Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

47results about How to "Improve identity authentication efficiency" patented technology

Identification authentication method of open network base on dynamic credible third-party

The invention discloses an identity authentication method based on a dynamic trusted third party in an open network. By constructing an authentication system structure containing a trust decision-making database, the dynamic trusted third party and an entity joining the network service, the proposal leads an interactive entity not only to obtain necessary information related to identity authentication but also to obtain a trust feedback set of the trusted third party depended by the interactive entity when the interactive entity is carried out identity authentication; and according to the trust feedback set, the entity independently selects a trust decision-making function and calculates the reliability thereof. The proposal consists of four phases of identity authentication information collecting, identity authentication reliability calculating and judging, identity authentication information mutual judging and identity authentication information feed backing. The invention not only realizes dynamic control to the behavior of the trusted third party by the identity authentication entity in the open network, but also improves the reliability of identity authentication by carrying out reliability calculating and judging.
Owner:NANJING UNIV OF POSTS & TELECOMM

Identity authentication method and identity authentication device

The embodiment of the invention discloses an identity authentication method and an identity authentication device, and relates to the technical field of communication. According to the identity authentication method and the identity authentication device, the problem of relatively poor user experience as a large number of complex user names and passwords need to be remembered is avoided, and the identity authentication efficiency can be improved without downloading a SIM card application. The specific scheme is that an identity authentication server receives an identity authentication request sent by a third-party platform, determines an identifier of a first identity authentication client by searching for a pre-stored corresponding relationship based on a phone number, sends a user information request if the first identity authentication client is in an online state, sends an authentication success message to the third-party platform if a user information response carrying user information is received and the user information is in accordance with user information stored in the identity authentication server, and sends an authentication failure message to the third-party platform if the user information is inconsistent with the user information stored in the identity authentication server or the user information response carrying the user information is not received.
Owner:CHINA UNITED NETWORK COMM GRP CO LTD

Internet online medical identity authentication system and method

The invention relates to an Internet online medical identity authentication system and method, and the system comprises a client, an application server, and a database server. The client comprises anaudio data collection module, a video and image collection module, an authentication condition detection module, an encryption module and a client communication module. The application server comprises a data processing module, a decryption module, an identity authentication management module, and an application server communication module. Through the 2D+3D feature extraction and verification ofa collected image of a user, the system guarantees the reliability of identity authentication. Through employing a real-time authentication mechanism, the system achieves the real-time confirmation ofthe user's identity in a process of medical services, and improves the identity authentication efficiency. Through employing a mode of collecting a key frame and carrying out the low-resolution videorecording, the system guarantees the traceability of identity authentication. The system guarantees the authenticity of the medical process through audio recording. The system employs the encryptionmodule and the decryption module for encrypting or decrypting communication data, thereby improving the safety and integrity of data transmission.
Owner:FOSHAN UNIVERSITY

Internet behavior auditing system and method based on quantum key encryption technology

The invention relates to the technical field of quantum encryption, aims to solve the problem that data of an existing internet behavior terminal cannot be safely transmitted to a public security auditing system, and provides an internet behavior auditing system and method based on a quantum key encryption technology. The internet behavior auditing system comprises quantum key management equipmentwhich is used for generating and issuing a quantum key; a quantum encryption terminal which is in communication connection with the quantum key management equipment so as to encrypt the internet behavior data; a quantum encryption server which is in communication connection with the quantum key management equipment and the quantum encryption terminal and is used for decrypting the encrypted data;an internet behavior terminal which is in communication connection with the quantum encryption terminal so as to send internet behavior data to the quantum encryption terminal; and an internet behavior auditing server which is in communication connection with the quantum encryption server so as to receive decryption data sent by the quantum encryption server. According to the system provided by the invention, the security of data transmission can be greatly improved, the monitoring management of an internet behavior auditing end is facilitated, the laying of channels is reduced, and the datamonitoring range is expanded.
Owner:BEIJING SAFESOFT GREATMAKER CO LTD

