Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

60results about How to "Non-repudiation" patented technology

Method and system for identity verification of digital certificate based on TEE (Trusted Execution Environment)

ActiveCN105429760AEnsure true willEnsure that the identity verification process can reflect the true willUser identity/authority verificationPasswordPersonal identity verification
The invention discloses a method for identity verification of a digital certificate based on a TEE (Trusted Execution Environment). The method comprises pre-configuration of a digital certificate system through a terminal, a digital certificate signature process and a digital certificate signature verification process. The method is characterized in that the terminal is provided with the TEE; the digital certificate signature process is carried out on the terminal and is used for utilizing a private key of the digital certificate to sign for a user request; the digital certificate signature verification process is used for authenticating identity of a requested user, and the authentication method comprises verification of validity and effectiveness of the digital certificate and integrity and correctness of the signature, wherein the digital certificate signature process is carried out under the TEE; the sensitive information, such as a user key, identity information, biological characteristic information and password information, is stored through a secure storage module, so that the problems that the signature process is carried out in REE and the sensitive information of the user is stored under the REE environment to cause privacy disclosure and stolen hidden danger of property in the prior art are avoided.
Owner:神州融安数字科技(北京)有限公司

Official seal fake detection method and device based on network digital certificate and network lookup

InactiveCN104268742ANon-repudiationEliminate the role of forged documentsDigital data authenticationOffice automationPasswordDisplay device
The invention discloses an official seal fake detection method and device based on a network digital certificate and network lookup. The device comprises an official seal printer connected with an official seal fake detection system. A central processing unit MCU in the official seal printer is connected with a communication assembly, a displayer, a printing assembly, a storage and a USB interface. A power module supplies power to the official seal printer. The official seal fake detection method comprises the steps that the official seal fake detection system is built for user inspection, the digital certificate is issued when a user passes identity authentication, the official seal printer prompts selection of official seal types, a USB intelligent card is plugged into the USB interface of the official seal printer, copies needing to be stamped, the user name and a password are input, the identity and validity of the digital certificate are verified, fake detection codes are generated in the official seal fake detection system randomly, the official seal printer displays an official seal pattern, the user selects the position of a two-dimension code, and the official seal printer prints an official seal. By means of the method, whether the official seal is true or false can be queried whenever and wherever, the official seal can be verified and queried whenever and wherever through mobile phone APPs, and hazards caused when false official seals or copied official seals are used are completely eradicated.
Owner:SHAANXI WANYU ELECTRONICS INFORMATION TECH CO LTD

Anti-counterfeit label and anti-counterfeit method based on combination of two-dimension codes and RFID chips

ActiveCN104166871AAnti-counterfeiting advantageGood anti-counterfeiting featuresRecord carriers used with machinesDigital signaturePassword
The invention relates to an anti-counterfeit label based on the combination of two-dimension codes and RFID chips. The data area of the two-dimension codes and the data area of the RFID chips are respectively divided into a non-secrecy zone and a secrecy zone, each secrecy zone is divided into multiple secrecy zone bodies, two-dimension code label codes are stored in the non-secrecy zone of the two-dimension codes, and the secrecy zone of the two-dimension codes is divided into a first two-dimension code secrecy zone body for storing protected data needed by a user; RFID label codes are stored in the non-secrecy zone of the RFID chips, and the secrecy zone of the RFID chips is divided into the RFID user secrecy zone body and the RFID password secrecy zone body; in the verification process, access to the RFID password secrecy zone body is achieved firstly to obtain a decoding password of the two-dimension code secrecy zone body, the needed data are obtained from the two-dimension codes, the data, including a digital signature, of the RFID user secrecy zone body are read, the digital signature is regenerated, and two digital digests are verified to finally obtain a result whether to be true or counterfeit or a result whether to be legal or illegal. The defects of a traditional anti-counterfeit technology can be overcome well, and the anti-counterfeit label is difficult to counterfeit.
Owner:SHANGHAI QUANRAY ELECTRONICS

Mobile phone encrypted short message structure and method for transmitting and receiving mobile phone encrypted short message by applying same

