Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

94results about How to "Reduce certification time" patented technology

Fast authentication and access control system for mobile networking

A fast authentication and access control method of authenticating a network access device to a communications network having an access point communicating with a remote authentication (home AAA) server for the network access device. The method includes the step of receiving an access request having an authentication credential from the network access device at the access point. The authentication credential includes a security certificate having a public key for the network access device and an expiration time. The security certificate is signed with a private key for the remote authentication server. The access point locally validates the authentication credential by accessing the public key of the remote authentication server from a local database, and checking the signature and expiration time of the security certificate. If the authentication credential is validated at the access point, the access point grants the network access device conditional access to the network by sending an access granted message to the network access device. The access granted message includes a session key encrypted with a public key for the network access device. The session key is stored in a database associated with the access point. The access point contacts the remote authentication server to check a revocation status of the security certificate for the network access device. If the access point receives a message from the remote authentication server that the authentication credential for the network access device has been revoked, it suspends network access for the network access device.
Owner:AMERICAN TELEPHONE & TELEGRAPH CO

Fast authentication and access control method for mobile networking

A fast authentication and access control method of authenticating a network access device to a communications network having an access point communicating with a remote authentication (home AAA) server for the network access device. The method includes the step of receiving an access request having an authentication credential from the network access device at the access point. The authentication credential includes a security certificate having a public key for the network access device and an expiration time. The security certificate is signed with a private key for the remote authentication server. The access point locally validates the authentication credential by accessing the public key of the remote authentication server from a local database, and checking the signature and expiration time of the security certificate. If the authentication credential is validated at the access point, the access point grants the network access device conditional access to the network by sending an access granted message to the network access device. The access granted message includes a session key encrypted with a public key for the network access device. The session key is stored in a database associated with the access point. The access point contacts the remote authentication server to check a revocation status of the security certificate for the network access device. If the access point receives a message from the remote authentication server that the authentication credential for the network access device has been revoked, it suspends network access for the network access device.
Owner:AMERICAN TELEPHONE & TELEGRAPH CO

KPD (key position detection) authentication method and system for vehicle and smart key and vehicle base station

The invention provides a KPD (key position detection) authentication method and system for a vehicle and a smart key and a vehicle base station. The method comprises the following steps of: sending encrypted and coded identity authentication information to the smart key through low frequency so as to initiate identity authentication and starting a timer; when the time of the timer reaches set time, sending a low-frequency carrier wave to the smart key through low frequency so as to initiate position authentication; receiving authentication results sent by the smart key through high frequency, wherein the authentication results include an identity authentication result obtained in a manner that the smart key decrypts and decodes the identity authentication information and a measurement result obtained through measuring the field intensity of the low-frequency carrier wave; and judging whether the identity and position of the smart key are legal or not according to the identity authentication result and the measurement result, and executing related operations when the identity and position of the smart key are legal. The method, the system and the vehicle base station, provided by the invention, have the advantages that the time for KPD authentication is greatly shortened, the probability that unstable factors appear in a communication process is reduced, and the practicability of PEPS (Passive Entry & Push Start Systems) is enhanced.
Owner:天津经纬恒润科技有限公司

Copyright authentication method and device based on block chain, equipment and storage medium

The embodiment of the invention discloses a copyright authentication method, device and equipment based on a block chain and a storage medium. The copyright authentication method comprises the steps of obtaining a copyright authentication request through an information processing node; the information processing node performing user identity authentication according to the copyright authenticationrequest; the information processing node acquiring a digital work corresponding to the copyright authentication request when the user identity authentication is passed; the information processing node analyzing and determining the right of the digital work and the right-determined digital work to determine the original attribute of the digital work; and uploading the authentication right confirmation parameter of the digital work and the digital work through a copyright authentication node, authorizing a digital work copyright certificate for a user corresponding to the copyright authentication request, and carrying out evidence storage tracing on the digital work copyright certificate through an evidence storage tracing node. According to the scheme, the copyright authentication efficiency and safety can be improved.
Owner:TENCENT TECH (SHENZHEN) CO LTD