Cross-domain identity authentication method based on block chain certificate

The invention provides a cross-domain authentication method based on a block chain certificate, and the method comprises the steps that: in a first stage, an entity in a trust domain transmits the own block chain certificate in a cross-domain manner; in a second stage, a block chain proxy server where the entity is located verifies the block chain certificate of a cross-domain block chain proxy server through a block chain; and, in a third stage, after the cross-domain identity authentication is successful, the cross-domain block chain proxy server generates a new cross-domain block chain certificate. The cross-domain block chain certificate is generated, so that the identity authentication efficiency can be improved when the same cross-domain identity authentication operation is performed next time. Each trust domain is provided with a private key generation center to perform unified management on all signature private keys in the domain. The block chain certificate adopts a lightweight structure. On the premise of ensuring the security, the problem of low efficiency in traditional cross-domain identity authentication is solved. In addition, the traditional digital certificate is subjected to lightweight improvement to meet the current requirement, and the communication overhead is further reduced.
Owner:UNIV OF ELECTRONICS SCI & TECH OF CHINA

Security protocol authentication method supporting various digital identity information and system thereof

The invention discloses a security protocol authentication method supporting various digital identity information and a system thereof, and the method comprises the steps: (1) first equipment receives an identity authentication request from second equipment, and carries out the analysis of the identity authentication request, so as to obtain a digital identity information type identifier of the second equipment and the digital identity information corresponding to the digital identity information type identifier; (2) the first device analyzes the digital identity information of the second device by using an analysis mode corresponding to the digital identity information type identifier of the second device, and verifies the analyzed digital identity information to obtain a verification result; and (3) the first device obtains public key information required by key negotiation in the next stage of the secure communication protocol from the digital identity information passing verification, and the process is ended. The technical problems that an existing security protocol cannot support a new standard format certificate and the compatibility of the new standard format certificate with an original standard certificate when the new standard format certificate is deployed can be solved.
Owner:北京信安世纪科技股份有限公司 +1

Power distribution terminal authentication method, system and device, computer equipment and storage medium

The invention relates to a power distribution terminal authentication method, system and device, computer equipment and a storage medium. The method comprises the following steps: acquiring main node information sent by a to-be-authenticated node corresponding to the to-be-authenticated power distribution terminal; determining a main node corresponding to the main node information, and receiving a storage position sent by the main node; obtaining first terminal attribute information in the storage position, and obtaining second terminal attribute information sent by the to-be-authenticated node; and comparing the first terminal attribute information with the second terminal attribute information, and determining whether the identity authentication of the to-be-authenticated node is passed or not according to a comparison result. In the embodiment of the invention, any authenticated node in the private chain network can perform identity authentication on the node to be authenticated, so that identity authentication on a large number of power distribution terminals by depending on limited central trusted equipment can be avoided, the authentication speed is improved, and meanwhile, the timeliness of an authentication system caused by failure of single central trusted equipment can be prevented, therefore, the identity authentication efficiency of the power distribution terminal is effectively improved.
Owner:GUANGZHOU KETENG INFORMATION TECH

Bidirectional identity authentication method based on lightweight CA, computer program and storage medium

The invention relates to a bidirectional identity authentication method based on lightweight CA, which comprises the following steps: initialization: a CA node and a common node generating a public and private key pair, and the CA node sending a CA node public key to the common node in the domain; intra-domain authentication: the common nodes of the two parties to be communicated respectively applying for respective auxiliary public keys from the CA node and sending the respective auxiliary public keys to the opposite parties, and the two parties receiving the auxiliary public keys of the opposite parties to perform identity authentication and establishing a secure channel to send messages by initiating a negotiation session password process; cross-domain authentication: establishing a trust alliance by mutual signing of alliance public keys among CA nodes of multiple domains, verifying the authenticity of node identities by the CA nodes corresponding to different regions and signing and issuing temporary auxiliary public keys for the CA nodes when the common nodes roam to the different regions, and initiating an authentication request to the common nodes in the different regions through the temporary auxiliary public keys, and if the authentication is passed, initiating a negotiation session password process to establish a secure channel to send a message.
Owner:NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP

