Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

52 results about "Impersonation attack" patented technology

Impersonation attacks are emails that attempt to impersonate a trusted individual or company in an attempt to gain access to corporate finances or data.

Remote proving method in trusted computation environment

The invention provides a method for remote attestation in a trusted computing environment. The method is characterized in that secure session key is adopted for encrypting the metric value and the metric log of trusted platform to be verified, and signs for encryption result data. The method is based on a security chip TPM / TCM; the adopted remote attestation framework comprises three parts: an integrity measuring mechanism, a reporting mechanism and a validation mechanism, which are achieved by an integrity measuring agency, a report agency and a verification requestor, wherein, the measuring agency, the report agency and the verification requestor are installed in the trusted platform to be verified. The method ensures that the authenticity of the integrity measuring value and the measuring log and the privacy of the platform are kept; the replay attack, impersonation attack and man-in-the-middle attack are effectively prevented; the method is used for proving to the verification requestor that the running environment of the platform is credible, or used for self-test of the platform running environment; the method can be used for not only proving to the requestor that the platform running environment is credible, but also the self-test of the platform running environment; and the method is more suitable for a fair and open network environment.
Owner:LANGCHAO ELECTRONIC INFORMATION IND CO LTD

IBAKA (Identity Based Authentication and Key Agreement) method

The invention discloses an IBAKA (Identity Based Authentication and Key Agreement) method. The method comprises the following steps that: a user at a sending terminal generates first authentication data for authenticating the identity of the user at the sending terminal and sends the first authentication data to a user at a receiving terminal; the user at the receiving terminal carries out legality authentication on the identity of the user at the sending terminal according to the received first authentication data; if authenticating that the identity of the user at the sending terminal is legal, the user at the receiving terminal generates second authentication data which does not contain key information of the user at the sending terminal, sends the second authentication data to the user at the sending terminal and generates a conversation key of the receiving terminal; the user at the sending terminal carries out legality authentication on the identity of the user at the receiving terminal according to the received second authentication data; and if the identity of the user at the receiving terminal is authenticated to be legal by a sensing terminal, the user at the sending terminal generates a conversation key of the sending terminal. The method disclosed by the invention can be used for solving the problem that a risk of denial of service attack, key leakage impersonation attack or temporal key leakage attack exists in an IBAKA protocol.
Owner:NO 61 INST OF GENERAL STAFF

Identity authentication method during quantum secret key application process

The invention discloses an identity authentication method during a quantum secret key application process. The identity authentication method includes the steps: a quantum network deployment phase, a preparation initial phase, a secret key preparation phase, an identity authentication phase and a secret key application phase. During an abstract extraction process, as the identity authentication method uses a quantum secret key and the quantum secret key is provided with true randomness, the difficulty for performing reverse operation on the abstract can be further reduced and the safety for information transmission can be improved; and at the same time, after accomplishment of one time of session identity authentication, only a device for identity authentication is allowed to apply for a secret key, so that the safety is further improved through verification of the device information, and during the process, a session ID is in continuous changing state and depends on a plurality of factors, so that a large amount of impersonation attack can be timely eliminated through verification of the session ID. For the identity authentication method during a quantum secret key application process, the secret key is applied to the quantum secret key application process to verify the legal identity between two parties for communication, so that verification of the legal identity of the opposite side between the two parties for communication can be realized and the required data for verification has absolute safety during the transmission process in the network.
Owner:ZHEJIANG SHENZHOU QUANTUM NETWORK TECH CO LTD

Low-complexity identity authentication method based on intelligent card and under multiserver environment

The invention discloses a low-complexity identity authentication method based on an intelligent card and under a multiserver environment. The low-complexity identity authentication method comprises the steps of registering, logging and authentication, wherein the registering further comprises the steps that registering information of a user is converted by a registration center and the intelligent card and then is stored in the intelligent card; the logging further comprises the steps that the intelligent card carries out local legitimacy verification on the identity of the user, and if the identity of the user is legitimate, a random number is generated, and first verification data are generated and sent to a server; the authentication further comprises the steps that the server carries out the legitimacy verification on the identity of the user, and if the identity of the user is legitimate, second verification data are generated and sent to the intelligent card; the intelligent card carries out the legitimacy verification on the identity of the server, and if the identity of the server is legitimate, third verification data are generated and sent to the server; the server carries out secondary verification on the identity of the user, and if the identity of the user is legitimate, the server and the intelligent card generate the same session key. The low-complexity identity authentication method avoids intelligent card losing attacks and impersonation attacks.
Owner:SHANDONG UNIV OF SCI & TECH

