Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

41results about How to "Troubleshoot authentication issues" patented technology

Method and system for dynamically authenticating password by multi-password seed self-defined by user

The invention aims to disclose a system for dynamically authenticating a password by a multi-password seed self-defined by a user. The method and the system are implemented by user equipment, a server system, server password generation equipment, a registration method and an authentication method. A user inputs a primary password and a secondary password at the user equipment, performs conversion to obtain a password seed, and submits the password seed to a server for registration and binding. When authentication is required, the server obtains a current authentication time by a real time clock, displays the current authentication time on a user interface, and can obtain a current server password of the user by the password seed submitted in the registration of the user and the authentication time. The user inputs the primary and secondary passwords at the user equipment, the server displays the current authentication time, and the conversion is performed to obtain a user password. The user password is judged whether to be consistent with the server password by comparison, and then a user operation can be verified whether to be legal or not. By the authentication method and the authentication system, all authentication needs of online authentication, offline authentication and the like can be satisfied. By the method provided by the invention, not only the absolute privacy of password information set by the user can be ensured, but also the problem of middleman breach of confidence which cannot be solved by a conventional dynamic password system is solved; and when using a multi-authentication server, the user is not required to buy and carry a plurality of pieces of user dynamic password equipment, so the user cost is reduced.
Owner:陈祖石

Encryption method applied to MQTT-SN protocol

The invention relates to an encryption method applied to a MQTT-SN protocol, and relates to the field of communication. The method employs a harsh algorithm and ciphertext-policy attribute-based encryption method, so that a publishing terminal, an agent server and one or a plurality of subscription terminals can complete encrypted communication. The method herein includes the following steps: an agent server verifying the identity of a publishing/subscription terminal, performing registration of the publishing/subscription terminal, and generating a system common parameter; the publishing terminal encrypting a plaintext load by using the ciphertext-policy attribute-based encryption method; the publishing terminal transmitting the encrypted load to the agent server, the agent server forwarding the encrypted load to one or a plurality of subscription terminals; and the subscription terminal applying for a secrete key from the agent server, decrypting the encrypted load, obtaining a plaintext. According to the invention, the method can implement identity verification of a MQTT-SN protocol publishing/subscription terminal, data integrity verification, and data confidentiality protection, and better addresses the safety issues faced by the MQTT-SN protocol in terminals of wireless sensor network applications.
Owner:CHONGQING UNIV OF POSTS & TELECOMM

Access authentication method of terminals and access gateway

The invention discloses an access authentication method of terminals and an access gateway. The method includes the steps that an access request of each terminal is received by the access gateway, and each access request carries equipment identification of the corresponding terminal; authentication is conducted on each terminal according to the equipment identification of the terminal requiring for access by the access gateway; if the authentication is successful, the corresponding terminal is permitted to have access to the gateway, and if the authentication is not successful, the corresponding terminal is not permitted to have access to the gateway; whether the terminals corresponding to all the stored equipment identification have access to the gateway or not is judged by the access gateway, and if yes, a WIFI module of the access gateway enters a power saving module. According to the access authentication method of terminals and the access gateway, equipment identities of terminals are used as authentication identities, the authentication problem of the terminals is solved through simple operation, power consumption of the gateway is reduced, the service life of a battery of the gateway is prolonged, and operation complexity is greatly reduced as for the terminals.
Owner:CHINA UNITED NETWORK COMM GRP CO LTD

Safety certification device and method for user identity based on far and near field data interaction

The invention provides a safety certification device and method for the user identity based on far and near field data interaction, relates to the field of long and short range communication and data safety, and aims at solving the problem that the safety of long and short range data interaction is hard to ensure in the prior art; and the method can realize mobile payment, roaming free with virtual number and multi-number multi-channel network speed improvement via user identity based safety identification. A Micro-sd or U/SIM card integrated with certification function of the system is replaced to enhance the resistance to Trojan of a mobile phone and enable the intelligent mobile phone to serve as POS comprehensively; in near-field payment, a system server issues certification data to the mobile phone POS, the mobile phone POS transfers time-limited feedback certification data to the paying mobile phone, and the identity certification passes when returned data is the same with data of the server; in remote payment, the system carries out twice identification on the identity codes of user to prevent user data from being stolen remotely; and a set of safety guarantee flow for remote virtual number authentication is provided, so that roaming-free application of the virtual number and the network speed improvement of multiple virtual numbers and multiple carrier waves are realized.
Owner:熊文俊