Security hybrid encryption method based on narrowband Internet of Things

The invention provides a security hybrid encryption method based on narrowband Internet of Things, which comprises the following steps of carrying out lightweight identity authentication on each terminal and a server, and realizing the identity authentication of the terminal and the transmission of an initial key and an initial IV vector by using unidirectional asymmetric encryption in the lightweight identity authentication, and after the identity authentication of the terminal succeeds, performing encryption communication between the terminal and the server by adopting a dynamic symmetric encryption and decryption algorithm, so that the symmetric encryption and decryption algorithm uses different symmetric keys and different structural parameters in each time of encryption communicationof each terminal. Lightweight identity recognition is adopted; on the basis of ensuring the security, the authentication time and the calculation consumption are greatly reduced, a dynamic symmetric encryption and decryption algorithm is adopted, a symmetric key and a set of structural parameters are ensured to be set at a time, the structural parameters of the algorithm are changed in a nonlinearmode under the condition that the large structure is not changed, and the capacity of the algorithm for resisting side channel attacks such as energy analysis is improved.
Owner:SHANGHAI INST OF MICROSYSTEM & INFORMATION TECH CHINESE ACAD OF SCI

PMIPv6 network bidirectional access authentication system and method based on classification identity signature

The invention provides a PMIPv6 network bidirectional access authentication system and method based on a classification identity signature. The system comprises a plurality of mobile access gateways, a plurality of local mobile anchors, a trusted third party server and a plurality of mobile nodes. The method comprises the steps that trusted channels are built through the mobile access gateways and the local mobile anchors corresponding to the mobile access gateways; system public parameters are generated by the trusted third party server and published; when the mobile nodes are in a home network, the trusted third party server distributes private keys to the local mobile anchors, and the local mobile anchors distribute private keys to the mobile nodes or the mobile access gateways; when a certain mobile node leaves the home network and has access to a certain mobile access gateway of a foreign network for the first time, bidirectional access authentication is carried out; the mobile nodes are in the current access foreign network, and authentication is switched when the current mobile access gateway is switched into another mobile access gateway. According to the system and method, message exchange between the mobile nodes having access between the foreign network and the home network can be eliminated, and the bidirectional access authentication of the mobile nodes and the mobile access gateways is achieved.
Owner:NORTHEASTERN UNIV

Intelligent medical assistance method and system based on IoV (Internet of Vehicles)

The invention belongs to the technical field of a transmission control procedure, such as a data chain level control procedure, and discloses an intelligent medical assistance method and system basedon the IoV (Internet of Vehicles). The intelligent medical assistance method based on the IoV comprises the steps that: an aggregate signature is used between a user and a trusted third party; user vehicle matching is carried out, and after receiving information, an authority carries out matching in a case that privacy can be protected with a vehicle registered in data of the authority; and the authority sends a rescue request to the vehicle by a broadcast encryption scheme. Verification between a patient and the authority is carried out in a mode of the aggregate signature; the authority carries out matching with the registered vehicle in a case of not leaking privacy of the patient by a matching algorithm; and the authority notifies the registered vehicle to carry out rescue in a broadcast encryption mode. According to the invention, the intelligent medical assistance method and system are developed on the basis of cryptography; the user can be checked anytime and anywhere and can berescued at the critical moment, and meanwhile, privacy safety of the user is ensured.
Owner:XIAN UNIV OF POSTS & TELECOMM

Fast authentication and access control system for mobile networking

A fast authentication and access control method of authenticating a network access device to a communications network having an access point communicating with a remote authentication (home AAA) server for the network access device. The method includes the step of receiving an access request having an authentication credential from the network access device at the access point. The authentication credential includes a security certificate having a public key for the network access device and an expiration time. The security certificate is signed with a private key for the remote authentication server. The access point locally validates the authentication credential by accessing the public key of the remote authentication server from a local database, and checking the signature and expiration time of the security certificate. If the authentication credential is validated at the access point, the access point grants the network access device conditional access to the network by sending an access granted message to the network access device. The access granted message includes a session key encrypted with a public key for the network access device. The session key is stored in a database associated with the access point. The access point contacts the remote authentication server to check a revocation status of the security certificate for the network access device. If the access point receives a message from the remote authentication server that the authentication credential for the network access device has been revoked, it suspends network access for the network access device.
Owner:AT & T INTPROP II LP

