Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

30results about How to "Improve authentication strength" patented technology

WebService security certification access control method based on software digital certificate and timestamp

ActiveCN104753881AGuarantee the correctness of accessTight control over securityUser identity/authority verificationTimestampAccess time
The invention discloses a WebService security certification access control method based on a software digital certificate and a timestamp. The method specifically comprises the steps of (1) generating a client credit certificate through a WebService client; (2) creating a WebService request through the client, and signing the WebService request data through a device certificate; (3) calling the timestamp through the client, acquiring stand time from a time source through a timestamp server, and signing and issuing the timestamp to the WebService data through a timestamp server private key; (4) sending the original request text, the device certificate of the WebService client, a signature message and the timestamp information to the server side by the client through a WebService interface after packaging; (5) receiving the WebService request through the server side, sequentially verifying the client device certificate, the digital signature data and the timestamp information, then processing the WebService request, and returning the processing result to the WebService client. With the adoption of the method, the credible access control certification can be performed for all WebService services; in addition, the validity of the request can be determined through the time, and the time can be accessed.
Owner:KOAL SOFTWARE CO LTD

Steganography-based key transmission and key updating method

The invention provides a steganography-based key transmission and key updating method, which is applied to the field of information safety. The method comprises the steps that a communication party A sets a communication type, an encryption algorithm an steganography algorithm, selects a steganography carrier and generates a communication identifier and then performs the updating of a transmission key or the transmission process of a conversion key; a new transmission key is selected when in updating, a time stamp and a signature are generated to encrypt and steganograph the transmission key, the key updating information is generated to be transmitted to a communication party B, and the communication party B performs the verification, de-staganography and deciphering to obtain the transmission key; and the conversion key is selected in transmission to generate a time stamp and a signature so as to encrypt and steganograph the conversion key, the key transmission information is generated to be transmitted to the communication party B, and the communication party B performs the verification, de-steganography and deciphering to obtain the conversation key. The key is concealed by utilizing the steganography, so that an encrypted data format in the key transmission process and the key updating process can be effectively protected, and the safety transmission of multiple encryption and decryption algorithm conversation keys can be realized.
Owner:BEIHANG UNIV

Authentication management method and related equipment

The invention relates to an authentication management method, an empowerment server, a terminal device and an authentication management system, and belongs to the field of data processing. The methodcomprises: an empowerment server obtaining a first serial number sent by a terminal device, and the first serial number being identification information of an authentication module on the terminal device; the empowerment server judging whether an authentication key corresponding to the first serial number exists in a pre-stored management information file or not, wherein the management informationfile comprises a corresponding relationship between the serial number and the authentication key; if an authentication key corresponding to the first serial number exists in the management information file, deducting the authorization frequency in the management information file by the authorization server, and generating an authentication ciphertext by using the authentication key; and the empowerment server sending the authentication ciphertext to the terminal device, so that the terminal device executes a preset operation after successfully verifying the authentication ciphertext through the authentication module. By adopting the method provided by the invention, the security of authentication management can be improved.
Owner:WATCHDATA SYST

Method for quickly verifying vehicle frame

The invention relates to a method for quickly verifying a vehicle frame so that problems of high cost and long cycle of verification of a vehicle frame in the prior art can be solved. A pit and/or protrusion that are/is used for simulating an impact work condition on a real road surface are/is arranged on a proving road; and a stress peak of the impact work condition is tested to realize quick verification of the vehicle frame. When a vehicle frame needs to be verified and tested, simulation of the serious impact work condition of the vehicle on the real road surface is realized by the pit orprotrusion, so that the verification result is close the rear situation. Meanwhile, because of the simulation of the serious impact work condition of the vehicle frame, the verification strength of the vehicle frame is improved equivalently, so that the full-life verification cycle is reduced. When the vehicle frame has a local defect, only verification of the serious impact work condition needs to be carried out on the local defect of the vehicle frame by the pit and the protrusion on the proving road to realize the full-life verification effect instead of full-life verification testing, so that the cost is saved and the verification cycle is reduced.
Owner:ZHENGZHOU YUTONG BUS CO LTD

Authentication method and device of subscriber identity module card and nonvolatile storage medium

The invention discloses an authentication method and device of a subscriber identity module card and a nonvolatile storage medium. The method comprises the following steps: receiving an authentication request which is initiated by a mobile terminal and is used for authenticating a subscriber identity module card, and the authentication request comprises an encryption certificate of the mobile terminal; obtaining a timestamp generated by the timestamp server, and encrypting the timestamp by using a public key obtained by analyzing the encryption certificate of the mobile terminal to obtain a ciphertext timestamp; sending the ciphertext timestamp and an encryption certificate of the server to the mobile terminal; authentication information sent by the mobile terminal is received, the user identity identification card is authenticated according to the authentication information, and the authentication information is obtained by the mobile terminal based on the information of the user identity identification card, the encryption certificate of the server and the ciphertext timestamp. The technical problems of low verification intensity and low safety coefficient of the existing SIM card authentication technology are solved.
Owner:北京时代亿信科技股份有限公司