Simulation platform and method based on IEEE802.1X security protocol of EAP

The invention provides a simulation platform based on the IEEE802.1X secure protocol of EAP as well as a method thereof, wherein, a wireless_lan_mac module in the original wireless node of OPNET is improved, and extended authentication modules are added including an EAP authentication module and a port control module, and the added parts and the wireless_lan_mac module are converged to add the function of security authentication successfully. The EAP authentication module is provided with an authenticator and an applicant communicating mutually to complete the security authentication, so the authentication process is presented completely, meanwhile, the complexity is not high and the simulation efficiency is rather good. The port control module is acquired through the equivalent transformation by a finite state machine of IEEE802.1X, the design correctness of a protocol model state machine is ensured, and the disorder among model versions is avoided. The invention realizes the simulation scene for roaming and re-authentication in different BSS of the wireless node, and solves the authentication problem of roaming access. The invention can ensure the integrity, non-repudiation and confidentiality of WLAN data, and can test other various realized wireless secure protocols and multimode access among various protocols on that basis.
Owner:XIDIAN UNIV

Tide-sensing river channel flood prevention and moisture prevention shoreline making method

The invention discloses a tide-sensing river channel flood prevention and moisture prevention shoreline making method, and belongs to the technical field of flood prevention and moisture prevention foundation water conservancy facilities. The method is based on actually measured river channel terrain and hydrology sediment materials, a river channel physical model and a mathematical model are established, the mathematical model comprises a two-dimensional mathematical model and a three-dimensional mathematical model, and the river channel physical model, the two-dimensional mathematical modeland the three-dimensional mathematical model are carrying out digital-to-analogue coupling; and according to hydrodynamic characteristics under different regional tidal currents and different workingconditions, water force of a river channel field, change rule of flow velocity gradient, distribution rule a water power curve, erosion and silting process of a riverbed and a form of ultimate erosionand silting are under the long-time action of the river flood and the outer sea boundary at different frequencies are achieved, and a shoreline conforming to a natural river tidal flooding intersection movement rule is formulated. The tide-sensing river channel flood prevention and moisture prevention shoreline making method has the advantages that the defect that in traditional shoreline making,the flood power function is considered independently and the long-term effect of the tidal power is ignored are broken through, and the adaptability of a combined action area river channel shorelineof a runoff and a tide is enhanced.
Owner:FUJIAN PROVINCIAL INVESTIGATION DESIGN & RES INST OF WATER CONSERVANCY & HYDROPOWER

Automatic teller machine based on face recognition on three sides

The invention relates to an automatic teller machine based on face recognition on three sides. The automatic teller machine is characterized by comprising a main machine, a camera group, a semitransparent customer operating room, a large touch screen, a light adjusting device, a face recognition device, an identity card reader, an identity card double-sided scanning device, a second-generation identity card reader, a second-generation identity card double-sided scanning device, two USB (universal serial bus) digital certificate interface, an online verification citizen identity information device, a cleaning towel device and a remote background service processing center; the automatic teller machine photographs a picture of a customer to be respectively checked with the picture on the identity card read by the identity card reader and the picture of the identity card returned by the online verification citizen identity information system, and the service can be carried out when the picture is successfully checked; the identity card is withdrawn if the picture checking is failed, the cleaning towel device is powered on, the customer is reminded of removing a helmet, a gauze mask and spectacles and having normal facial expression so as to repeatedly check; when the picture is still failed in the second checking and the customer still applies to the service, the host machine calls the remote background service processing center to process.
Owner:西安美达威网络科技有限公司

Method and system for user identity verification, and campus management system

The invention relates to a method and system for user identity verification, and a campus management system. The method comprises: a logging-in request is obtained at a preset area of a logging-in interface, wherein the logging-in request includes a user identifier and a user password; according to the logging-in request, whether the user has the logging-in permission is verified; if the verification is done successfully, an identifier selection interface is displayed and operation instructions or an operation instruction of a selected first identifier and / or a selected second identifier are / is obtained at the identifier selection interface; whether the selected first identifier and / or the selected second identifier match / matches the user identifier is determined; if so, preset access permission corresponding to the first identifier and / or the second identifier is provided. With the method, with different first identifiers and / or second identifier, the user can have multiple different identities; and the same user can carry out verification on several kinds of identities by one user identifier and the access permission corresponding to the first identifiers and the second identifiers of the different identities of the user are also provided. Therefore, identity verification of user having multiple different identities is realized.
Owner:HUNAN YIGU TECH DEV

Secret-containing beautification QR code authentication method

The invention discloses a secret-containing beautification QR code authentication method. The method comprises the following generation steps of binarizing an input background image to generate a reference QR code; according to an RS code, establishing a forward basis matrix, and generating a reverse basis matrix through a Gaussian Jordan elimination method; performing black and white turnover ona module with a high QR code priority by utilizing the forward and reverse basis matrixes to obtain a transient QR code image; judging a module attribute for brightness adjustment of a small check inthe module; adjusting module brightness and generating a beautification QR code image in combination with other two channels; and combining the beautification QR code with a digital watermark anti-counterfeit technology to generate a secret-containing beautification QR code. By adopting the beautification QR code, a tag carries a large amount of product information and the attractiveness of a package is improved; a digital watermark is added based on the beautification QR code, so that the anti-counterfeit performance of the QR code is enhanced; and the QR code is combined with the digital watermark anti-counterfeit technology, so that the anti-counterfeit performance is greatly improved.
Owner:绍兴聚量数据技术有限公司

