Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

49results about How to "Prevent impersonation attacks" patented technology

An asymmetric group key negotiation method based on permissioninformation exchange

The invention provides an asymmetric group key negotiation method based on permission information exchange, which takes attributes of terminal members as right parameters, and each terminal member sends its attribute set and hash value signature of the attribute set to a key generation center. The key generation center verifies the signature of the attribute set hash column value of the terminal member. If the authentication is passed, the member obtains the right key parameter corresponding to the attribute; based on the sensitivity of the exchanged information, encrypting and broadcasting the information to be broadcast to the group members with the right key parameter corresponding to the specific attribute and the selected random key factor; a member with the access right of the sensitive information calculates a decryption key of the broadcast ciphertext information by using a key parameter corresponding to the access right, and obtains the corresponding plaintext information by decrypting the broadcast ciphertext through the decryption key, so as to realize the secret information sharing among the group members with the specific right. The invention can prevent unauthorized members from participating in group key negotiation and protect personal privacy.
Owner:ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY

Low-complexity identity authentication method based on intelligent card and under multiserver environment

The invention discloses a low-complexity identity authentication method based on an intelligent card and under a multiserver environment. The low-complexity identity authentication method comprises the steps of registering, logging and authentication, wherein the registering further comprises the steps that registering information of a user is converted by a registration center and the intelligent card and then is stored in the intelligent card; the logging further comprises the steps that the intelligent card carries out local legitimacy verification on the identity of the user, and if the identity of the user is legitimate, a random number is generated, and first verification data are generated and sent to a server; the authentication further comprises the steps that the server carries out the legitimacy verification on the identity of the user, and if the identity of the user is legitimate, second verification data are generated and sent to the intelligent card; the intelligent card carries out the legitimacy verification on the identity of the server, and if the identity of the server is legitimate, third verification data are generated and sent to the server; the server carries out secondary verification on the identity of the user, and if the identity of the user is legitimate, the server and the intelligent card generate the same session key. The low-complexity identity authentication method avoids intelligent card losing attacks and impersonation attacks.
Owner:SHANDONG UNIV OF SCI & TECH

Safety responsibility identifying method of video content for integration of three networks

The invention relates to a safety responsibility identifying method of video content for integration of three networks, and belongs to the field of computer information security. The method is designed by aiming at the problem that the video content is transmitted in an open network and interacts with a plurality of unreliable main bodies, and when illegal video content is transmitted, a responsible party cannot be determined. The method comprises the following steps of selecting a plurality of key frames of a video randomly in time dimension and dividing the frames into a plurality of groups according to numbers of the frames; in space dimension, dividing each key frame into a central area, a fringe area and a corner area and distributing different sampling rates for different areas; after cascading the sampling information of the key frames in the same group, performing bit commitment; in the transmission process, negotiating a confidential correspondence identifier by both parties, wherein the recipient determines whether the video content is falsified or not by verifying the confidential correspondence identifier and the bit commitment value. Once dispute occurs, a confidential comparison protocol is adopted between both parties to confidentially compare the bit commitment result so as to achieve responsibility confirmation.
Owner:COMMUNICATION UNIVERSITY OF CHINA

RFID (Radio Frequency Identification Device) safety method based on updating of dynamic ID (Identifier) and key of automobile security system

The invention discloses an RFID (Radio Frequency Identification Device) safety method based on updating of a dynamic ID (Identifier) and a key of an automobile security system and relates to the technical fields of network type automobile security systems and wireless communication. A network type automobile security system is mounted in a car; a reader-writer of a radio frequency identifying device is mounted at a door of the car; a user can have communication in a spatial wireless signal channel by holding an electronic label close to the reader-writer; a main control module is used for data processing; information interaction can be implemented by RFID security protocol identification with the dynamic ID and the key updating between the label and the reader-writer; if the label is legal, the label and the ID and the key of a background server are simultaneously updated, the door of the car is opened, and an ignition system of the car can be started; if the label is illegal, the ID and the key are not updated, the door of the car cannot be opened, and the ignition system of the car is in a closed state. The method disclosed by the invention can be used for guaranteeing accuracy and safety of the protocol.
Owner:JILIN UNIV

Living body detection method and apparatus based on active state of human eye region

