Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

171results about How to "Simplify the certification process" patented technology

Authentication method for invoking open interface and system

The embodiment of the invention discloses an authentication method for invoking an open interface and a system for executing the method. The method comprises the following steps: a service provision platform receives an interface invoking request of an application program transmitted by a server side or a client side, wherein the interface invoking parameters comprise application identification, a private secret key and valid time allocated by the server side for the interface invoking; the private secret key is allocated by the service provision platform when the server side is registered in the service provision platform; the client side logs in the server side, acquires authentication and acquires the interface invoking parameters from the server side; the service provision platform acquires the private secret key corresponding to the application identification from the pre-assigned parameter records, and authenticates the interface invoking request based on the acquired private secret key; if the authentication is successful, the corresponding interface invoking is permitted; or, the interface invoking request party is refused to invoke the corresponding interface. The authentication method can ensure the interface invoking security, the interface invoking process is simple, and the interface invoking efficiency is high.
Owner:CHINA TELECOM CORP LTD

Identification based integrated network terminal united access control method

The present invention relates to an all-in-one network terminal unifying accessing and controlling method based on the marks and is an electric figure communication processing method by utilizing the network. The present invention comprises a network which consists of a resting net and a movable net, a terminal, an accessing router and an authenticating center. The steps are as follows: the terminal unifies the define of the identity marks, the terminal unifies the registering process of the identity marks, the terminal unifies the accessing and controlling authentication process, the terminal movably switches the quick authentication processing process, the encrypting communication is between the terminal and the accessing exchanging router ASR. The method unifies the identity marks of heterogenous network terminals and provides a good premise to the accessing of the heterogenous network terminals. The effective authenticating method effectively solves the problem that the illegal users are unable to use the network by the accessing control of the network to the terminal. The simple authenticating process brings little time delay to the moving of the terminal and simultaneously processes the authentication and confirmation of the terminal. The communication between the terminal and the accessing exchanging router adopts an encrypting method so as to conquer the menace of the clone.
Owner:BEIJING JIAOTONG UNIV

Intelligent identity authentication system

InactiveCN107172049ASimplify the certification processGuarantee authentication securityTransmissionRisk levelRisk Control
The invention provides an intelligent identity authentication system. The intelligent identity authentication system comprises an authentication client SDK, an authentication server SDK, an authentication service proxy device, an authentication server, an authentication analysis engine and a cloud service platform, wherein the authentication client SDK is used for acquiring client information of authenticated users; the authentication server SDK is used for checking service strategies, and executing and forwarding information of an authentication client; the authentication service proxy device is used for providing a server reverse proxy when the authentication server SDK cannot implement an authentication function; the authentication server is used for managing the service strategies, authentication modes and cases, and displaying authentication analysis results; the authentication analysis engine is used for performing risk analysis based on a risk control model, wherein the risk analysis includes the steps of performing risk level scoring based on predefined rules and implementing big data analysis in combination with a big data analysis engine; and the cloud service platform dynamically adjusts identity authentication modes and requirements according to risk analysis results of the authentication server and the authentication analysis engine, performs identity authentication for the users, and returns an authentication result to the authentication analysis engine. According to the intelligent identity authentication system provided by the invention, an appropriate identity authentication mode can be selected for the users based on a risk analysis method.
Owner:北京信安世纪科技股份有限公司

Method of access authentication and recertification in home NodeB system of user terminal

The invention discloses methods of access authentication and recertification of a user terminal in a home NodeB system, mainly overcoming the defect that the existing standard does not provide an authentication method of the user terminal for accessing a core network through the home NodeB. The access authentication process comprises the following steps: firstly, simultaneously sending the identification of a user and the identification of the home NodeB to HNBHLR to inquire, judging according to whether the identification of the user exists in the CSG list of the home NodeB; and secondly, adopting the modified EAP-AKA protocol to perform authentication between the user terminal and a authentication server. The recertification process comprises the following steps: firstly, judging according to whether the identification of the user is as the same as the identification stored in the home NodeB network, and secondly, using a hierarchy secret key to modify the existing EAP-AKA recertification method to realize the mutual authentication between the user terminal and the authentication server. The methods of the invention has the advantages of simple processes, high efficiency, reliable performance, good safety and the like, thus being applicable to the access authentication and recertification of the user terminal in the home NodeB system.
Owner:XIDIAN UNIV

