Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

31results about How to "Improve the authentication success rate" patented technology

Beidou second-generation navigation message digital signature anti-cheating scheme based on domestic passwords

The invention relates to the technical field of information safety, and provides a Beidou second-generation navigation message digital signature anti-cheating scheme based on domestic passwords. A Beidou second-generation satellite navigation system in China is lack of research in the aspect of information anti-cheating, and a domestic cryptographic algorithm which is developed independently in China is adopted by the scheme, so that the authenticity and integrity of Beidou signals are guaranteed, and the purpose of anti-cheating of satellite signals is achieved. According to the method, secret key management of a public key is carried out through SM4, SM3 provides abstract information for a digital signature generated by a SM2, SM2 domestic asymmetric elliptic curve public key cryptographic algorithm is used for generating the digest information, and the digital signature receiver can authenticate the abstract through the public key to verify whether Beidou second-generation navigation message is deception. The method is effectively utilized in the field of information system safety, and experiments show that the code scheme can be realized through a computer information processing module through an OpenSSl and VisualStudio combined pair scheme, and the experiment result shows that the safety of the Beidou second-generation navigation message can be effectively improved.
Owner:CIVIL AVIATION UNIV OF CHINA

Network authentication method and device, computer equipment and storage medium

The invention relates to a network authentication method and device, computer equipment and a storage medium. The method comprises the following steps: monitoring a communication state of a communication link between a base station and a server; if the communication state is abnormal, executing authentication operation, wherein the authentication operation comprises the steps that an authentication parameter with the highest preset priority is selected from an authentication parameter set, and network authentication is conducted on a communication link between the base station and the server;and if the authentication is not successful, the priority of each authentication parameter is updated in the authentication parameter set, and the authentication operation is continued to execute based on the updated priority of each authentication parameter in the authentication parameter set until the authentication is successful. According to the authentication method, an automatic authentication process is realized, and compared with an existing network authentication method needing manual intervention for manual operation, the network authentication method provided by the invention greatly shortens the link recovery time of network interruption between the base station and the server, so that the stability of network operation is ensured.
Owner:COMBA TELECOM SYST CHINA LTD

Resource transfer method and device, server and computer readable storage medium

The invention discloses a resource transfer method and device, a server and a computer readable storage medium, and belongs to the technical field of the Internet. The method comprises the following steps: receiving a request of binding a first interaction object with a first account; binding the first interaction object with the first account based on the request of binding the first interactionobject with the first account; receiving resources recharged by the first interaction object, and storing the resources recharged by the first interaction object into a first account bound with the first interaction object; receiving object information of a to-be-authenticated object sent by the first interaction object; authenticating the to-be-authenticated object based on the object informationof the to-be-authenticated object; in response to successful authentication of the to-be-authenticated object, deducting authentication resources of the to-be-authenticated object from a first account bound with the first interaction object; and in response to successful transaction of the to-be-authenticated object, transferring the authentication resource of the to-be-authenticated object to the first account of the first interaction object. According to the method, the accuracy and reliability of the authentication result can be improved, and the authentication success rate is improved.
Owner:BEIJING SANKUAI ONLINE TECH CO LTD

Identity verification method, device, equipment and computer readable storage medium

The invention discloses an identity verification method, a device, equipment and a computer readable storage medium. The method comprises the following steps: acquiring a multi-user image in a multi-user environment; extracting user characteristics of each user in the multi-user image; in the user characteristics of each user, identifying the user characteristics matched with the preset target characteristics, and determining the user corresponding to the user characteristics matched with the target characteristics as the target user; collecting biological characteristic information of a target user; and if the biological characteristic information of the target user is matched with the preset standard biological characteristic information, executing an unlocking operation. According to the method, the target user is identified in the multi-user environment, only the biological characteristic information of the target user is collected in the multi-user environment, and whether the identity verification operation can be executed or not is judged according to the biological characteristic information. According to the method, the adverse effect of environmental factors on the identity authentication process can be reduced, the identity authentication time is shortened, the identity authentication success rate is improved, and the user experience effect is improved.
Owner:GREE ELECTRIC APPLIANCES INC

Biometric authentication processing system

The invention provides a biometric authentication processing system. When the reading quality during the authentication process is less than a predetermined level of quality, image processing to improve the quality of a read image that is not performed during the registration process is performed to improve the image quality, thus making the biometric authentication successful. Software to improve the image quality is added by upgrading the version of the authentication software to successively add image improvement software to the authentication software irrespective of the registration process. This version upgrading method enables changes to be made to enhance the authentication success rate regardless of the version of the registration software. Further, an area in which to read biometric information during the registration process is set larger than that in which to read biometric information during the authentication process, so that if a subject body part is placed slightly deviated from a correct position, a matching check can still be made. The biometric information reading area is not only used as an entire single image but divided into sub-areas, in each of which characteristic quantities are extracted. According to the result of a matching check in each divided sub-area, an overall authentication result is determined as either OK or NG. Since which of the divided sub-areas is NG can be known, NG causes can be analyzed precisely.
Owner:HITACHI OMRON TERMINAL SOLUTIONS CORP