The invention refers to a mobile phone encrypted short message structure and a method for transmitting and receiving a mobile phone encrypted short message by applying the structure. The method for transmitting and receiving the mobile phone encrypted short message comprises the steps of: a) enabling a sending terminal user to send an encrypted short message, which comprises the following steps of: S11) editing short message content; S12) obtaining an abstract value of the short message content; S13) applying a signature to the abstract value by utilizing a DSA (digital signature algorithm) encryption private key of the sending terminal user; S14) performing encryption on the signature and the short message content by utilizing a RSA (Rivest-Shamir-Adleman) encryption public key in a digit certificate of a receiving terminal user; and S15) sending the encrypted short message, wherein the encrypted short message structure is the special structure of the invention; and b) enabling the receiving terminal user to receive and read the encrypted short message, which comprises the following steps of: S21) enabling the receiving terminal user to receive the encrypted short message; S22) decrypting the encrypted short message by utilizing a RSA encryption private key of the receiving terminal user; and s24) reading the encrypted short message content.
Owner:BEIJING UNIV OF POSTS & TELECOMM

Electronic certificate security management method and system

The invention discloses an electronic certificate security management method and system. The electronic certificate security management method comprises the following steps: issuing electronic certificate signing and issuing application; authenticating the receiving end, generating the electronic certificate, and issuing the electronic certificate and the signing and issuing information to the security basic module of electronic certificate; obtaining the electronic certificate and the electronic certificate signing and issuing results from the electronic certificate security basic module; issuing the electronic certificate authentication application to the electronic certificate security basic module; authenticating the receiving end by means of the electronic certificate security basic module, issuing the authentication confirmation information to the electronic certificate security basic module, and waiting for the receiver to confirm; confirming the authentication confirmation information by the receiving end; and obtaining the authentication results of the electronic certificate from the electronic certificate security basic module. By means of the scheme disclosed by the invention, the defects of the electronic certificate issuing, authentication and supervision platform in the prior art in the aspects of cost, safety and convenience can be solved.
Owner:北京明朝万达科技股份有限公司

Anti-repudiation dynamic password generating method and dynamic password verification system

The invention provides an anti-repudiation dynamic password generating method and an anti-repudiation dynamic password generating system. The method comprises the following steps that S1, a client acquires first time information and first place information by virtue of a positioning satellite and transmits an instruction to a server at the same time; S2, the server receives and executes the instruction and acquires second time information and second place information by virtue of the positioning satellite; S3, the client generates a first dynamic password according to the first time information and the first place information, and transmits the first dynamic password to the server; S4, the server generates a second dynamic password according to the second time information and the second place information; and S5, the server compares the first dynamic password with the second dynamic password, and if the first dynamic password is the same as the second dynamic password, the comparison is successful, and the verification is finished. According to the method provided by the invention, the current time and place of the client are acquired by the client and the server by virtue of a satellite, and the time information and the place information are used as key elements for generating dynamic passwords, so that the dynamic passwords have anti-repudiation properties.
Owner:SHANGHAI PEOPLENET SECURITY TECH

Palm vein authentication-based bank authorization and credit system and method

The invention discloses a palm vein authentication-based bank authorization and credit system and a palm vein authentication-based bank authorization and credit method. The system comprises an authorized terminal, an authorized certification device and a palm vein identification device, wherein the authorized terminal sends service request information to the authorized certification device according to a bank service process requirement; the authorized certification device receives the service request information, identifies, extracts and sends authentication request information to the palm vein identification device, reads a palm vein image of a user to be certified, compares the palm vein image of the user to be certified with pre-stored palm vein data of an authorizer, and sends authorization information to the authorized terminal if the palm vein image of the user to be certified matches the pre-stored palm vein data of the authorizer; and the palm vein identification device responds to the authorization request information, acquires the palm vein image of the user to be certified, and processes and transmits the palm vein image to the authorized certification device. The system and the method stop the potential safety hazard in a conventional authorization and credit system, are simple in operation, have anti-denial performance and traceability because of the uniqueness and the non-replicability of palm vein information, do not need to perform any transformation on a conventional bank background service system, and can be integrated with other systems of a bank conveniently.
Owner:天公(山东)信息科技有限公司

