliance and a cloud server, and the cloud server. The method comprises the following steps that: the household appliance acquires a first cyphertext encrypted by a cloud server public key in an authorization module, and transmits the first cyphertext to the cloud server; the cloud server receives the first cyphertext, decrypts the first cyphertext through a cloud server private key, encrypts the decrypted first cyphertext through a household appliance public key to obtain a second cyphertext, and transmits the second cyphertext to the household appliance; the household appliance receives the second cyphertext, determines the cloud server as a legal cloud server according to the second cyphertext, encrypts a generated confirmation message through a preset encryption algorithm, and sends the encrypted confirmation message to the cloud server; and the cloud server receives the confirmation message, and establishes a connection with the household appliance when the household appliance is determined as the legal household appliance according to the confirmation message. Through adoption of the household appliance, the communication system and method and the cloud server, the security of communication information between the household appliance and the cloud server is improved, and the identity authentication speed is increased.
Owner:MIDEA GRP CO LTD

Authentication method for obtaining interface access authority, server and storage medium

The invention discloses an authentication method for obtaining interface access authority, a server and a storage medium. The method comprises the following steps: responding to an authentication request initiated by a client, and determining a request type, wherein the type is a primary authentication request comprising a fixed code and a first timestamp, and a secondary authentication request comprising a feedback random number; when the authentication request is the primary authentication request, judging whether the fixed code and the first timestamp in the request meet a preset authentication condition; when the authentication request is the secondary authentication request, judging whether the random number in the request matches the random number in a dynamically updated random number sequence in the current server; when the fixed code and the first timestamp meet the preset authentication condition, or when the random number in the secondary authentication request matches the random number in the random number sequence in the current server, and when the interface access authority is successfully obtained, creating a token containing the random number based on the random number sequence, and returning the token to the client. The authentication method disclosed by the invention is high in authentication speed.
Owner:PINGAN PUHUI ENTERPRISE MANAGEMENT CO LTD

Authentication method of three-dimensional model file based on secret sharing in cloud environment

The invention provides an authentication method for a three-dimensional model file based on secret sharing in a cloud environment, which comprises the following steps of constructing a secret polynomial by adopting a Lagrange interpolation polynomial, generating the secret fragments from a source file, and transmitting and storing the secret fragments in a plurality of secret participants in a distributed manner; taking the source file and the secret fragments as the original structure carriers, respectively generating the digital abstracts from the secret fragments of the source file by utilizing an SM3 hash algorithm, and uploading the digital abstracts generated by the secret fragments to a cloud in a distributed manner; and recovering the digital digest of the three-dimensional model file based on a (k, n) threshold secret sharing method of Shamir, and performing consistency verification on the digital digest of the three-dimensional model file before encryption and after recovery.The invisibility, robustness and analysis resistance of the method are improved, and the fraudulent behaviors during the secret sharing process are effectively prevented. The method has the good performance at the aspect of protecting the integrity of the file, and particularly has the obvious advantages at the aspect of efficiency.
Owner:ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY

Authentication method, device and system, and storage medium

The invention discloses an authentication method, an authentication device, an authentication system and a storage medium, which belong to technical field of security. The authentication method comprises the steps of: acquiring, by means of an application, a client identifier of a client generated by a user center, wherein the client identifier is an identifier of the client allocated by the usercenter after the client logs in at the user center; performing authority validation on an authentication certificate by means of the client identifier when the application receives authentication information comprising the authentication certificate transmitted by the client, wherein the authentication certificate is a certificate transmitted from the user center to the client and used for cooperating with the client identifier so as to verify the authority of the client; and allowing the client to access by means of the application when the authentication certificate passes authority validation. Through performing authentication operation by using authority information in the authentication certificate by means of the applications locally, a user do not need to go to the user center for using an authentication service provided by the user center to perform centralized authentication. Compared to a centralized authentication method in the related art, the authentication method, the authentication device, the authentication system and the storage medium accelerates the authentication speed by adopting a discrete authentication method.
Owner:HUAWEI TECH CO LTD

