Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

63 results about "Identity protection" patented technology

Computer security access control system and method

InactiveCN101986325AImplement secure storage protectionLow costDigital data authenticationOperational systemControl system
The invention discloses a computer security access control system and a computer security access control method, and belongs to the technical field of information security. A unified extensible firmware interface (UEFI) chip and a transmission control module (TCM) chip are included; a control system comprises an operating system pre-booting access control subsystem and an operating system running access control subsystem, wherein the operating system pre-booting access control subsystem comprises USBKey equipment, a USBkey equipment initialization module, a user management module, an operating system pre-booting identity authentication module and an encryption storage module; and the operating system running access control subsystem comprises USBKey equipment, an operating system user logon module, and an operating system user running protection module. The control method comprises an initialization method, an operating system pre-booting access control method and an operating system running access control method. The invention solves the problems that in the operating system, the reliability of access control is low, user identity information storage is insecure, and identity protection is insufficient in the running process after a user with legal identity logs on.
Owner:SHANDONG CHAOYUE DATA CONTROL ELECTRONICS CO LTD

Terminal identity protection method in a communication system

A method for determining a terminal ID from a message received from a terminal in a communication system avoids sending the terminal ID in the clear. In this system each terminal ID has an associated encryption key. A transmitted message comprises at least a Message Authentication Code (MAC), a n-bit hash, and encrypted message text. At least the terminal key and a nonce is used to generate the MAC, and neither the terminal ID or the terminal key are included in the transmitted message. An authentication broker stores the set of all (terminal ID, terminal key) pairs for the plurality of terminals in the communication system. The set of all terminal keys is grouped into at least two partitions, and on receipt of a message the authentication broker identifies the partition that includes the terminal key of the terminal that transmitted the received message using the n-bit hash (the search partition). The authentication broker then searches the search partition for the terminal key that authenticates the MAC to identify the terminal ID. In some embodiments the nonce is not included in the message but is known or obtainable by the terminal and the authentication broker. A partitioning function generates the «-bit hash from at least the nonce and a terminal key. In some embodiments the nonce is included in the received message and a partitioning function generates the n-bit hash by using the nonce to select n bits from the terminal ID. In some embodiments the partitions are arranged into hierarchical groups such as tree, and each node has a partition key, and the n-bit has is formed as the ordered set of MACs for the partition keys on the path from the root node to the leaf node partition that includes the terminal key.
Owner:MYRIOTA PTY LTD

Electric vehicle charging service method capable of protecting privacy

The invention discloses an electric vehicle charging service method capable of protecting privacy. Method, the electric vehicle generates a temporary token by using the key pair allocated by the charging service provider and the pseudo identity allocated by the trusted center; authenticating to a roadside unit by using the temporary token; after the authentication is passed, the roadside unit sends a seed key required by the authentication of the charging panel to the electric vehicle; challenge response is carried out by using a disposable session key generated by the seed key to complete authentication; after the authentication is passed, the charging panel provides charging service for the electric vehicle. According to the invention, identity protection of the electric vehicle is realized by adopting the pseudo identity information; the malicious entity is prevented from obtaining the real identity of the vehicle in the charging service process; according to the method, the drivingtrack of the vehicle is exposed, so that the privacy of a vehicle owner is invaded, when the electric vehicle has any improper behavior, the trusted center can reveal the real identity of the electric vehicle, and through the method disclosed by the invention, the behaviors of the electric vehicle can be better managed.
Owner:CHONGQING UNIV OF POSTS & TELECOMM

Network identity protection method and device, electronic equipment and storage medium

ActiveCN111353903ARealize automatic claim settlementFinanceElectronic credentialsWeb siteEngineering
The invention discloses a network identity protection method and device, electronic equipment and a computer readable storage medium, and the method comprises the steps: obtaining all first transaction certificates corresponding to target account information from an intelligent contract after a claim settlement request of the target account information is received, wherein the target account information is used for logging in a target application or website, and the first transaction certificate is used for recording login information corresponding to all login requests uploaded by a server ofthe target application or website; obtaining all second transaction certificates corresponding to the target account information from a blockchain node in the blockchain network, wherein the second transaction voucher is used for recording login information corresponding to a login request of normally authorizing to log in the target application or the website; and responding to the claim settlement request by comparing all the first transaction certificates with all the second transaction certificates. Therefore, according to the network identity protection method provided by the invention,insurance buying and automatic claim settlement are carried out on the network identity of the user.
Owner:GUANGDONG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products