User authorization authentication system and device based on key generation algorithm

A user authorization and authentication system technology, applied in the field of public and private key user authorization authentication of cryptography, can solve the problem of low security performance of the user authorization authentication system, achieve the effect of preventing illegal login and ensuring security

Pending Publication Date: 2022-07-29
江苏林谷智能科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of the present invention is to provide a user authorization authentication system and device based on a key generation algorithm, which has the advantages of high security performance and solves the problem of low security performance of a user authorization authentication system based on a key generation algorithm

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User authorization authentication system and device based on key generation algorithm
  • User authorization authentication system and device based on key generation algorithm
  • User authorization authentication system and device based on key generation algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0038] In the description of the invention, it should be noted that the terms "upper", "lower", "inner", "outer", "front end", "rear end", "two ends", "one end", "the other end", etc. The indicated orientation or positional relationship is based on the orientation or positional relationship shown in the accompanying drawings, which is only for the convenience of describing the present invention and simplifying the description, rather ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a user authorization authentication system and device based on a key generation algorithm, and the system comprises a housing, the two sides of the bottom of an inner cavity of the housing are fixedly connected with vertical plates, and the opposite sides of the vertical plates are fixedly connected with a supporting plate. The system comprises a shell, a vertical plate, a supporting plate, a moving rod, a fixed plate, a spring, a base plate, a server, a clamping plate, a clamping groove, a clamping block, a connecting plate, a supporting block, a top plate, a fan, an exhaust plate, a dust collection box, a material cleaning door, meshes, a bearing plate, a bottom plate, a service gateway module, an input module, a user center module, a central processing module, a data setting module, a server public key module and an authentication center module. Through cooperation of the server private key module, the data storage module, the data clearing module and the timing module, the user authorization authentication system based on the key generation algorithm can log in a server or a cloud through a wireless network, illegal login is prevented, and the security of the system can be effectively ensured.

Description

technical field [0001] The invention relates to the technical field of public and private key user authorization authentication in cryptography, in particular to a user authorization authentication system and device based on a key generation algorithm. Background technique [0002] With the rapid development of the Internet, new Internet technologies such as cloud computing, smart home and smart buildings are increasingly known and accepted. Among them, cloud computing solutions are more and more popular due to their advantages of high scalability, low cost, and convenient operation and maintenance. More and more enterprises have adopted it. Under the background of the Internet with the large-scale popularization of cloud computing technology, the underground black industry chain has also been continuously developed and improved with the Internet tide. Therefore, the technical reliability of cloud computing suppliers and the security of cloud computing services have also beco...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W12/069H04W12/041H04L9/32H04L9/40H04L9/08H05K7/14B08B15/04
CPCH04W12/068H04W12/069H04W12/041H04L9/0861H04L9/3247H04L9/3268H04L63/083H05K7/14B08B15/04H04L2209/12H04L2209/80
Inventor 夏云
Owner 江苏林谷智能科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products