Pollution discharge data secure transmission method and terminal and system

The invention discloses a pollution discharge data secure transmission method and terminal and a system. The method comprises the steps that a random number is obtained from a user card, and an encryption result K1 is obtained after the random number is encrypted based on a built-in secret key of the user card; an encryption result K2 is obtained after the random number is encrypted based on a built-in secret key of the secure transmission terminal; the encryption result K1 and the encryption result K2 are compared, and if K1 is equal to K2, the user card passes authentication. The system comprises a pollution discharge system and a total quantity control system. The pollution discharge system comprises an environment-friendly background system and the total quantity control system, and the total quantity control system comprises the pollution discharge data secure transmission terminal. According to the pollution discharge data secure transmission method and terminal and the system, pollution discharge data are encrypted and decrypted based on a pre-appointed built-in secret key through an SM1 algorithm in the transmission process, and security and confidentiality of the pollution discharge data in the storage and transmission process are guaranteed.
Owner:STATE GRID CORP OF CHINA +1

Smart power grid multi-dimensional multi-subset privacy protection data aggregation method based on block chain

The invention discloses a smart grid multi-dimensional multi-subset privacy protection data aggregation method based on a block chain. According to the method, each dimension of power consumption data in the system is divided into a plurality of subsets by using two super-increasing sequences, Horner rule and a Paillier encryption algorithm, so that multi-subset division of multi-dimensional power consumption data is realized; a control center not only can obtain the number of users in each subset in each dimension of power consumption data in the system, but also obtains the total power consumption of each subset in the power consumption data of each dimension, so that an electric power company can perform fine-grained analysis on the power consumption information on the basis of protecting the privacy of the power consumption data of the user, and the electric power company can effectively monitor and manage a power grid; therefore, the power demand can be better predicted and a reasonable gradient electricity price strategy can be formulated. In addition, by means of the block chain technology, the integrity and validity of the data can be conveniently verified, and the verification problem of a third party is well solved.
Owner:ZHEJIANG GONGSHANG UNIVERSITY

Method for terminal of Internet of Things to communicate with Internet host

The invention discloses a method for a terminal of the Internet of Things to communicate with an Internet host, for controlling and protecting various wireless devices in the Internet of Things of a wireless data collector. The method comprises the following content: the types of the wireless devices comprise wireless networking devices, wireless switches, wireless PDAs and wireless mobile phones. The wireless networking devices are in grid connection with other types of wireless devices for grid connected control, and the grid connection mode of the wireless devices comprises initial grid connection and re-grid connection; the communication structure of the Internet of Things employs motion type protection and timely reflects the situations about the wireless devices in the Internet of Things accessing into/breaking from the Internet of Things; and by means of wireless environment adjusting step type bandwidth switching, when a wireless environment is lower than a tolerance threshold, step type bandwidth is switched to a wireless environment with a better channel for transmission of the Internet of Things. According to the invention, the method for the terminal of the Internet of Things to communicate with the Internet host is established, and a user is provided with higher-quality support for the Internet of Things of the wireless data collector.
Owner:BEIJING LIHESHUNDA ELECTRONICS TECH

A self-service teller machine based on three-face recognition

The invention relates to an automatic teller machine based on face recognition on three sides. The automatic teller machine is characterized by comprising a main machine, a camera group, a semitransparent customer operating room, a large touch screen, a light adjusting device, a face recognition device, an identity card reader, an identity card double-sided scanning device, a second-generation identity card reader, a second-generation identity card double-sided scanning device, two USB (universal serial bus) digital certificate interface, an online verification citizen identity information device, a cleaning towel device and a remote background service processing center; the automatic teller machine photographs a picture of a customer to be respectively checked with the picture on the identity card read by the identity card reader and the picture of the identity card returned by the online verification citizen identity information system, and the service can be carried out when the picture is successfully checked; the identity card is withdrawn if the picture checking is failed, the cleaning towel device is powered on, the customer is reminded of removing a helmet, a gauze mask and spectacles and having normal facial expression so as to repeatedly check; when the picture is still failed in the second checking and the customer still applies to the service, the host machine calls the remote background service processing center to process.
Owner:西安美达威网络科技有限公司