Imaging device based on vein pattern and backside pattern of finger and multimode identity authentication method

The invention discloses an imaging device based on vein pattern and backside pattern of a finger and a multimode identity authentication method, wherein the imaging device comprises an acquisition support on which a concave finger putting area is arranged; a visible light imaging device which is arranged at one side of the concave finger putting area of the acquisition support and used for acquiring the back picture of the finger; a near infrared imaging device which is arranged at the other side of the concave finger putting area of the acquisition support and opposite to the visible light imaging device, and used for acquiring the vein picture of the finger by the irradiation of a near infrared light supply; and the bar-shaped near infrared light supply which is arranged on the acquisition support and used for irradiating near infrared light to the finger from the side of the finger. The identity authentication method comprises a logon procedure and an authentication procedure, and the adopted biological features thereof comprise the backside pattern and vein pattern of the same finger. The invention also relates to identity authentication equipment comprising the imaging device, which has better anti-counterfeit performance, and can effectively improve the stability and applicability of a biometrics identification system.
Owner:SHENZHEN GRADUATE SCHOOL TSINGHUA UNIV

Data security authentication transmission method and device for Internet of Things terminal

ActiveCN112291230AImplement mutual authenticationImplement data encryptionUser identity/authority verificationInstrumentsKey (cryptography)Cryptographic protocol
The invention discloses a data security certification transmission method and device for an Internet of Things terminal. The method comprises the steps: presetting identification key pairs in a factory of an Internet of Things terminal, and presetting a corresponding public key matrix in an edge gateway; according to a preset identification key pair of the Internet of Things terminal and a presetpublic key matrix of the edge gateway, completing the bidirectional authentication of the Internet of Things terminal and the edge gateway, and acquiring a communication encryption/decryption key; andcompleting the encryption and decryption of transmission data between the Internet of Things terminal and the edge gateway by using the communication encryption/decryption key. And the problem that the traditional safety means is difficult to meet the Internet-of-Things scene is effectively solved. A key management system which is realized based on a public key cryptography technology and can beapplied to an Internet of Things terminal is constructed through a lightweight authentication system, online support of a third party is not needed, large-scale key generation is conveniently realized, the authentication efficiency is high, the authentication process is simple, a cryptographic protocol and a cryptographic module are realized on the basis of a national cryptographic algorithm, andthe interactive authentication and data encryption of the Internet of Things terminal are realized.
Owner:THE FIRST RES INST OF MIN OF PUBLIC SECURITY

Network access method and system

The invention discloses a network access method and a network access system. The network access method comprises the following steps: performing identity authentication on a network terminal based on a Radius protocol through an operator network BNG (broadband network gateway) and an AAA (authentication authorization accounting) server; in response to passing of the identity authentication, sending an identity authentication passing message for the network terminal to an access management unit of a cloud computing platform by the AAA server, so that when the network terminal logs in a virtual dual-stack host system of the cloud computing platform, the access management unit of the cloud computing platform can directly identify the network terminal according to the identity authentication passing message sent by the AAA server, and allows the network terminal to log in the virtual dual-stack host system. According to the technical scheme provided by the invention, secondary authentication on the network terminal caused by isolation between the BNG equipment of a network layer and the cloud computing platform of an application layer is avoided, the authentication flow of a user is simplified, and meanwhile, the user can conveniently access the internet through the virtual dual-stack host system provided by the cloud computing platform.
Owner:CHINA TELECOM CORP LTD

