Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

32results about How to "Reduce certification costs" patented technology

Block chain-based method for accessing power Internet of Things terminal

The invention provides a Block chain-based method for accessing a power Internet of Things terminal, comprising the steps of: connecting a to-be-accessed power Internet of Things terminal to a masternode, and initiating an authentication request; the master node responding to the authentication request, and randomly selecting nodes that meet the condition of a threshold number from the block chain to form an authentication group; encrypting a public key G and an identity ID of the to-be-accessed power Internet of Things terminal by using a private key to obtain a digital signature ciphertextX, and sending the identity ID, a terminal public value R and the digital signature ciphertext X to the master node; the master node encapsulating and sending the authentication request information toa member node of the authentication group; the authentication group running PBFT consensus algorithm, and obtaining an authentication result by performing distributed authentication through two-two exchanging of the authentication information between the nodes of the authentication group; generating a new block in the block chain, and returning confirmation information to the to-be-accessed powerInternet of Things terminal; and the power Internet of Things terminal returning encrypted confirmation information to an access gateway. The block chain-based power Internet of Things terminal access method can improve the security and efficiency of authentication.
Owner:JIANGSU ELECTRIC POWER CO

Enterprise authentication and authentication tracing method, device and equipment based on block chain

ActiveCN110336797AThe certification process is transparentGuaranteed to be tamper-proofSecuring communicationTamper resistanceClient-side
One or more embodiments of the present specification provide an enterprise authentication and authentication tracing method, device and equipment based on block chain, the authentication method comprises: receiving an enterprise authentication request sent by a client, the enterprise authentication request comprising to-be-authenticated enterprise information, legal person identity information andauxiliary authentication information; authenticating the identity of the enterprise according to the enterprise information, and authenticating the identity of the enterprise legal person according to the legal person identity information and the auxiliary authentication information; and if the identity authentication of the enterprise is passed and the identity authentication of the enterprise legal person is passed, generating an enterprise authentication record, and writing the enterprise authentication record into the block chain. According to the embodiment of the invention, based on thetrusted execution environment of the block chain, the authentication process of the enterprise is transparent and visible in multiple directions, the credibility and notarization of the authentication process of the enterprise are realized, the authentication result is linked, and the tamper resistance and judicial effectiveness of the authentication result and the traceability of the authentication process of the enterprise are ensured.
Owner:ADVANCED NEW TECH CO LTD

Cloud security authentication method and authentication device

The invention provides a cloud security authentication method, comprising a cloud authentication step that an authentication device carries out signature through utilization of a device private key stored in the authentication device, thereby obtaining a device authentication data packet, the authentication device sends the device authentication data packet to the cloud, and a cloud receives the device authentication data packet and then carries out signature authentication on the device authentication data packet through utilization of a device public key stored in the cloud; and an authentication device authentication step that a cloud device carries out signature through unitization of a cloud private key stored in the cloud, thereby obtaining a cloud authentication data packet, the cloud sends the cloud authentication data packet to the authentication device, and the authentication device receives the cloud authentication data packet and then carries out signature authentication through utilization of a cloud public key stored in the authentication device. The invention also relates to the cloud security authentication device. According to the method and the device, the deviceauthentication security is improved, moreover, the authentication cost is low, and the hardware cost does not need to be increased.
Owner:HANGZHOU BROADLINK ELECTRONICS TECH

A cloud security fast distribution network method and distribution network system

The invention discloses a cloud safe and fast distribution network method and a distribution network system. The method comprises the following steps: an authentication device sends a distribution network request to a gateway, and the gateway forwards the distribution network request to a cloud end; the cloud end sends the cloud authentication data packet to the authentication device through the gateway according to the received distribution network request; the authentication device checks and signs the received cloud authentication data packets, verifies that the cloud authentication is legal according to the cloud authentication data packets, and sends the device authentication data packets to the cloud through the gateway after verifying that the cloud authentication is legal; the cloud end checks and signs the received equipment authentication data packets, and sends the network parameters to the authentication device through the gateway after verifying that the authentication device is legal according to the equipment authentication data packets; device authentication packets and cloud authentication packets are carried by WIFI management messages. The invention realizes two-way identity authentication, dynamic key authentication and extreme speed distribution network, greatly improves safety and convenience, and improves user experience.
Owner:HANGZHOU BROADLINK ELECTRONICS TECH

RH nitrogen-blowing alloying process capable of accurately controlling nitrogen content of nitrogen-containing steel grade

