Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

61 results about "Hardware authentication" patented technology

The term "hardware authentication" refers to a security system that uses a hardware device to grant access to users. Hardware authentication is used most commonly for computer systems and networks to protect sensitive data.

Identity authentication method, equipment and system

InactiveCN105991281AFree yourself from the dilemma of remembering complex passwordsImprove experienceUser identity/authority verificationPasswordHardware authentication
The invention discloses an identity authentication method, equipment and system. The identity authentication method comprises the steps: user characteristic analysis equipment receives a user characteristic query request which is sent from a server when the server determines that the user name and the password of a login user are matched with the reserved user name and password of the login user, wherein the user characteristic query request carries the user behavior characteristic information of the login user; and the user characteristic analysis equipment matches the carried user behavior characteristic information of the login user with the reserved user behavior characteristic information of the login user so as to return an authentication response message to the server according to the matching degree between the carried user behavior characteristic information of the login user and the reserved user behavior characteristic information of the login user. In other words, for the scheme of the identity authentication method, equipment and system, based on traditional user-name+password authentication, the user behavior characteristic information is introduced to perform further authentication on the user identity, so that the dilemma of memorizing complicated passwords for the user is avoided; the difficulty in managing the passwords by the user is reduced; and the account number safety is improved. Besides, relative to the traditional authentication mode which requires hardware authentication equipment and the like, the scheme of the identity authentication method, equipment and system also has the advantage of reducing the identity authentication cost.
Owner:CHINA MOBILE COMM GRP CO LTD

Method and system for authenticating two-way hardware

The invention relates a method for authenticating two-way hardware. The method comprises the following steps of: storing a computer mark number, a platform fingerprint, a platform fingerprint production certificate signature, and an address of a content server in a data block of a basic input/output system; extracting the address of the content server in the data block of the basic input/output system, and sending the address to a computer; building a connection between the computer and the content server according to the address of the content server; extracting a computer platform fingerprint, and verifying that the computer platform fingerprint is consistent with the platform fingerprint stored in the data block of the basic input/output system; and submitting the platform fingerprint production certificate signature to the content server to verify a production certificate; confirming that the data block of the basic input/output system is legal after passing the verification; sending a verification result of the content server to the computer through the service certificate signature; and confirming that the content server is legal after the computer passes the service certificate verification in the data block of the basic input/output system. The method and system for authenticating the two-way hardware realize two-way authentication between the content server and the computer.
Owner:LENOVO (BEIJING) CO LTD

Security authentication system and method for smart power terminal

The invention provides a security authentication system and method for a smart power terminal. The system comprises a security detection server, a power server, an online monitoring server and an address registration server. The method comprises the following steps that: firstly, the address registration server performs uniqueness detection on the terminal, and generates a registration serial number and transmits the generated registration serial number to the security detection server if the terminal is legal; the security detection server judges whether terminal key object information is matched with power service permission allocation request information of the terminal or not, and generates unique terminal identity authentication information; and the terminal performs authentication and registration on the power server to obtain corresponding services. The system and the method provided by the invention are flexible and effective. Reliable authentication of software is realized without hardware authentication. Meanwhile, the terminal identity authentication information is protected from being stolen. A security detection method which is more efficient and economical than an existing hardware authentication method is provided for the power terminal, so that secure and efficient running of a smart power grid into which an Internet technology is introduced is ensured.
Owner:GLOBAL ENERGY INTERCONNECTION RES INST CO LTD +2

System encryption-based data protection method and device

The invention discloses a system encryption-based data protection method and device, and aims at solving the problem that data protection method in the prior art is relatively bad in safety. The method comprises the following steps of: receiving an access password input by a user; judging whether the access password corresponds to a first operation system or not; if the access password does not correspond to the first operation system, judging whether terminal equipment is connected with preset hardware authentication equipment or not; if the terminal equipment is connected with the preset hardware authentication equipment, carrying out identity authentication on the preset hardware authentication equipment according to authentication information; if the authentication passes, decrypting a disk driving file corresponding to an encrypted hidden virtual disk space in the terminal equipment according to file encryption/decryption information, so as to obtain the encrypted hidden virtual disk space; and decrypting the encrypted hidden virtual disk space according to the file encryption information, and logging in a second operation system, wherein the second operation system is installed in the encrypted hidden virtual disk space, and local data needing protection is stored in the second operation system.
Owner:BEIJING BANGCLE TECH CO LTD