Extranet identity authentication method, system and device based on intranet connection and storage medium

The embodiment of the invention discloses an extranet identity authentication method, system and device based on intranet connection and a storage medium, and the method comprises the steps that an information collection device collects the biological feature information of a user, wherein the information collection device is connected to an internal system through an internal network; an identityauthentication device acquires at least one kind of biological characteristic information acquired by the information collection device; the identity authentication device sends the at least one kindof biological characteristic information to an identity authentication server; and the identity authentication device accesses the identity authentication server through an external network; and theidentity authentication device receives the authentication information sent by the identity authentication server, and generates an authentication result according to the authentication information. According to the scheme, the user identity authentication efficiency is improved, and the authentication process is simplified on the premise of ensuring the safety and reliability of identity authentication.
Owner:XUNTENG (GUANGDONG) TECH CO LTD

Identity authentication method and electronic device

The invention relates to the technical field of video conferencing, and specifically discloses an identity authentication method and electronic equipment, wherein the method includes: generating a temporary key pair; the temporary key pair includes a temporary public key and a temporary private key; and sending the temporary public key to security hardware; Receive the temporary public key authentication data returned by the secure hardware based on the temporary public key; the temporary public key authentication data is obtained by signing the temporary public key with the hardware private key by the secure hardware; sign the identity authentication data sent by the client based on the temporary private key , to get the signed message, and add the temporary public key authentication data to the signed message; send the signed message to the client for the client to authenticate the server. In the secure hardware, it is only necessary to use the hardware private key to sign the temporary public key once, and the rest of the signatures for the identity authentication data sent by each client can be completed in the server; using the processing performance of the server to sign, greatly improving the identity authentication s efficiency.
Owner:SUZHOU KEDA TECH

Method for authenticating identity of insured person, server of insurance institution and user terminal

PendingCN109523408ASave yourself the pain of running aroundShorten the timeFinanceDigital data authenticationInternet privacy
An embodiment of the present application discloses an identity authentication method of an insured person, The method comprises the following steps: receiving an identity authentication request from auser terminal, wherein the identity authentication request includes identity information of a first user and a type identification of insurance money to be collected by the first user; the identity authentication request is generated by the user terminal according to an operation of a second user; and a user terminal. Obtaining qualification authentication information corresponding to the type identification of the first user according to the identity information, if the qualification authentication information indicates that the first user is eligible for the insurance premium identified bythe type identification, then obtaining a face image of a second user, performing identity authentication on the second user according to the face image to obtain an identity authentication result, and sending the identity authentication result to the user terminal, wherein the identity authentication result is used for indicating whether the second user and the first user are the same user or not. Embodiments of the present application can improve the efficiency of identity authentication for insured persons.
Owner:深圳平安医疗健康科技服务有限公司

Gun and bullet getting and returning and vein self-service authentication management system

The invention relates to a gun and bullet getting and returning and vein self-service authentication management system. The system is characterized by comprising a computer arranged in a gun cabinet, wherein the computer is connected with a palm vein acquisition instrument; the computer is further connected with a database server through a network line; the computer is further connected with a cabinet door control board of the gun cabinet, a cartridge clip lock and a gun lock through serial ports; and when personnel are authenticated, palm vein information is read through the palm vein acquisition instrument and sent to the database server to perform identity comparison, a cabinet door opening command is sent through a serial port when the identity is legal, a gun cabinet door is opened, and the corresponding cartridge clip lock and gun lock are opened. The system has the beneficial effects of simple structure, convenient use, high accuracy and strict management; and automatic control and vein authentication technologies are adopted, so that the problems of slow getting and returning, low authentication efficiency and the like of existing bullets are solved and the efficiency of gun and bullet getting and returning process and personnel identity authentication is improved.
Owner:山东登云智能科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products