Method for preventing WLAN (Wireless Local Area Network) association-breaking attack based on prime factorization verification

The invention discloses a method for preventing WLAN (Wireless Local Area Network) association-breaking attack based on prime factorization verification, and belongs to the technical field of communication. The method comprises the following steps that: a STA (Station) transmits an association request frame carrying a generated large composite number; an AP (Access Point) receives the associationrequest frame; the AP transmits an association response frame carrying the generated large composite number; the STA receives the association response frame; the STA transmits a breaking authentication association frame carrying a large prime number; the AP receives the breaking authentication association frame and verifies the large prime number in the breaking authentication association frame; the AP transmits the breaking authentication association frame carrying the large prime number; and the STA receives the breaking authentication association frame and verifies the large prime number inthe breaking authentication association frame. The STA and the AP generate the large prime number and the large composite number which are required during association breaking of the other party at an association stage, and the transmission of the large composite and the large prime number is realized through a frame extension field. Frame reception is authenticated at a breaking stage, so that the STA and the AP are protected from being disconnected exceptionally due to an association-breaking authentication frame transmitted by a malicious third party. Through adoption of the method, the security, protocol compatibility and authentication success rate are improved greatly.
Owner:CHONGQING UNIV OF POSTS & TELECOMM

Method, device and system for treating authentication message

The embodiment of the invention provides a method, a device and a system for treating an authentication message. The method for treating the authentication message comprises the following steps of: analyzing authentication request messages sent by an authentication client to obtain a mark of the authentication client; updating an authentication server recorded by an authentication interactive counter and an authentication interactive frequency of the authentication client according to the mark of the authentication client; and inserting the authentication request messages into an authentication message queue according to the updated authentication interactive frequency, and sequentially treating the authentication request messages in the authentication message queue. The embodiment of theinvention realizes control to a treating sequence and flow of the authentication messages, enhances the authentication efficiency, the authentication success rate and the user authentication experience, and particularly initiates an authentication process when authenticating clients in a large amount and efficiently filters the authentication request messages under the condition that the authentication server achieves the performance bottleneck, thereby greatly enhancing the authentication efficiency and the user authentication experience.
Owner:BEIJING XINWANG RUIJIE NETWORK TECH CO LTD

A method of preventing wlan disconnection attack based on prime number decomposition verification

The invention discloses a method for preventing WLAN (Wireless Local Area Network) association-breaking attack based on prime factorization verification, and belongs to the technical field of communication. The method comprises the following steps that: a STA (Station) transmits an association request frame carrying a generated large composite number; an AP (Access Point) receives the associationrequest frame; the AP transmits an association response frame carrying the generated large composite number; the STA receives the association response frame; the STA transmits a breaking authentication association frame carrying a large prime number; the AP receives the breaking authentication association frame and verifies the large prime number in the breaking authentication association frame; the AP transmits the breaking authentication association frame carrying the large prime number; and the STA receives the breaking authentication association frame and verifies the large prime number inthe breaking authentication association frame. The STA and the AP generate the large prime number and the large composite number which are required during association breaking of the other party at an association stage, and the transmission of the large composite and the large prime number is realized through a frame extension field. Frame reception is authenticated at a breaking stage, so that the STA and the AP are protected from being disconnected exceptionally due to an association-breaking authentication frame transmitted by a malicious third party. Through adoption of the method, the security, protocol compatibility and authentication success rate are improved greatly.
Owner:CHONGQING UNIV OF POSTS & TELECOMM

Authentication method and system for WSN (Wireless Sensor Network) node on telecommunication network

The invention provides an authentication method and system for a WSN (Wireless Sensor Network) node on a telecommunication network. The authentication method for the WSN node on the telecommunicationnetwork comprises the following steps that the WSN node sends an authentication request to a gateway; the gateway processes the authentication request and sends the processed authentication request tothe telecommunication network; the telecommunication network receives the authentication request, authenticates the WSN node and sends an authentication result back to the gateway; and the gateway processes the authentication result and sends the processed authentication result back to the WSN node. According to the authentication method, the gateway is arranged on a communication link between the WSN node and the telecommunication network, the authentication request sent by the WSN node and the authentication result sent back by the telecommunication network are processed and transmitted through the gateway, so that the authentication request and the authentication result can be transmitted to a target network more smoothly and more quickly, and therefore the authentication success rateof the WSN node is increased, and meanwhile the authentication efficiency of the WSN node is further improved.
Owner:CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products