Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for authentication

An authentication system and authentication equipment technology, applied in the field of security applications, can solve security issues and other issues

Inactive Publication Date: 2016-10-26
邵军利
View PDF8 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention is to solve the complete security problem of the intelligent terminal equipment as the authentication equipment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for authentication
  • Method and system for authentication
  • Method and system for authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] According to the present invention, the security authentication of the intelligent terminal equipment is completed through the main control equipment storing authentication information such as ID, ID key, ID authentication key, and knowledge, which improves the security problem of the intelligent terminal equipment as the authentication equipment.

[0032] The technical solutions of the present invention will be described in further detail below with reference to the accompanying drawings and embodiments.

[0033] figure 1 The application scenario diagram provided for the embodiment of the present invention. Such as figure 1 As shown, the main control device is an electronic lock or a car lock; the authentication device is a third-party application program (Application, APP) on a smart phone or a tablet.

[0034] If the known information is pre-set on the smart phone, the use of the first external input information and the second external input information is controll...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method and system for authentication. The method for the authentication comprises the steps that a registration request is initiated to main control equipment, wherein the registration request comprises first external input information; the main control equipment can register authentication equipment according to the first external input information and can send data characteristic information to the authentication equipment, wherein the data characteristic information comprises an ID authentication secret key, an ID and an ID secret key; an authentication request is sent to the main control equipment according to the received data characteristic information, so that the main control equipment can send first information; the ID secret key is used for first encryption of the first information and second external input information, second information is generated, the ID authentication secret key is used for second encryption of the second information, and encrypted data is generated, so that the main control equipment can authenticate the authentication equipment according to the second information and the encrypted data; and a result about legality of the authentication equipment sent by the main control equipment is received. The method and the system provided by the invention enhance safety of an intelligent terminal which is taken as the authentication equipment.

Description

technical field [0001] The present invention relates to the field of security applications, in particular to an authentication method and system. Background technique [0002] Smart terminal devices refer to multimedia devices that support audio, video, data, and other functions. [0003] The more common smart terminal devices now include smartphones, tablets, PCs, etc.; because the system of smart terminal devices is open, when using the hardware of smart terminal devices as security authentication, it is necessary to have enhanced security processing in order to Based on the limited trust of smart terminal equipment, it is necessary to realize high-intensity security applications. [0004] Generally, when closed and independent hardware is used as a security authentication device, such as an IC card and a wristband, its security is safe in all links of use and maintenance, and there are no loopholes. [0005] The present invention is to solve the complete security proble...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/44
CPCG06F21/44
Inventor 邵军利
Owner 邵军利