Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Computer-implemented method and system for securely identifying disconnected objects and their location

A technology of disconnection and safe identification, which is applied in the direction of safety devices, safety communication devices, transmission systems, etc., and can solve problems such as system exposure

Pending Publication Date: 2022-04-29
FOODEA LAB SRL
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Conversely, the user experience and battery consumption of a disconnected device improves over time, exposing the system to security vulnerabilities

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer-implemented method and system for securely identifying disconnected objects and their location
  • Computer-implemented method and system for securely identifying disconnected objects and their location
  • Computer-implemented method and system for securely identifying disconnected objects and their location

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0078] Generally speaking, the present disclosure describes a computer-implemented method and system for identifying and authenticating a device to a central system using one-time password (OTP), especially using a one-time-based graphic code (preferably a two-dimensional code or similar code). The computer-implemented method can identify the device and locate the device in a specific place.

[0079] The device is configured to generate a one-time-based graphic code that at least partially includes device attributes. Attributes of devices can include, but are not limited to, hardware feature ID or system attributes, device settings (both software and hardware).

[0080] Generally speaking, device attributes are usually device-specific and cannot be copied on another device.

[0081] The system according to the present invention includes a device, a central system, and a mobile device. The device is physically connected to an object in a precise location or is usually placed in a s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A computer-implemented method for securely identifying a device associated with a particular location allowing a user to activate a program connected to the particular location in which the device is located, said device being disconnected from the Internet, said method comprising the steps of: a registration procedure performed by an application running on a mobile device, in the registration process, equipment hardware parameters are associated with the specific position, and the data are recorded and stored on a back-end application program running on a central system; a generation process executed on the device, the generation process generating and displaying an OTP-based graphic code having a limited lifetime on the device; a verification process of the OTP-based graphic code; if the received OTP-based graphic code passes the verification, the user is allowed to activate a program connected to the particular location through its mobile device.

Description

Technical field [0001] The invention relates to a computer-implemented method and system for securely identifying disconnected objects and their positions based on graphic (or multidimensional) codes realized by OTP technology. technical background [0002] One-time based,OTP (OTP) technology is well known for securely authenticating digital identities to access servers or private networks in general. There are technologies for providing access to a private network through a public network and for providing secure and encrypted message and data transmission between a user's computing device and the private network through the public network. [0003] The private network can be configured to prevent unauthorized users from accessing the private network and only allow authorized users to access the private network and / or information stored in the private network. Identifying such authorized users usually depends on verifying the user's identity, that is, authenticating the user to ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/40H04W12/61H04W12/63H04W12/77G06F21/36G06F21/44
CPCH04L9/3228G06F21/36H04L63/0838H04W12/61H04L63/0807H04W12/77G06F21/44H04L63/108H04L63/107H04W12/63G06F2221/2151H04L63/0428
Inventor A·科尔桑托F·梅伦
Owner FOODEA LAB SRL
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products