The invention discloses an RH nitrogen-blowing alloying process capable of accurately controlling the nitrogen content of a nitrogen-containing steel grade. The RH nitrogen-blowing alloying process capable of accurately controlling the nitrogen content of the nitrogen-containing steel grade comprises the following steps: desulfurized molten iron and scrap steel are smelted in a converter, oxygen is blown from the top, and nitrogen is blown from the bottom; LF refining and RH vacuum refining are sequentially carried out on molten steel, a mechanical pump vacuum system is adopted for RH, specifically, argon/nitrogen switching is carried out on RH circulation gas, the nitrogen flow is 90-150 Nm<3>/h, the nitrogen pressure is 1.0-1.8 Mpa, RH vacuum air-pumping is carried out, the pressure is reduced to 273 Pa or below from atmospheric pressure, and RH air-pumping lasts for 5-10 min; temperature measurement and sampling are carried out, and the chemical components and the nitrogen component content of the molten steel are analyzed; the component content of the molten steel is adjusted according to the sampling analysis result, the RH vacuum degree is adjusted to 4-15 kpa, nitrogen is rapidly increased in the molten steel, and the average nitrogen increasing amount is 3.0-3.50 ppm/min; and after the molten steel meets the technical requirements of the steel grade, the RH is finished, re-pressing is carried out, a steel ladle is opened for blowing argon from the bottom, and calcium treatment in a metal calcium feeding line is carried out. According to the invention, the nitrogen content fluctuation of the molten steel can be accurately controlled to be +/-5ppm, the technical requirements of the steel grade are met, the quality of the steel grade is ensured, and the production cost is reduced.
Owner:CHONGQING IRON & STEEL CO LTD

Distributed power transaction credible identity management method and system, and computer equipment

The invention belongs to the technical field of information security, and discloses a distributed power transaction credible identity management method and system, and computer equipment. The distributed power transaction credible identity management system comprises an identity registration module, a system role registration module, a voucher issuing module, a storage certificate creation module, a storage certificate verification module, a role updating module and a voucher updating module. Based on the blockchain, distributed identity identification, verifiable declaration, zero-knowledge proof and other technologies, autonomous control of entity (human, machine and object) identities in a distributed scene is achieved, identity security authentication, authorization and data exchange in a privacy protection state are achieved, and a brand-new, safe and efficient distributed authentication system is provided. Meanwhile, the system provides the capabilities of autonomous identity management, agile access, privacy authentication and the like of the distributed heterogeneous entity, the authentication mode is convenient, and the authentication cost is low.
Owner:INFORMATION COMM COMPANY STATE GRID SHANDONG ELECTRIC POWER +2

Blockchain-based enterprise certification, certification traceability method, device and equipment

ActiveCN110336797BThe certification process is transparentGuaranteed to be tamper-proofSecuring communicationInternet privacyBusiness enterprise
One or more embodiments of this specification provide a blockchain-based enterprise authentication, authentication traceability method, device, and equipment, wherein the authentication method includes: receiving an enterprise authentication request sent by a client, wherein the enterprise authentication request includes The enterprise information, legal person identity information and auxiliary authentication information; the identity of the enterprise is authenticated according to the enterprise information, and the identity of the enterprise legal person is authenticated according to the legal person identity information and auxiliary authentication information; if the identity authentication of the enterprise passes and the identity of the enterprise legal person If the authentication is passed, an enterprise authentication record is generated, and the enterprise authentication record is written into the blockchain. Through this embodiment, based on the trusted execution environment of the blockchain, not only the enterprise's authentication process is transparent and visible to multiple parties, but also the enterprise's authentication process is credible and notarizable, and the authentication result is uploaded to the chain to ensure that the authentication result cannot be tampered with. and judicial effectiveness, as well as the traceability of the enterprise certification process.
Owner:ADVANCED NEW TECH CO LTD

Data existence authentication system, authentication method and verification method

The invention provides a data existence authentication system, a data existence authentication method and a data existence verification method. The authentication method comprises the steps of obtaining hash values of target data, and storing the hash values; generating at least one Merkel tree according to the hash values, and storing tree roots of the Merkel tree in block chains of a predetermined block chain network through trading; and generating receipts corresponding to the target data respectively, wherein the receipts comprise corresponding target hash values, corresponding tree roots and paths of the Merkel tree, and trading data storage paths, and the paths comprise the hash values sequentially paired with the target hash values to finally generate the tree roots. According to the data existence authentication system, the data existence authentication method and the data existence verification method, the authentication of the existence of the target data in the trading time can be realized through the trading without depending on an authentication mechanism by utilizing characteristics of the Merkel tree and a characteristic that data in the block chains cannot be rewritten, the trading only needs to store the tree roots in the block chains, and the authentication of batch data can be finished by one-time trading, so that the authentication cost is greatly reduced.
Owner:BEIJING ZHONGXIANG BIT TECH