Design method of tidal river flood control and tidal protection coastline

The invention discloses a tide-sensing river channel flood prevention and moisture prevention shoreline making method, and belongs to the technical field of flood prevention and moisture prevention foundation water conservancy facilities. The method is based on actually measured river channel terrain and hydrology sediment materials, a river channel physical model and a mathematical model are established, the mathematical model comprises a two-dimensional mathematical model and a three-dimensional mathematical model, and the river channel physical model, the two-dimensional mathematical modeland the three-dimensional mathematical model are carrying out digital-to-analogue coupling; and according to hydrodynamic characteristics under different regional tidal currents and different workingconditions, water force of a river channel field, change rule of flow velocity gradient, distribution rule a water power curve, erosion and silting process of a riverbed and a form of ultimate erosionand silting are under the long-time action of the river flood and the outer sea boundary at different frequencies are achieved, and a shoreline conforming to a natural river tidal flooding intersection movement rule is formulated. The tide-sensing river channel flood prevention and moisture prevention shoreline making method has the advantages that the defect that in traditional shoreline making,the flood power function is considered independently and the long-term effect of the tidal power is ignored are broken through, and the adaptability of a combined action area river channel shorelineof a runoff and a tide is enhanced.
Owner:FUJIAN PROVINCIAL INVESTIGATION DESIGN & RES INST OF WATER CONSERVANCY & HYDROPOWER

Method and system for dynamically authenticating password by multi-password seed self-defined by user

The invention aims to disclose a system for dynamically authenticating a password by a multi-password seed self-defined by a user. The method and the system are implemented by user equipment, a server system, server password generation equipment, a registration method and an authentication method. A user inputs a primary password and a secondary password at the user equipment, performs conversion to obtain a password seed, and submits the password seed to a server for registration and binding. When authentication is required, the server obtains a current authentication time by a real time clock, displays the current authentication time on a user interface, and can obtain a current server password of the user by the password seed submitted in the registration of the user and the authentication time. The user inputs the primary and secondary passwords at the user equipment, the server displays the current authentication time, and the conversion is performed to obtain a user password. The user password is judged whether to be consistent with the server password by comparison, and then a user operation can be verified whether to be legal or not. By the authentication method and the authentication system, all authentication needs of online authentication, offline authentication and the like can be satisfied. By the method provided by the invention, not only the absolute privacy of password information set by the user can be ensured, but also the problem of middleman breach of confidence which cannot be solved by a conventional dynamic password system is solved; and when using a multi-authentication server, the user is not required to buy and carry a plurality of pieces of user dynamic password equipment, so the user cost is reduced.
Owner:陈祖石

A third-party application authorization authentication method based on multi-domain collaborative architecture

ActiveCN107018128BSafe and reliable authorized accessTroubleshoot authentication issuesTransmissionThird partySoftware engineering
The invention belongs to the technical field of computer applications, and discloses a third-party application authorization and authentication method based on multi-domain collaborative architecture. Multi-domain collaborative layered architecture is adopted, and consists of a plurality of layers of domains; each domain consists of an Internet of things platform, sensor equipment and a third-party application; permission management and partition are performed on each domain in a layered way; each target domain administrator audits authorization information; after pass of auditing, a plurality of domains through which auditing information passes can be taken as a resource group; and a developer finishes developing work according to an authorization result. Through adoption of the third-party application authorization and authentication method for use among a plurality of domains of the layered architecture, safe and reliable authorization access between a platform and a third-party application is ensured, and a rapid and convenient channel is provided for data interaction between the platform and the third-party application. Compared with a conventional third-party application permission authentication method, the method has the advantage that the authentication problem between a platform permission administrator, a third-party application developer and a platform user in the multi-domain collaborative architecture is solved.
Owner:陕西沃傲信息科技有限公司

Simulation platform and method based on IEEE802.1X security protocol of EAP

The invention provides a simulation platform based on the IEEE802.1X secure protocol of EAP as well as a method thereof, wherein, a wireless_lan_mac module in the original wireless node of OPNET is improved, and extended authentication modules are added including an EAP authentication module and a port control module, and the added parts and the wireless_lan_mac module are converged to add the function of security authentication successfully. The EAP authentication module is provided with an authenticator and an applicant communicating mutually to complete the security authentication, so the authentication process is presented completely, meanwhile, the complexity is not high and the simulation efficiency is rather good. The port control module is acquired through the equivalent transformation by a finite state machine of IEEE802.1X, the design correctness of a protocol model state machine is ensured, and the disorder among model versions is avoided. The invention realizes the simulation scene for roaming and re-authentication in different BSS of the wireless node, and solves the authentication problem of roaming access. The invention can ensure the integrity, non-repudiation and confidentiality of WLAN data, and can test other various realized wireless secure protocols and multimode access among various protocols on that basis.
Owner:XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products