Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

88results about How to "Prevent brute force cracking" patented technology

Mobile terminal digital certificate electronic signature method

The invention relates to a mobile terminal digital certificate electronic signature method. According to the method, based on the characteristics of public keys and private keys and on the premise of not violating the rules prescribed by the electronic signature law, for example, a private key should be generated in a user terminal and should not leave the user terminal, a private key should not be transmitted via the network, and the like, a private key is discarded and locally and discretely stored after encryption, and the cloud uses strategies such as storing the public key and certificate to ensure that the private key is not locally cracked. In the transport layer, strategies such as double key and one-time pad are adopted to ensure that important information is not intercepted and decoded in network transmission. The identity of a certificate applicant is verified through the interface of an issuing bank, the user identity verification result of the bank counter is inherited, and therefore, remote online certificate issuing is realized in the system. The method not only can ensure that all the links of certificate applying, certificate issuing, certificate storing and certificate using are safe, but also can prevent hackers and Trojans from stealing certificate files, prevent network package-capture parsing, prevent password intercepting through screen capture and prevent an algorithm from being known through software decompiling.
Owner:BANKEYS TECH

Security authentication method for wireless network

The invention relates to a security authentication method for a wireless network. A wireless fidelity (WiFi) server and a client are involved, and the security authentication method comprises the following steps that: a, an authentication service program is deployed in the client, and the client is connected to a public open system of the WiFi server to acquire a corresponding internet protocol (IP) address; b, according to the IP address, the client acquires and accesses an IP address of a security authentication system of the WiFi server; c, the WiFi server authenticates a client certificate; d, the client which passes the authentication establishes first security connection with the WiFi server and acquires encryption parameters; e, the client establishes a second security connection with the security authentication system of the WiFi server according to the encryption parameters; and f, the client and the WiFi server communicate and are updated through the second security connection. By the security authentication method, the client and the WiFi server can be connected easily and quickly by using a complex key and a complex encryption way; and meanwhile, the security during connecting can be guaranteed by using a method of updating the key regularly to ensure that brute force-based cracking and possibility of key leakage are avoided.
Owner:成都飞鱼星科技股份有限公司

WiFi Internet surfing connecting authentication method and system based on asymmetric full-process encryption

The invention relates to a WiFi Internet surfing connecting authentication method based on asymmetric full-process encryption. The WiFi Internet surfing connecting authentication method includes the steps that a cloud authentication server defines an encryption access strategy for an access controller; the cloud authentication server issues the encryption access strategy to the assigned access controller based on the M-WAPI protocol; the access controller issues the encryption access strategy based on the M-WAPI protocol to a mobile terminal accessing the WiFi for the first time; the mobile terminal sends an encrypted authentication request to the cloud authentication server for authentication through the encryption access strategy, and if authentication is successful, the mobile terminal can access the Internet. The invention further discloses a WiFi Internet surfing connecting authentication system based on the asymmetric full-process encryption. By means of the asymmetric full-process encryption method and system, the mobile terminal can be rapidly connected to legal WiFi hot points, phishing, AP cheating, network hijacking, brute force attacking and the like can be effectively avoided, and it is guaranteed that users can safely use WiFi network resources without worries to protect sensitive information of the users from leakage and stealing.
Owner:HEFEI CITY COULD DATA CENT

Transaction information verification method and device

The invention provides a transaction information verification method and a transaction information verification device. The transaction information verification method comprises the following steps: receiving transaction information submitted by a user, and performing digital signature and encryption processing; transmitting encryption transaction information with a digital signature to an electronic bank server, verifying the digital signature and judging the legality of the transaction information through the electronic bank server, and after judging that the digital signature is qualified and the transaction information is legal, generating a transaction verification code according to the transaction information; receiving a transaction verification code and a server electronic signature fed back from the electronic bank server, and verifying the server electronic signature; after the verification is approved, prompting the user to input the verification code in a mode that button lamps are lightened or tuned off or the colors of the button lamps are changed through corresponding buttons according to the transaction verification code; judging whether the verification code input by the user through operation buttons is correct or not; after the verification code is correctly input, generating verification approval information, transmitting to the electronic bank server, and processing the transaction information through the electronic bank server according to the verification approval information, and completing the transaction.
Owner:INDUSTRIAL AND COMMERCIAL BANK OF CHINA