The present invention discloses a living body detection method and apparatus based on an active state of a human eye region, and belongs to the computer application field. The method comprises: carrying out human eye detection on real-time video images according to a scale equalization algorithm, a human face detection algorithm and a human eye detection algorithm to obtain a human eye region; carrying out human eye tracking according to an LK tracking algorithm, the human eye region and the real-time video images to obtain human eye characteristic points and real-time coordinate information of the human eye characteristic points; after sending a random eye action instruction to a user, carrying out human eye tracking on the real-time video images according to the LK tracking algorithm, the human eye characteristic points and the real-time coordinate information of the human eye characteristic points to obtain a preset number of frames of real-time human eye regions; and determining whether the user is alive according to the living body detection method and the preset number of frames of real-time human eye regions. According to the living body detection method and apparatus provided by the present invention, by means of the human eye tracking and the random eye action instruction, the living body detection can be performed effectively, thereby preventing an attack caused by a faking video.
Owner:CHINA THREE GORGES UNIV

Human living body detection method and device based on human brain intelligence and man-machine interaction

The invention discloses a human living body detection method based on human brain intelligence and man-machine interaction. The human living body detection method comprises the following steps: randomly transferring an instruction subject which is pre-configured in an instruction database in advance, and randomly setting a response mode; acquiring user response information and verifying the response mode and a response result; and if the response mode and the response result of the instruction subject are matched successfully, judging that a response user is a human living body. According to the method, the subject is appointed randomly to enable the user to answer in regulated time by the randomly-appointed response mode, and the transmitted instruction subject can be answered through the brain thinking of the user, so that an impostor can not adopt manners such as pure voice and/or video synthesis or editing and the like to cheat a human living body detection system. According to the human living body detection method, lawless persons can be effectively prevented from carrying out impersonation attacks through various means, so that the human living body detection system becomes more effective and reliable.
Owner:GUANGDONG MICROPATTERN SOFTWARE CO LTD

Internet of vehicles communication security authentication method, system and equipment based on national cryptographic algorithm

The invention belongs to the technical field of Internet of Vehicles security, and discloses an Internet of Vehicles communication security authentication method, system and device based on a national cryptographic algorithm. The method comprises the following steps: a vehicle-mounted terminal constructs an identity authentication request message and sends the identity authentication request message to a roadside facility; the vehicle-mounted terminal receives the identity authentication response message and verifies the signature; if verification succeeds, the vehicle-mounted terminal calculates a session key and a hash value thereof, constructs a confirmation message and sends the confirmation message to the roadside facility; a session key and a hash value of the session key are calculated by the roadside facility for comparison verification; if the hash values are equal, the security authentication succeeds and a session key is generated, and if not, the security authentication fails. According to the method, the SM2 digital signature algorithm, the SM2 public key encryption algorithm and the SM3 hash algorithm are combined, so that the method can be applied to the communication process of the vehicle-mounted terminal and the roadside facility, and various attacks can be resisted with relatively low total computing resources and relatively low communication bandwidth.
Owner:NANJING UNIV OF SCI & TECH

RFID multi-tag joint authentication system and method based on Internet-of-Things application

ActiveCN113365270ARealize the authentication functionRealize practical needsSecurity arrangementInternet privacyCiphertext
The invention provides an RFID multi-label joint authentication system and method based on Internet-of-Things application. The method comprises the following steps: constructing a key sequence distribution function and a main control key, and setting a shared key of a reader and a label; constructing a first key sequence based on the sub-key, the shared key and a public key of the reader, and sending the first key sequence to the tag; enabling the reader to send a random number and an authentication request message, enabling the tag to construct a response message based on the random number sent by the reader, the random number of the tag and the sub-key, and encrypting and then returning the response message through the public key to the reader; enabling the reader to decrypt the ciphertext by using the private key and obtain the sub-key of the tag; judging whether the reader receives response messages sent by all the tags within a set time, if so, substituting the sub-keys of the tags into a key sequence distribution function, reconstructing to obtain a key value, and comparing the key value with a main control key, if the sub-keys of the tags are the same, indicating that all the tags participating in authentication pass the authentication, and otherwise, judging that the authentication fails; and therefore, achieving a multi-label joint authentication function.
Owner:深圳市科易博软件有限公司

