Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

46 results about "Data Authentication Algorithm" patented technology

The Data Authentication Algorithm (DAA) is a former U.S. government standard for producing cryptographic message authentication codes. DAA is defined in FIPS PUB 113, which was withdrawn on September 1, 2008. The algorithm is not considered secure by today's standards.

Data encryption transmission method and system

The invention is applicable to the field of network communication, and provides a data encryption transmission method and system. The data encryption transmission method comprises the following steps: A. a server dynamically generates a DES (data encryption standard) key based on a data encryption algorithm (DEA), and encrypts the DES key by an RSA (Rivest, Shamir and Adleman) public key which is dynamically generated by a client side so as to generate an RSA encrypted ciphertext; B. the client side decrypts the received RSA encrypted ciphertext so as to obtain the DES key; and C. a message transferred between the server and the client side is compressed according to a ZLIB algorithm, and then the DES key encrypts the compressed message. The data encryption transmission method has the beneficial effects that the RSA and DES encryption algorithms are combined together, namely the message is encrypted according to the DES algorithm and meanwhile the DES key is encrypted according to the RSA algorithm so as to integrate the advantage of fast encryption and decryption speed of the DES algorithm and the advantage of high safety of the RSA algorithm; and meanwhile the message is compressed according to the ZLIB algorithm so as to realize safe and efficient data encryption transmission.
Owner:SHENZHEN SEG SCI NAVIGATIONS CO LTD

Service authentication method and authentication capability opening server

The invention discloses a service authentication method and an authentication capability opening server, and relates to the field of communication technology. An authentication capability of a service provider can be opened, and the burden in constructing an authentication system and developing real-name subscribers of the service side is reduced. The method comprises that after accessing a service, a terminal sends an authentication request with IMSI to the authentication capability opening server according to an address back fed by a service platform; the authentication capability open server obtains an authentication vector corresponding to the IMSI, and sends RAND and AUTH in the authentication vector to the terminal; according to the RAND, AUTH, an authentication algorithm and a secret key, the terminal determines a response RES, and sends the RES to the authentication capability opening server; the authentication capability opening server compares the received RES with an RES in the authentication vector, obtains an authentication result, and sends the authentication result to the service platform; and the service platform determines whether to provide service jump to the terminal according to the authentication result. The service authentication method and the authentication capability opening server are suitable for a service authentication process.
Owner:CHINA UNITED NETWORK COMM GRP CO LTD

Multi-target data association algorithm based on feature matching matrix

The invention belongs to the technical field of photoelectricity, and particularly relates to a multi-target data association algorithm based on a feature matching matrix. The algorithm includes the following steps that a current video sequence image is collected in the stationary state of shooting equipment; a target, closest to the center of a moving target at the moment of t-1, in the center of a jth moving area at the moment of t is calculated, and the closest matching distance is recorded as d (i, j); the intersecting area of a moving target at a t-1 frame and a moving target at a t frame is calculated, and if the intersecting area of a target at the moment t and a target in the current area is larger than a certain threshold, the intersecting area is recorded as s (i, j); when the center association distance and the area intersecting area are both larger than a certain threshold, an element R (i, j) of the matching matrix is set as 1; an association matching matrix is judged, and association tracking is performed on emerged new targets and an ideal tracking state through a centroid matching algorithm; when combination of the targets occurs, movement information and color information before combination of the targets are reserved respectively, and combination tracking of Kalman filtering and histogram fusion is performed. According the multi-target data association algorithm based on the feature matching matrix, multi-target data association under the condition of sheltering can be achieved.
Owner:中国航天科工集团第二研究院二〇七所

Identity authentication method and system, user terminal and website server

The invention discloses an identity authentication method and system, a user terminal and a website server, and relates to the technical field of electronic information. The method comprises the following steps: dynamically and associatively storing related information of a user identifier and an authentication rule provided by an authentication server on the side of the website server; receiving an authentication request carrying the user identifier and authentication information sent by the user terminal, wherein the authentication information is generated by the authentication server according to a website identifier and the user identifier provided by the user terminal; obtaining the authentication rule corresponding to the user identifier according to the user identifier; authenticating the authentication information; and finally returning an authentication result to the user terminal. According to the identity authentication method and system, the user terminal and the website server provided by the invention, the authentication server can dynamically change the authentication algorithm of the website server to a user, the potential safety hazard caused by the fixed presence of the algorithm between the authentication server and the website server is avoided, the security of the identity authentication system is improved, and the information security of the users and the websites is ensured.
Owner:JIANGSU PAYEGIS TECH CO LTD

Security authentication method combining multiple algorithms

The invention provides a security authentication method combining multiple algorithms. The method comprises the following steps: 1) an authentication party sends a random number to the authenticated party; 2) the authenticated party selects an authentication algorithm to be adopted in the present authentication from at least two pre-appointed authentication algorithms according to a pre-appointedselection algorithm, then calculates an authentication check value according to the selected authentication algorithm and a received random number, and sends the authentication check value to the authentication party; 3) the authentication party selects the authentication algorithm to be adopted in the present authentication from the at least two pre-appointed authentication algorithms according to the pre-appointed selection algorithm, then calculates the authentication check value according to the selected authentication algorithm and the random number in the step 1); and 4) the authentication party compares the locally calculated authentication check value with the received authentication check value from the authenticated party to judge the authentication result. By adoption of the security authentication method, the threat of the key being broken by violence can be effectively reduced.
Owner:GIESECKE & DEVRIENT (CHINA) INFORMATION TECH CO LTD

Data authentication system and data authentication method

The invention provides a data authentication system, which comprises a management server, at least one mirror image server and an authentication server, wherein the management server is used for receiving a first communication connection request, and transmitting a first digital certificate and a second digital certificate in the first communication connection request to the authentication server; the at least one mirror image server is used for receiving a second communication connection request, and transmitting the second digital certificate and the first digital certificate in the second communication connection request to the authentication server; the authentication server is used for judging whether the management server and the at least one mirror image server pass authentication or not, and if the management server and the at least one mirror image server pass the authentication, a communication connection is allowed to be established between the management server and the at least one mirror image server. The invention also provides a data authentication method. According to the technical scheme provided by the invention, the safety of patient information in the management server and the at least one mirror image server can be ensured, and therefore, the patient information in the management server and the at least one mirror image server is prevented from being illegally read, and illegal information is prevented from being written in the management server or the at least one mirror image server.
Owner:PKU HEALTHCARE IT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products