Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication in ubiquitous environments

一种认证用户、认证信息的技术,应用在数字数据认证、安全通信的公共密钥、用户身份/权限验证等方向,达到防止伪造、强化信息保护的效果

Active Publication Date: 2020-09-25
崔云虎
View PDF14 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, the media often report examples of hackers hacking in the middle through deformation or forgery because they did not use account numbers, passwords, biometric information, tokens, OTP, and PKI authentication for multi-factor (Multi-Factor) authentication but used them separately.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication in ubiquitous environments
  • Authentication in ubiquitous environments
  • Authentication in ubiquitous environments

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] Embodiments of the present invention will be described in detail below with reference to the accompanying drawings. When marking reference signs, even if the same technical features appear in different drawings, the same reference signs are used as far as possible. At the same time, it should also be noted that throughout the specification, if it is believed that the specific description of related known technical features and functions may make the subject matter of the present invention unclear, the detailed description will be omitted.

[0041] In addition, terms such as first, second, A, B, (a), and (b) may be used in describing the constituent elements of the present invention. These terms are only used to distinguish the corresponding technical features from other technical features, not to limit their essence, order or sequence, etc. The expressions "comprising" or "having" described above, if there is no specific contrary record, mean that the constituent eleme...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the invention pre-store biometric information encrypted based on a public key certificate in all or held devices (such as smart cards, communication terminals and the like) of a user, and perform user authentication (first user authentication) through biometric matching inside the devices. Further, user authentication (secondary user authentication) for accepting a transaction or the like, which is performed on an application server, is performed by using a public key certificate matching the encrypted biometric information. Moreover, in order to enhance the security of the first / second user authentication, additional authentication elements, such as one-time password, keystroke, dynamic signature, position information and the like, are adopted in the embodiment of the invention. Furthermore, another embodiment of the invention adopts an authentication algorithm consisting of first authentication and second user authentication in the aspect of controlling the access of the Internet of Things equipment.

Description

[0001] This application is a divisional application of the application with the application number 201580016070.9, the application date is April 23, 2015, and the invention title is "Authentication in Ubiquitous Environment". technical field [0002] The present invention relates to user authentication and IoT device authentication in a ubiquitous environment including online / offline authentication. Background technique [0003] The content recorded in this part is only used to provide background information of the embodiments of the present invention, rather than to limit the present invention. [0004] Along with the development of the industry, the application of the Internet of Things (IoT) has been paid attention to. For example, smart TVs, vacuum cleaner robots, car navigation, and various remote services that provide cloud services as personal equipment, as well as remote management and control and traffic control of facilities such as reservoirs and nuclear power pla...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30H04L9/32H04L9/08
CPCH04L9/0866H04L9/30H04L9/3231H04L9/3234H04L9/3263H04L63/062H04L63/0823H04L63/0853H04L63/0861H04L63/0442H04W12/0433H04W12/041H04W12/069H04L9/0863H04L67/51G06F21/31H04W12/06
Inventor 崔云虎
Owner 崔云虎