Identity authentication method, system and device and computer storage medium

ActiveCN111552942AReduce processing burdenReduce the likelihood of authentication failuresFinanceDigital data authenticationEngineeringAuthentication server
The invention discloses an identity authentication method, system and device and a computer storage medium, and belongs to the field of business processing, wherein the method comprises the followingsteps: forming a substrate; the authentication server receives an authentication detection request sent by the service server, according to a service identifier of a target service carried by the authentication detection request, determining N identity authentication modes configured by the target service from the service configuration information of the target service, at least one available identity authentication mode is determined from the N identity authentication modes, mode information of the at least one available identity authentication mode is sent to the authentication terminal through the service server, the authentication terminal displays an available authentication mode list, and the available authentication mode list comprises the at least one available identity authentication mode. That is to say, the authentication server performs availability detection on the identity authentication modes in a unified manner; unavailable authentication modes can be screened out; onlythe available authentication modes are presented to the user; the possibility of authentication failure is reduced; and the authentication time is saved.
Owner:BEIJING SANKUAI ONLINE TECH CO LTD

Three-dimensional garage for road parking

The invention discloses a three-dimensional garage for road parking. The vehicle garage entering and exiting can be directly realized on a traffic road while the traffic safety is ensured; the garage comprises a vehicle receiving and sending system, a rail system, an elevator system and a safety protection system, wherein the vehicle receiving and sending system comprises a vehicle carrying plate, a shielding part, a vehicle detection device and a parking space; the vehicle carrying plate is arranged in the garage and along the road; the elevator system is in butt joint with the vehicle receiving and sending system through the rail system; the rail system comprises a carrying rail, a steering device and a rail positioning device; the vehicle carrying plate does reciprocating movement between the elevator system and the parking space through being guided by the rail system; the safety protection system comprises a receiving and sending authentication system, a monitoring system and a warning system; the receiving and sending authentication system is used for verifying and authorizing the vehicle storing and taking behaviors; the vehicle detection device of the vehicle receiving and sending system detects the state of the vehicle entering the garage and the traffic conditions around the garage. The garage has the advantages that the vehicle garage entering and exiting can be carried out on the road.
Owner:FUJIAN AGRI & FORESTRY UNIV

Authentication method, micro base station and terminal

The invention discloses an authentication method, a micro base station and a terminal, and the method comprises the steps: responding to a connection request transmitted by the terminal, and obtaininga number identification of the terminal; splitting the generated authentication data into N pieces of authentication sub-data, transmitting the N pieces of authentication sub-data to a terminal by using N transmission channels, and sending a micro base station broadcast message to a blockchain network, the micro base station broadcast message comprising the authentication data, a number identifier and a blockchain identifier of a micro base station, and N being an integer greater than or equal to 2; in response to N encryption results returned by the terminal through the N transmission channels, adding the N encryption results to obtain a first verification encryption result, and transmitting the encryption result and the authentication sub-data corresponding to the encryption result through different transmission channels; and determining an authentication result of the terminal according to the first verification encryption result and the second verification encryption result, wherein the second verification encryption result is a result obtained by performing homomorphic encryption on the operator customer service password and the authentication data by the operator server obtained from the blockchain network.
Owner:CHINA UNITED NETWORK COMM GRP CO LTD

Beidou second-generation system anti-cheating method based on domestic password and spread spectrum information protection

The invention relates to the technical field of information security, and designs a beidou D2 navigation message anti-cheating scheme based on domestic passwords and spread spectrum information protection. In recent years, the Beidou navigation system serves as a new member of the GNSS, and the positioning principle of the Beidou navigation system is similar to that of the GPS. Signal parameters and information structures of civil signals are disclosed to the public through related files, so that a deception party can easily manufacture the deception signal and initiate a deception attack, thereby controlling a positioning result of a receiver and causing extremely serious consequences. According to the invention, domestic cryptographic algorithms (SM2, SM3 and SM4) are adopted to generateauthentication information, so that spoofing attacks are detected. In addition, the signature and other authentication information are subjected to information protection in a spread spectrum modulation mode, and therefore the authentication information is prevented from being tampered. According to the invention, a simulation experiment is carried out through MATLAB and OpenSSL platforms, and experiment results show that the method can resist spoofing attacks.
Owner:CIVIL AVIATION UNIV OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products