Windows system login authentication method and system

The invention relates to the technical field of security authentication, and provides a Windows system login authentication method and system. The method comprises the following steps that: a Windowssystem terminal performs first verification authentication on a user name and a password, and transmits the user name, the password and a terminal IP (Internet Protocol) address to a server when the verification authentication is passed; the server acquires a third-party authentication account, and transmits Windows system terminal login confirmation information to a mobile terminal in which the third-party authentication account logs; the mobile terminal transmits information indicating whether login confirmation is performed or not to the server, and the server forwards the information indicating whether login confirmation is performed or not to the Windows system terminal; and the Windows system terminal resolves the information indicating whether login confirmation is performed or not,and determines whether a user is allowed to log into a Windows system or not. Through adoption of the Windows system login authentication method and system, combination of dual authentication of theWindows system is realized; the authentication strength is enhanced; the security is improved; and unified management of a system account is realized.
Owner:INSPUR SUZHOU INTELLIGENT TECH CO LTD

A Windows system login authentication method and system

The invention relates to the technical field of security authentication, and provides a Windows system login authentication method and system. The method comprises the following steps that: a Windowssystem terminal performs first verification authentication on a user name and a password, and transmits the user name, the password and a terminal IP (Internet Protocol) address to a server when the verification authentication is passed; the server acquires a third-party authentication account, and transmits Windows system terminal login confirmation information to a mobile terminal in which the third-party authentication account logs; the mobile terminal transmits information indicating whether login confirmation is performed or not to the server, and the server forwards the information indicating whether login confirmation is performed or not to the Windows system terminal; and the Windows system terminal resolves the information indicating whether login confirmation is performed or not,and determines whether a user is allowed to log into a Windows system or not. Through adoption of the Windows system login authentication method and system, combination of dual authentication of theWindows system is realized; the authentication strength is enhanced; the security is improved; and unified management of a system account is realized.
Owner:INSPUR SUZHOU INTELLIGENT TECH CO LTD

Controllable random fault injection method applied to simulation verification of processor chip

The invention relates to a controllable random fault injection method applied to simulation verification of a processor chip. The controllable random fault injection method comprises the following steps of defining a fault injection structure body; finding a design signal path and a name of fault injection according to a design scheme and a design code of the chip, and associating the design signal path and the name with variables in a fault injection environment through a binding mode supported by a simulator; monitoring and acquiring a current exit instruction number, and acquiring a recorded current fault injection number when the exit instruction number is in the fault injection instruction number interval; obtaining a data bit width size, obtaining two different random numbers r0 andr1 by using a pseudo random number generation method, wherein the value ranges of the random numbers r0 and r1 are between 0 and size-1; and selecting a data bit or a signal bit for fault injection byadopting random numbers r0 and r1 according to different error generation conditions. According to the invention, the controllability, randomness and expandability of fault processing flow verification are enhanced.
Owner:上海高性能集成电路设计中心

Steganography-based key transmission and key updating method

The invention provides a steganography-based key transmission and key updating method, which is applied to the field of information safety. The method comprises the steps that a communication party A sets a communication type, an encryption algorithm an steganography algorithm, selects a steganography carrier and generates a communication identifier and then performs the updating of a transmission key or the transmission process of a conversion key; a new transmission key is selected when in updating, a time stamp and a signature are generated to encrypt and steganograph the transmission key, the key updating information is generated to be transmitted to a communication party B, and the communication party B performs the verification, de-staganography and deciphering to obtain the transmission key; and the conversion key is selected in transmission to generate a time stamp and a signature so as to encrypt and steganograph the conversion key, the key transmission information is generated to be transmitted to the communication party B, and the communication party B performs the verification, de-steganography and deciphering to obtain the conversation key. The key is concealed by utilizing the steganography, so that an encrypted data format in the key transmission process and the key updating process can be effectively protected, and the safety transmission of multiple encryption and decryption algorithm conversation keys can be realized.
Owner:BEIHANG UNIV

A webservice security authentication access control method based on software digital certificate and time stamp

ActiveCN104753881BGuarantee the correctness of accessTight control over securityUser identity/authority verificationAccess timeDigital signature
The invention discloses a WebService security certification access control method based on a software digital certificate and a timestamp. The method specifically comprises the steps of (1) generating a client credit certificate through a WebService client; (2) creating a WebService request through the client, and signing the WebService request data through a device certificate; (3) calling the timestamp through the client, acquiring stand time from a time source through a timestamp server, and signing and issuing the timestamp to the WebService data through a timestamp server private key; (4) sending the original request text, the device certificate of the WebService client, a signature message and the timestamp information to the server side by the client through a WebService interface after packaging; (5) receiving the WebService request through the server side, sequentially verifying the client device certificate, the digital signature data and the timestamp information, then processing the WebService request, and returning the processing result to the WebService client. With the adoption of the method, the credible access control certification can be performed for all WebService services; in addition, the validity of the request can be determined through the time, and the time can be accessed.
Owner:KOAL SOFTWARE CO LTD

Method for protecting security of account

The invention relates to an operational application technology combining short message transmission and computer database, in particular to a method for protecting the security of an account. The method is characterized in that: user login and server verification are required to be performed twice respectively, and passwords for the user login of each time are both dynamic passwords; in the login of the first time, the dynamic password A and the user account are input, and the dynamic password A becomes invalid instantly when the dynamic password A and the user account pass the verification; a dynamic identification code is displayed in a login interface in which the dynamic password A and the user account pass the verification; the user is required to compare the dynamic identification code in the login interface with the dynamic identification code in a received mobile phone short message, and then enters the login step of inputting the dynamic password B and a static password after confirming the two groups of dynamic identification codes are completely the same; and after the successful login of the user, the dynamic identification code and the dynamic password B become invalid instantly. By the method provided by the invention, attacks of account stealing Trojans can be effectively prevented, the phishing attacks of phishing sites to the users can be prevented, and the method is simple and intuitive for the user to operate and easy to master.
Owner:陈珂
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products