Identity authentication method and system for 5G communication network

The invention relates to an identity authentication method and system for a 5G communication network. A security anchor function sends a first random number and a service identifier to the user equipment, the user equipment and the authentication credential storage and processing function module respectively select a second random number and a third random number, the freshness of the message is ensured by replacing a serial number (SQN) with the random numbers, and for synchronization failure, different failure messages do not need to be sent. Therefore, the possibility of tracking is avoided; when the user equipment encrypts the permanent identifier of the user, the shared key is directly used for encryption, so that some problems of computation overhead and public key infrastructure (PKI) are directly avoided; when the authentication credential storage and processing function module authenticates the user equipment, if the identity authentication information comes from an attacker,resource consumption can be avoided; and entities participating in authentication are mutually authenticated, so that counterfeit attacks are avoided, and the communication security is ensured. According to the invention, a user can carry out identity authentication safely and efficiently.
Owner:北京电信易通信息技术股份有限公司

Internet-of-vehicles RFID safety certificating method based on key distribution center

The invention provides an Internet-of-vehicles RFID safety certificating method based on a key distribution center. The method comprises the steps of a protocol process period, transmitting a generated rr to a label by a reader-and-writer, and transmitting the rr to a KDC; generating an rt by the label after receiving the rr, performing calculation according to formulae which are shown in the description, and transmitting a, rt and b to the reader-and-writer; transmitting a, rt and b to the KDC by the reader-and-writer; after the KDC receives a, rt and b, searching a value which matches a, ifthe value exists, authorizing legal of the label, generating an R by the KDC, and transmitting R, b, rr and rt to a background server; and if the value does not exist, authorizing illegal of the labeland stopping communication; after a background server receives the R, b, rr and rt, searching an ID value, after the legal label is authorized, performing calculation according to formulae which arerepresented in the description, and transmitting c and d to the reader-and-writer; after the illegal label is authorized, stopping communication; forwarding the c and the d to the label by the reader-and-writer, after the legal reader-and-writer is authorized, synchronously updating the key by the label according to a formula which is represented in the description, and otherwise, after the illegal reader-and-writer is authorized, stopping communication. The Internet-of-vehicles RFID safety certificating method can effectively prevent counterfeit attack, retransmission attack, tracking attackand DoS attack.
Owner:CHANGAN UNIV

Industrial RFID safety communication method

According to the industrial RFID security communication method provided by the invention, the whole-process encryption of tag registration, identity authentication and communication interaction is realized, and the problems that the password technology is immature and the autonomous controllable degree is low in industrial application of the RFID technology are solved. In the registration stage, the RFID tag and the server generate a symmetric key by adopting an SM2 key exchange protocol and generate a tag ID based on the key, the server ID is transmitted to the tag through a variable hash value, and the IDs of the two parties can be shared without direct transmission, so that tracking attacks are avoided; in the authentication stage, real ID transmission is replaced by bidirectional authentication and a variable hash value to avoid impersonation attack and man-in-the-middle attack; aiming at the characteristics of frequent authentication and less information amount in industrial application, an efficient SM4 symmetric encryption and decryption algorithm is used, and information to be encrypted is processed in registration and authentication stages to enable the length of the information to be encrypted not to exceed 128 bits, so that SM4 can be grouped in one time to complete work, and the encryption and decryption efficiency is improved; the symmetric key is updated in each authentication, so that the cracking difficulty is improved.
Owner:JINAN VOCATIONAL COLLEGE

Method, system and device for security authentication of Internet of Vehicles communication based on national secret algorithm

The invention belongs to the technical field of vehicle network security, and discloses a vehicle network communication security authentication method, system and equipment based on a national secret algorithm. The method of the present invention includes: the vehicle-mounted terminal constructs an identity authentication request message and sends it to the roadside facility; the vehicle-mounted terminal receives the identity authentication response message and verifies the signature; if the verification is successful, the vehicle-mounted terminal calculates the session key and its hash value and constructs a confirmation message to send To the roadside facility; it is used by the roadside facility to calculate the session key and its hash value for comparison and verification; if the hash values ​​are equal, the security authentication succeeds and a session key is generated; if they are not equal, the security authentication fails. The present invention combines SM2 digital signature algorithm, SM2 public key encryption algorithm and SM3 hash algorithm to ensure that the method can be applied to the communication process between vehicle-mounted terminals and roadside facilities, and can resist Various attacks.
Owner:NANJING UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products