Picture password authentication method and picture password authentication device

InactiveCN106997432ATo prevent theftNo chance of being stolenDigital data authenticationTransmissionPasswordUser authentication
The invention discloses a picture password authentication method and a picture password authentication device. The picture password authentication method comprises the following steps that: initiating an authentication request, wherein the authentication request comprises unique identification related to a user; according to the unique identification, obtaining an authentication picture, and adding a plurality of pictures to form a picture group; requesting the user to select one picture; taking one picture selected by the user as a background picture, and in addition, forming a symbol matrix by alternative symbols during the generation of a picture password; enabling the user to move the symbol matrix in the background picture to move an authentication symbol to a position during the generation of the picture password; and determining whether the user selects a correct background picture or not, determining whether the authentication symbol is moved to the same position during the generation of the picture password or not, if the background pictures are correct, proving that user authentication is successful, and otherwise, proving that authentication fails. The authentication method and the authentication device of the invention are high in reliability, and are unlikely to generate the problems that the password is stolen and leaked and the like.
Owner:SECBOOT INFORMATION TECH CO LTD

Idle safety door lock

The invention discloses an idle safety door lock which comprises a front face plate assembly, a rear face plate assembly, a lock body and a transmission part. The front face plate assembly comprises a front base and a front lever handle arranged on the front base in a rotating manner. The rear face plate assembly comprises a rear base and a rear lever handle arranged on the rear base in a rotating manner. The transmission part is arranged on the front face plate assembly and / or the rear face plate assembly in a rotating manner. The transmission part is connected with the lock body. The front lever handle and the rear lever handle can drive the transmission part to rotate so as to control unlocking and locking action of the lock body when rotating. The front face plate assembly is provided with a lock cylinder. The front lever handle is connected with the transmission part through a clutch mechanism. The lock cylinder can switch the combination state and the separation state between the front lever handle and the transmission part through the clutch mechanism. According to the idle safety door lock, the situation that all parts of the door lock are loosened and damaged can be effectively avoided, the service life is prolonged, the violent cracking way of screwing the front lever forcibly to damage the front face plate assembly can be prevented, safety antitheft performance of the door lock is effectively improved, and use is facilitated.
Owner:胡淳龙

In-vehicle network safety communication sending and receiving method and device

The invention provides an in-vehicle network safety communication sending and receiving method and device. The method comprises the steps that a sending end generates a message authentication code according to original message data and a fresh value, and carries out the cutting of the message authentication code to obtain a message authentication code cutting value; and the message authenticationcode cutting value is embedded into the original message data based on the embedding position generated by the CAN ID and the fresh value, and the message authentication code cutting value is splicedwith the fresh value cutting value to obtain a to-be-sent message packet. The receiving end extracts a fresh value cutting value from the message packet, supplements the fresh value cutting value according to a first fresh value of a previous message recorded by the receiving end and a second fresh value of a counter of the receiving end to obtain a complete fresh value, calculates an embedded position according to the fresh value and the CAN ID, and extracts a first message authentication code cutting value and original message data; and a message authentication code is calculated according to the original message data and the fresh value, and cut to obtain a second cutting value for comparing and verifying the legality of the message. The method can effectively prevent the cutting valueof the message authentication code from being violently cracked, and prevent the threat of a replay attack.
Owner:BEIJING UNIV OF POSTS & TELECOMM

A login control method and device capable of preventing violent cracking

The invention discloses a login control method and device capable of preventing violent cracking. Violent cracking of a login authentication and authorization system is realized. According to the scheme of the invention, Continuous multiple login operations in the violent cracking process can be controlled based on authentication of all elevator shafts from the first to the Nth in the elevator; and finally, login operation of violent cracking can be limited or login of the violent cracking can be completely forbidden based on long limiting time required by the Nth elevator shaft. Therefore, violent cracking of the login authentication and authorization system can be effectively prevented by utilizing the scheme of the invention; In addition, relevant parameters for authenticating the elevator are configurable; a dynamic login attack prevention function is realized; Meanwhile, compared with a conventional verification mode based on a verification code, a verification picture and the like in the prior art, the method focuses on using an intelligent authentication means based on an authentication elevator at a system end to prevent attacks, a user does not need to execute complex interactive operation, the intelligent degree is high, and the user experience is effectively improved.
Owner:蓝卓数字科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products