Device authentication method, device, authentication device, drone, and remote controller

The present invention provides a method and device for device authentication, an authentication device, an unmanned aerial vehicle and a remote controller. The method comprises: the authentication device sends authentication data to the unmanned aerial vehicle so that the unmanned aerial vehicle forwards the authentication data to the remote controller, the authentication data being used for enabling the remote controller to encrypt the authentication data using a key contained in an encryption authentication chip to obtain an operation result, wherein the remote controller is embedded with the encryption authentication chip; the authentication device receives the operation result forwarded by the remote controller via the unmanned aerial vehicle; and the authentication device determines that it is possible to communicate with the unmanned aerial vehicle when determining that the operation result is correct. Through the remote authentication mode, the authentication device can realize authentication of the unmanned aerial vehicle and the remote controller only by using the encryption authentication chip embedded in the remote controller, thus saving the cost of authentication, and improving the efficiency of authentication processing.
Owner:SZ DJI TECH CO LTD

An identity authentication system and authentication method based on cross-network transmission and ctid network certificate authentication

The invention relates to an identity authentication system and authentication method based on cross-network transmission and CTID network certificate authentication, comprising: receiving an authentication request sent by a user, and querying whether there is the user information by calling a desensitization authentication library; if the desensitization authentication library queries If there is no such user information, the authentication request will be sent to the public security network system for authentication, and the authentication result will be returned through the public security network system. If the desensitization authentication database queries the information of this person, the authentication request will be sent to the intranet authentication through the cross-network communication channel Center, the internal network authentication center calls the core sensitive database data, and obtains the authentication result through the comparison of the face recognition engine, and then returns the authentication result to the Internet authentication center through the cross-network communication channel, and sends it to the Internet industry application; if the authentication is passed, then Store the relevant authentication data in the desensitization authentication database, otherwise the authentication ends. The present invention provides credible identity authentication services for intranet and intranet industry applications under the condition of ensuring the security of sensitive data on the intranet. The method is simple and can reduce a large amount of authentication costs.
Owner:ANHUI JIYUAN SOFTWARE CO LTD +1

Authentication method, equipment and system

ActiveCN102333081BSolve the connection bottleneck problemFacilitated releaseTransmissionMultiplexingConnection number
The invention provides an authentication method, equipment and system. The method comprises the following steps: the authentication equipment intercepts an authentication connection establishing request of a user terminal and acquires a target TCP (Transmission Control Principle) multiplexing connection according to the authentication connection establishing request; the authentication equipment transmits the intercepted authentication request information of the user terminal to an authentication server through the target TCP multiplexing connection, receives an authentication response page returned by the authentication server through the target TCP multiplexing connection and forwards the authentication response page to the user terminal; the user terminal carries out integrity detection on the authentication response page according to an integrity detection instruction in the authentication response interface and transmits a page keep-alive instruction to the authentication server when a detection result indicates the authentication response page is integral; and the authentication equipment releases the occupancy of the user terminal to the target TCP multiplexing connection according to the monitored page keep-alive instruction. According to the technical scheme disclosed by the invention, the problem of connection number bottleneck faced by the authentication server in the prior art is solved, and the network operation cost and the authentication cost are reduced.
Owner:BEIJING XINWANG RUIJIE NETWORK TECH CO LTD

Payment terminal capable of realization of splittable combination of secure payment and mobile payment and payment method thereof

The invention discloses a payment terminal capable of realization of splittable combination of secure payment and mobile payment and a payment method thereof. The payment terminal comprises two modules: a secure payment module and a mobile payment module, wherein the two modules are encapsulated respectively and independently and then are connected. More specifically, the secure payment module comprises a keyboard, a display screen, a magnetic card reader, an IC card read-write device, and a printed circuit board; and the mobile payment module consists of a keyboard, a main display screen, a non-contact IC card read-write device, a wireless communication module, a printing module, a telephone module and a printed circuit board. Moreover, the secure payment module and the mobile payment module are provided with identification communication modules; the secure payment module can be connected to an existing mobile payment terminal; and the mobile payment module can be connected to a financial POS machine. According to the invention, security certification is only required by the secure payment module; not only can the secure payment module and the mobile payment module be used in combination in an on-line mode, but also the secure payment module can be used separately in combination with an existing mobile payment terminal in an on-line mode and the mobile payment module can be used separately in combination with an existing financial POS machine in an on-line mode.
Owner:FUJIAN NEWLAND PAYMENT TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products