Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

39results about How to "Reduce interaction steps" patented technology

Virtual key mutual authentication system and method

The invention relates to the technical field of communication, in particular to a virtual key two-way authentication system and method. The system comprises a terminal, which is used for generating terminal authentication request information and sending it to the locked end for authentication. If the authentication passes, the generated terminal session key is sent to the locked end for authentication. If the authentication passes, the session key editing and unlocking instruction is sent to the locked end. The locked end is used for generating the authentication request information of the locked end and sending it to the terminal for authentication. If the authentication passes, the locked end session key is generated and sent to the terminal for authentication. If the authentication passes, the locked end session key is unlocked according to the unlocking instruction sent by the terminal. An offline communication module is used for transmitting information between the terminal and the locked end. The invention does not require on-line authentication of a third party when unlocking, but directly carries out information interaction between the terminal and the locked end, reduces the sensitivity of the whole system and the method to the network, and improves the safety and reliability in the use process.
Owner:北京信长城科技发展有限公司

Virtual key sharing system and method

The invention relates to the technical field of communications, in particular to a virtual key sharing system and method. The system comprises a user terminal, which is used for interacting with a target terminal and generating authentication information of the target terminal and authentication information of the user terminal. The target terminal is used for verifying the received authenticationinformation of the user terminal, generating a session key of the target terminal, and sending an unlocking instruction edited by the session key to the locked terminal. The locked end is used for verifying the received authentication information of the target terminal with the private key of the user terminal, generating a session key of the locked end, and unlocking according to an unlocking instruction sent by the target terminal. An offline communication module is used for transmitting information between the terminal and the locked end. The user terminal and the target terminal of the invention carry out authentication of the identity information through the interactive public key, and only if the authentication is successful, the target terminal can use the identity information of the user terminal to unlock the locked end, which has the advantages of simple structure, simple method and safe and convenient use.
Owner:北京信长城科技发展有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products