Method for mobile electronic signature

The invention discloses a method for a mobile electronic signature. The method comprises the following steps that: a server sends a short message requesting an approval signature to a terminal; the terminal receives the approval signature short message and displays the content of the approval signature short message on a display screen; the terminal receives the approving content inputted by an approver; the terminal reads the data of the characteristic factor of the terminal, and works out the first encrypted data by taking the data and the approving content as variables of an encryption algorithm; the terminal answers and sends the first encrypted data and the approving content to the server; the server receives the first encrypted data and the approving content; the server reads the stored data of the characteristic factor, and works out the second encrypted data by taking the data and the approving content as variables of the encryption algorithm; and whether the first encrypted data and the second encrypted data are the same is judged, if so, the approval signature is confirmed and stored, otherwise the signature is the unapproved signature and neglected. The method has the advantages that the signature approver can give particular written instructions or assessments and examine the correctness of the approving content according to the content to be approved.
Owner:XIAMEN STELCOM INFORMATION & TECH

Mutual assistance type lock system adopting asymmetric encryption technology and control method of mutual assistance type lock system

The invention discloses a mutual assistance type lock system adopting an asymmetric encryption technology and a control method of the mutual assistance type lock system. The mutual assistance type lock system comprises a key generation device, a control panel, a key input device and one or more electromechanical locks, wherein the key generation device generates a locking key and an unlocking key in pairs; the control panel comprises a CPU (central processing unit) controller and an affiliated storage device thereof; the output end of the key input device is connected with the CPU controller; the CPU controller controls the electromechanical locks to be locked or unlocked; the electromechanical locks are arranged on various openable doors. According to the brand-new lock system provided by the invention, a set of lock can be locked and unlocked by one or more groups of different keys in pairs; in a pair of keys, one key is used for locking while the other key is used for unlocking, and a group comprises the two keys which are used in pairs; representation and carrier forms of the keys can be but not limited to cipher texts, bi-dimensional codes, keys, magnetic cards, IC (integrated circuit) cards and the like. By the flexible adoption of an asymmetric encryption algorithm, the mutual assistance type lock system has the characteristics of credibility, cracking prevention, repudiation prevention and the like and is safe and reliable.
Owner:吴俊杰

Mobile electronic signature-based trusteeship key use method and system, computer equipment and storage medium

The invention relates to the technical field of PKI (Public Key Infrastructure), in particular to a mobile electronic signature-based trusteeship key use method and system, computer equipment and a storage medium. The method comprises the following steps: a mobile electronic signature client applies for an institution certificate, hosts the institution certificate and a private key in cloud password equipment, generates user private keys, dispersedly stores the user private keys in the mobile electronic signature client and a cloud collaborative signature system, and applies for a personal certificate; the mobile electronic signature client requests an institution certificate or a private key to authorize and verify; the mobile electronic signature server performs authority verification on the individual user, processes the service data by using an institution certificate or a private key, and returns a result; and the service processing record is digitally signed and stored by using the private key of the individual user. According to the method, the cloud password service technology is adopted to carry out centralized management on the secret keys, digital signature storage is carried out on log records while password services are provided for authorized users, and it is guaranteed that behaviors of the authorized users are not repudiated while the security of the private keys is guaranteed.
Owner:福建瑞术信息科技有限公司

Pervasive-network-oriented remote identity authentication system and method

The invention discloses a pervasive-network-oriented remote identity authentication system and method. The system comprises a user terminal, a rear end system and a front end system connected with the rear end system, wherein an intelligent card is adopted in the user terminal, prestores with user certificate information, is paired with a private key and a public key and is used for issuing the public key to the rear end system in advance; the intelligent card mainly comprises a first central processing module, a user autonomous starting module, a first encrypting and deciphering module, a first modulating and demodulating module and a first audio processing module; the user autonomous starting module, the first encrypting and deciphering module and the first modulating and demodulating module are respectively and mutually communicated with the first central processing module; the first audio processing module and the first modulating and demodulating module are communicated with each other; and the front end system mainly comprises a second audio processing module, a second modulating and demodulating module, a first encrypting and deciphering module and a second central processing module. The pervasive-network-oriented remote identity authentication system and method disclosed by the invention have the advantages of low cost, simplicity for operation, high safety performance, strong universality and good reputation preventing property.
Owner:NINGBO JUHUAI ELECTRONICS TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products