Method and system for logging in cloud desktop

The invention discloses a method and a system for logging in a cloud desktop. The method comprises steps of: receiving 4A account information input by a user on a 4A login page; when a cloud desktop login link is triggered, sending the 4A account information to a cloud desktop account management server so as to allow the cloud desktop account management server to authenticate the received 4A account information; storing the 4A account information of the user and corresponding cloud desktop access authority information on the cloud desktop account management server; if the authentication is passed, according to the 4A account information of the user and the corresponding cloud desktop access authority information, generating a cloud desktop list and sending the cloud desktop list to the cloud desktop server so as to send the cloud desktop list to the user; and the authentication is not passed, sending an authentication failure to the cloud desktop server so as to send a cloud desktop login failure to the user. According to the invention, by carrying out unified management and storage on the 4A account information of the user and the corresponding cloud desktop access authority information, the user is required to only input the 4A account information for authentication once when logging in the cloud desktop, so authentication processes are saved and use experience of the user is improved.
Owner:ULTRAPOWER SOFTWARE

Wireless local area network non-perception control method and system and readable storage medium

The invention relates to a wireless local area network non-perception control method and system and a readable storage medium. The method comprises the steps that a wireless gateway receives access request information; the wireless gateway generates MAC address query information according to the access request information; the MAC address query information is sent to a Portal server; the Portal server queries whether the MAC address information is recorded or not; and if the MAC address information is recorded, authentication success information is returned to the wireless gateway, and a wireless link of an access address is established. According to the invention, the authentication information is automatically authenticated in the secondary login process of the user; on one hand, the management level and the information security protection level of the wireless local area network are enhanced; on the other hand, the problem of non-perception authentication is solved through binding of AD domain accounts, so that the authentication process of the user is simplified, the use experience of the user is improved, a better wireless local area network service is provided for the user, and the user can use the wireless local area network service more conveniently, quickly and freely.
Owner:GUANGDONG URBAN & RURAL PLANNING & DESIGN INST

Authentication method and authentication equipment for implementing network access, and user equipment

The invention discloses an authentication method and authentication equipment for implementing network access, and user equipment, and belongs to the technical field of communication. The method is applied to the authentication equipment. The method comprises the steps as follows: the authentication equipment receives an authentication response message sent by the user equipment, wherein the authentication response message comprises first data, and the first data is the data acquired by the user equipment according to biological characteristic data of a target user; then the authentication equipment acquires second data from a server, wherein the second data is the data acquired by the server based on the biological characteristic data of the user; when the first data is the same as the second data, the authentication equipment generates an indication message that is used for indicating the user equipment that authentication is successful; and then the authentication equipment sends the indication message to the user equipment. According to the method and equipment provided by the invention, the problems that the authentication process of network access is relatively complex, the network is relatively poor in usability and the security is relative poor are solved, the authentication process of network access is simplified, and the network usability and security are improved.
Owner:HUAWEI TECH CO LTD

Identity authentication method, terminal and server

One or more embodiments of the present specification provide an identity authentication method, a terminal and a server. The terminal obtains a public key and a private key pair according to a deviceidentification number, generates a random number, and performs digital signature processing on the device identification number and the random number by using a private key to obtain signature data, and sends the device identification number, the random number and the signature data to a server, so that the server searches a public key corresponding to the terminal from a preset public key matrixaccording to the device identification number, verifies the signature data by using the searched public key, generates a communication key if the verification is passed, encrypts the communication keyby using the searched public key, obtains a ciphertext communication key, sends the ciphertext communication key to the terminal, receives a ciphertext communication key sent by the server, decryptsthe ciphertext communication key by using the private key to obtain a communication key, and performs secret communication with the server by using the communication key. According to the embodiment of the invention, identity authentication between the terminal and the server can be realized, and the authentication process is relatively simple.
Owner:国网思极网安科技(北京)有限公司 +4
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products