Identity authentication method, authentication server and third-party platform

The invention provides an identity authentication method, an authentication server and a third-party platform. The method comprises the steps of receiving an authentication request table sent by the third-party platform, wherein the authentication request table comprises a mobile phone number of a user and an authentication risk value, and the authentication risk value is equal to 1 or 0; judging whether the authentication risk value is equal to 1 or 0; if the authentication risk value is equal to 1, carrying out SIM (Subscriber Identity Module) card authentication; if the authentication risk value is equal to 0, carrying out client authentication; if SIM card authentication or client authentication is passed, sending information that authentication is successful to the third-party platform; and if SIM card authentication or client authentication is not passed, sending information that authentication is failed to the third-party platform. In the technical scheme of the identity authentication method, the authentication server and the third-party platform which are provided by the invention, times of short message communication between an SIM card and the authentication server of an operator can be reduced, so that the condition that due to limitation of processing capacity of a short message gateway of the operator, large-scale authentication cannot be supported can be reduced.
Owner:CHINA UNITED NETWORK COMM GRP CO LTD

Electronic commerce intelligent password key with button and implementation method for electronic commerce intelligent password key

The invention relates to the technical field of information security, and provides an electronic commerce intelligent password key with a button and an implementation method for the electronic commerce intelligent password key. The intelligent password key comprises a universal serial bus (USB) plug, a keyboard and a built-in security encryption intelligent chip, wherein a digital keyboard, a power button, an unlocking button and a light emitting diode (LED) indicating lamp are arranged on the keyboard; the intelligent chip comprises a password processing module for processing the buttons, initializing a user personal identification number (PIN) code, modifying the user PIN code and checking the user PIN code, a USB data transmitting and receiving module for transmitting authentication information and confirming work of equipment, and an encryption and decryption module for encrypting and decrypting user authentication information. By an encryption storage mode, the user authentication information is prevented from being violently cracked; by a digital keyboard hardware authentication mode, the potential security hazards of keyboard Trojan horses and 'screen shot' password stealing Trojan horses are avoided; and therefore, the risk that the PIN code is stolen by the Trojan horse during authentication is reduced, and the intelligent password key is secure and reliable and is low in cost.
Owner:SHANDONG ZHONGFU INFORMATION IND

Encryption chip based on hardware random encryption authentication and electronic cigarette comprising chip

The invention relates to the technical field of electronic cigarettes, and discloses an encryption chip based on hardware random encryption authentication and an electronic cigarette comprising the chip. An encryption authentication chip comprises a soft encryption and decryption module arranged in a microcontroller and an encryption chip arranged in an atomizer. The soft encryption and decryptionmodule comprises an uplink encryption module, a downlink decryption module and a comparison authentication module, the encryption chip comprises a hardware random transmitter module, an uplink decryption module, a storage module and a downlink encryption module, and the uplink encryption module, the downlink decryption module and the hardware random transmitter module carry out data transmissionthrough single-wire communication. According to the invention, the encryption chip is arranged in the atomizer to carry out hardware authentication anti-counterfeiting identification, and bidirectional random processing is carried out on the ciphertext based on the hardware random emitter in the encryption and decryption process, so that the encryption and decryption process of the chip is more complex, the cracking difficulty is higher, the anti-counterfeiting capability of the encryption chip is improved, and the benefits of merchants and users are effectively protected.
Owner:深圳市艾迪科泰电子有限公司

Identity authentication method and device, equipment, storage medium and computer program product

The invention relates to an identity authentication method and device, equipment, a storage medium and a computer program product for use in the field of information security. The method comprises the following steps: in response to an identity authentication operation, initiating an identity authentication request to a server; receiving first random information fed back by the server in response to the identity authentication request, and encrypting the first random information based on a terminal encryption key provided in a card simulation mode to obtain a first ciphertext; transmitting the first ciphertext to hardware authentication equipment through a communication link, so as to enable the hardware authentication equipment to encrypt the first ciphertext based on the hardware encryption key to obtain a second ciphertext; receiving the second ciphertext fed back by the hardware authentication equipment through the communication link; and sending the second ciphertext to the server, so as to enable the server to decrypt the second ciphertext according to a terminal decryption key corresponding to the terminal encryption key and a hardware decryption key corresponding to the hardware encryption key, and determining an identity authentication result based on a decryption result. By adopting the method, the security of identity authentication can be improved.
Owner:INDUSTRIAL AND COMMERCIAL BANK OF CHINA