Video stream address authentication method and system based on TLS, and storage medium, storage medium and equipment

The invention discloses a video stream address authentication method and system based on TLS, a storage medium and equipment, and relates to the technical field of live video stream playing. The method comprises the following steps: a numerical value generated by an MAP container using an STL is used as a global variable, and the global variable is stored in a thread local storage; the client usesan MD5 algorithm to splice the global variable and the live broadcast related data to generate a first KEY value, and sends the first KEY value, the global variable and the live broadcast related data to the server; the server splices the received global variable and the live broadcast related data by using an MD5 algorithm to generate a second KEY value; and the second KEY value is compared withthe first KEY value, if the second KEY value and the first KEY value are the same, the video stream address is sent to the client, and if the second KEY value and the first KEY value are different, the client is refused to access the server. According to the invention, the video stream address can be effectively prevented from being acquired by the third-party platform, and the legitimate rightsand interests of the live broadcast platform are ensured.
Owner:WUHAN DOUYU NETWORK TECH CO LTD

Contact person tracking privacy protection method based on aggregation signature

The invention discloses a contact person tracking privacy protection method based on an aggregation signature. The method specifically comprises the steps: firstly, generating public and private key pairs of a manager, a user and a doctor; the user broadcasts the hash value of the personal data packet, and when the users meet, whether the opposite side is a legal user is authenticated; after the authentication succeeds, mutual commitments are generated among the users; the user aggregates the signatures of the data packets of other users stored in the commitment process into a single short signature; then, the diagnosers create respective false identities for the contact persons of the diagnosers; the diagnoser sends the false identity information to the doctor, and after the doctor verifies the identity of the contact person, a group signature is generated, and the data packet is uploaded to the block chain; the doctor reports a definite diagnosis state of the user to a manager; and finally determining a close contact person. By adopting the aggregation signature technology, the local storage space of the user is saved, the privacy of the contact person can be protected by the aggregation zero-knowledge proof generated by the diagnoser to the contact person. Meanwhile, the identity authentication speed of the doctor to the contact person can be increased.
Owner:XI'AN POLYTECHNIC UNIVERSITY

Authentication device and electronic equipment

The invention relates to an authentication device and electronic equipment. The device comprises a first module, a second module, a third module and a selection module, the first module is used for outputting a first control signal to the selection module under the condition that a received trigger signal is a first trigger signal, so that an electric connection relationship between the first module and the second module is established through the selection module; controlling a second module to collect first fingerprint information; outputting a second control signal to the selection module so as to establish an electrical connection relationship between the third module and the second module through the selection module; the third module is used for acquiring first fingerprint information of the second module under the condition that the third module is electrically connected with the second module; performing fingerprint identification on the first fingerprint information, and outputting an identification result; and under the condition that the identification result of the third module is successful identification, controlling the electronic equipment to change the state. According to the invention, the authentication speed can be greatly improved, the authentication time is reduced, and the user experience is improved.
Owner:CHIPONE TECH BEIJINGCO LTD

Authentication device and electronic device

The invention relates to an authentication device and an electronic device, and the device comprises a first module which is used for determining the type of a received triggering signal, and outputting a first control signal under the condition that the triggering signal is a first authentication signal; a second module electrically connected to the first module and used for acquiring first fingerprint information according to the first control signal, performing fingerprint identification on the first fingerprint information by utilizing a first fingerprint identification algorithm and outputting an identification result; and a third module electrically connected to the first module and the second module, and used for controlling the electronic device to change the state under the condition that the identification result of the second module is that the identification is successful. According to the invention, when a user triggers the first authentication signal, in response to the first authentication signal, the second module is used to rapidly carry out fingerprint information acquisition and fingerprint identification, and in the case of successful identification, rapid authentication is carried out, so that the authentication speed can be greatly improved, the authentication time is reduced, and the user experience is improved.
Owner:CHIPONE TECH BEIJINGCO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products