Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

65results about How to "Simplify the authentication process" patented technology

Identification authentication method between peer-to-peer user nodes in P2P network

The invention provides a method for authenticating identification among peer-to-peer nodes in a P2P network. Each peer-to-peer node in the P2P network has a certificate which is acquired when a user node logs on the network through a certificate server, and the certificate comprises an encryption result of a private key of the certificate server to a public key of the user node. The method comprises the following steps: a first user node transmits an identification authentication message to a second user node in the network, wherein the identification authentication message comprises a certificate of the first user node and the public key of the first user node; a second user node authenticates identification of the first user node by the identification authentication message, after authentication succeeds, the identification authentication message is returned to the first user node, wherein the identification authentication message comprises a certificate of the second user node and the public key of the second user node; and the first user node authenticates the identification of the second user node by the identification authentication message returned by the second user node, and if the authentication succeeds, identification authentication between two user nodes succeeds.
Owner:INST OF COMPUTING TECH CHINESE ACAD OF SCI

Authentication method, terminal and server

The invention discloses an authentication method, terminal and server, and the method, terminal and server can reduce the manual participation degree of terminal equipment in an authentication process of an access network. The method is used in a system for the authentication through a safety secret key and a server. The method comprises the steps that first equipment transmits a first access request message to the server in a first time period, wherein the first equipment is equipment which does not hold a shared secret key; the first equipment receives a first authentication challenge message transmitted by the server based on the first access request message, wherein the first authentication challenge message carries authentication parameters, and the authentication parameters are used for generating a derived secret key; the first equipment transmits an authentication assurance request message to assurance equipment, wherein the authentication assurance request message comprises authentication parameters; the first equipment receives a first derived secret key transmitted by the assurance equipment based on the authentication assurance request message, wherein the first derived secret key is generated by the assurance equipment based on the first safety secret key and the authentication parameters; the first equipment transmits the first derived secret key to the server, so as to carry out the authentication with the server.
Owner:HUAWEI TECH CO LTD

Online charging engine, real-time charge off engine, and online charging method and system

The invention discloses an online charging engine, a real-time charge off engine, and an online charging method and system. The online charging method comprises the following steps: receiving an online charging request, obtaining current user state information corresponding to a terminal identifier of a terminal, and performing authentication on a service request according to the current user state information, wherein the current user state information is user state information after the online charging processing of the previous online charging request of the terminal is terminated, and an authentication result of the service request is sent to a service network element. By adoption of the online charging method, service authentication and real-time charge off are asynchronous processing procedures, the response period of the service authentication is shortened, the retention rate of the online charging flow of the user is improved, the working load of the online charging system on service peaks is reduced, and thus the technical problem of large working load of the online charging system on service peaks, relatively low retention rate of the online charging flow of the user and influence to the service perception of the user on the flow service in the prior art are solved.
Owner:CHINA MOBILE GROUP JILIN BRANCH

Internet of Things equipment safety communication system and method, networking equipment and server

The invention provides an Internet of Things equipment safety communication system and method, networking equipment and a server, which are used for achieving safe communication between the networkingequipment and the server in Internet of Things; the networking equipment comprises a login request unit, a first secret key calculation unit and a first communication unit, wherein the server comprises a login authentication unit, a login feedback unit and a second communication unit, wherein the login request unit is used for sending login request information; the login authentication unit is used for carrying out authentication on the login request information; the login feedback unit is used for generating login feedback information and a session key and sending the login feedback information to the networking equipment; the first secret key calculation unit is used for generating the session key; and the first communication unit and the second communication unit communicate through the session key. According to the Internet of Things equipment safety communication system and method, the networking equipment and the server, the session key is generated in a login authentication process, and safe communication of the Internet of Things equipment can be realized only by occupying a small amount of resources.
Owner:SHENZHEN INOVANCE TECH

Multi-application identity authentication system and method

The invention provides a multi-application identity authentication system and method. The multi-application identity authentication system comprises a client, an application terminal and a proxy service center, wherein the client establishes connection with the application terminal through the proxy service center; the client and the proxy service center respectively generate a public key pair anda private key pair; the client receives the proxy public key sent by the proxy service center; the client requests to log in a certain application terminal, encrypts the information packet by adopting the proxy public key, and sends the information packet to the proxy service center; the proxy service center decrypts the information packet by adopting the proxy private key, and sends the client public key to the corresponding application terminal; and the application terminal verifies the client public key and returns the authorization information to the client through the proxy service center according to a verification result. According to the multi-application identity authentication system, the standard specifications of the client, the proxy service center and the application terminal are formulated through the preset protocol, and the security mechanism is designed, so that the identity authentication of the client is simplified, and the security in the data transmission processis ensured.
Owner:北京思源理想控股集团有限公司

Intelligent access control system for transformer substations based on internet of things

The invention discloses an intelligent access control system for transformer substations based on the internet of things, belonging to the technical field of access control systems. The intelligent access control system comprises a database server and a switch, wherein the database server is connected with the switch through an Ethernet data transmission module; an access control identification subsystem, which is connected with the switch through an optical fiber data transmission module and comprises an RFID reader-writer, a fingerprint identification device, a face recognition device and aniris recognition device; an alarming module, which is separately connected with the RFID reader-writer and the fingerprint identification device through a data transmission module; and a mobile terminal and a sub-database, wherein the alarming module is separately connected with the mobile terminal and the sub-database through a wireless data transmission module. According to the invention, the identification process of the intelligent access control system is divided into four levels, so the process of staff identity authentication is simplified, and the safety of the access control system for transformer substations is enhanced.
Owner:安徽电科恒钛智能科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products