Acquired information sharing method and system based on dual authentication and multiple protection measures

The invention discloses an acquired information sharing method and a system based on dual authentication multiple protection measures, and relates to an acquired information sharing method. In the prior art, head information is used for transmitting user identity verification information, and user information is easy to intercept in the method. The method comprises the following steps: a client initiates an account authentication request; if the authentication is passed, randomly generating a temporary token, and returning the temporary token to the receiver; initiating the data request againafter obtaining the temporary token by the receiver, and decrypting the token by the sender after receiving the request and judging the validity of the token and the timeliness of the token; if the verification is passed, entering links of extracting data and assembling the data; the server extracts the acquired data and performs data desensitization; signing the data and encrypting the data; andsending the original text and the encrypted abstract to a receiver together. According to the method, an authentication method combining account authentication and token authentication is used, identity authentication service and data providing service are separated, and the security of interface interaction is greatly improved.
Owner:STATE GRID ZHEJIANG ELECTRIC POWER CO MARKETING SERVICE CENT +4

Cloud platform authentication method, system and device based on blockchain, and medium

The invention discloses a cloud platform authentication method based on a block chain, which comprises the following steps: generating a random character string in response to completion of creation of a cloud platform, and performing hash operation on the character string to obtain a first hash value; in response to creation of a user on the cloud platform, performing operation based on the current timestamp information and the user name character string to obtain a unique user ID; acquiring information of the hardware authentication key, generating an authentication unique ID according to the information, writing the authentication unique ID and the user unique ID into the hardware authentication key, and binding the user unique ID with the authentication unique ID; in response to completion of creation of the cloud platform user, generating a first password and a second password, performing operation according to the first password and the first hash value to obtain a second hash value, and writing the second hash value into the hardware authentication key as a final hash value; and in response to the fact that the hardware authentication key is inserted into the cloud platform,comparing the obtained information with a hash chain table, an authentication unique ID and a user unique ID stored in the cloud platform to perform authentication.
Owner:SUZHOU LANGCHAO INTELLIGENT TECH CO LTD

Internet surfing authentication method and device

The application provides an Internet surfing authentication method and device. The Internet surfing authentication method comprises the following steps: sending preset home page parameters of the browser to an access device when requiring to access the network, wherein the home page parameters include the website address of an authentication page; receiving and displaying the authentication page from the access device; and sending the authentication information to the access device when the user input authentication information is detected in the authentication page, so that the access deviceperforms Web authentication according to the authentication information. According to the Internet surfing authentication method and device, the website address of the authentication page is set in the home page parameters to show that the authentication page is trusted, therefore, the warning that the certificate is unsafe is not popped up when the user terminal accesses the network, and the authentication page is displayed directly, therefore, the use experience is improved; and the website address used for authentication is included in the home page parameters when performing the Web authentication, therefore, the access device can directly return to the authentication page without intercepting the Web request and then the website address of the authentication page is pushed, therefore,the device processing performance is improved.
Owner:HANGZHOU DPTECH TECH

Database multiple authentication method and system, terminal and storage medium

The invention provides a database multiple authentication method and system, a terminal and a storage medium, and the method comprises the steps: initializing a hardware authentication certificate carrier through a programming interface, and storing a public key and a user certificate public name of the hardware authentication certificate carrier; taking the user certificate public name as a database user name, and generating a standard information abstract value of the database user name; receiving an authentication request sent by the client, verifying a user certificate in the authentication request, and returning an initial random number to the client after the verification is passed; receiving a signature random number sent by a client, and decrypting the signature random number by using the public key to obtain a random number; and if the random number is consistent with the initial random number, obtaining an information abstract value of a client user name, and if the information abstract value of the client user name is consistent with the standard information abstract value, determining that the client passes the authentication. According to the invention, the security ofthe database and the confidentiality of the user are improved.
Owner:SUZHOU LANGCHAO INTELLIGENT TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products