Automobile remote-control key-free door control identity authentication method

The invention discloses an automobile remote-control key-free door control identity authentication method. In the invention, an automobile ID, a remote controller ID and a 38-bit synchronous code are used for generating a 128-bit plain text; the 128-bit plain text is composed of two parts, the front 64 bits are a plain text, and the rear 64 bits are a plain text; a 64-bit ciphertext is subject toAES encryption by using a 128-bit dynamic key; the 128-bit plain text is subject to AES encryption by using a fixed key to obtain a 128-bit ciphertext; the 128-bit ciphertext is transmitted to an automobile decoder; the automobile decoder decodes the received 128-bit ciphertext into the 64-bit ciphertext and the 64-bit plain text; a received automobile CID and a received remote controller FID arecompared with an automobile CID' and anremote controller FID' which are stored by the automobile, thereby completing a first authentication; and the dynamic key is used for decryption and compares identity codes to complete a second authentication. The invention protects the data transmission by AES encryption of the fixed key and the dynamic key, and can carry out authentication twice by only carrying out communication once in the whole authentication process. The invention can effectively resist strong attacks, and deny service attacks, impersonation attacks and other common attacks.
Owner:CENT SOUTH UNIV

Authentication method based on public key encryption system

The invention relates to an authentication method based on a public key encryption system, applied to an environment of instant message communication, network telephone and the like. The authentication method comprises identity authentication and shared session key generation. The authentication method mainly consists of three roles: a sender A, a receiver B, and a key distribution center. In a protocol execution process, the sender A and the receiver B complete the mutual identity authentication with the key distribution center and the mutual authentication between the sender A and the receiver B through the interaction with the secret key distribution center, in the period, the sender A and the receiver B respectively receive a shared session key generated by the secret key distributioncenter, and the authentication party also receives the shared session key so as to use the shared session key to encrypt and decrypt communication contents in the next stage of information interaction. By adoption of the authentication method provided by the invention, the security requirements of the authentication protocol are fully met, the old message playback can be prevented, and the identity impersonation attacks are defended.
Owner:中国科学院沈阳计算技术研究所有限公司

Human living body detection method and device based on human brain intelligence and man-machine interaction

The invention discloses a human living body detection method based on human brain intelligence and man-machine interaction. The human living body detection method comprises the following steps: randomly transferring an instruction subject which is pre-configured in an instruction database in advance, and randomly setting a response mode; acquiring user response information and verifying the response mode and a response result; and if the response mode and the response result of the instruction subject are matched successfully, judging that a response user is a human living body. According to the method, the subject is appointed randomly to enable the user to answer in regulated time by the randomly-appointed response mode, and the transmitted instruction subject can be answered through the brain thinking of the user, so that an impostor can not adopt manners such as pure voice and/or video synthesis or editing and the like to cheat a human living body detection system. According to the human living body detection method, lawless persons can be effectively prevented from carrying out impersonation attacks through various means, so that the human living body detection system becomes more effective and reliable.
Owner:GUANGDONG MICROPATTERN SOFTWARE CO LTD

Three-party authentication key agreement protocol generating method based on certificates

The invention relates to a three-party authentication key agreement protocol generating method based on certificates. The method is applied to a wireless network system and comprises the steps: (1) three communication parties A, B and C respectively send respective certificate to other two parties; (2) after the communication party A receives the certificates sent by the communication parties B and C, x is randomly selected as a temporary private key, the formulas that MA=(g*g<c>)*g<x> , NA1=(g)<x> and NA2=(g<c>)<x> are calculated, then the communication party A sends MA and NA1 to the communication party B, and sends MA and NA2 to the communication party C, and the processing modes of the communication parties B and C are identical with that of the communication party A; (3) after the communication party A receives the messages sent by the communication party B and the communication party C, calculation and verification are performed, if the formula is false, a protocol is stopped from operating; if the formula is successful, a session key is calculated; the modes of calculating the session keys of the communication party B and the communication party C are identical with that of the communication party A; (4) an agreement is completed. According to the three-party authentication key agreement protocol generating method based on the certificates, modular and exponent arithmetic and a hash function are used, the operation efficiency is higher, and the agreement can resist the man-in-the-middle attack, the unknown secret key sharing attack and the secret key reveal impersonation attack, so that the safety is high.
Owner:CHANGZHOU UNIV

Entity impersonation attack penetration testing method aiming at aircraft communication addressing and reporting system (ACARS) data chain

InactiveCN103139165AImprove protectionSolve the problem of entity camouflageData switching networksPlaintextImpersonation attack
An aircraft communication addressing and reporting system (ACARS) data chain belongs to a wireless network, and compared with a wired network, the ACARS data chain is easily attacked. ACARS information is completely transmitted in a plaintext mode, and safety is insufficient. The invention provides a safety penetration testing method of the ACARS data chain. Entity impersonation attack is imitated mainly according to security holes existing in the ACARS data chain. In an ACARS system, an entity is easily disguised as a digital signal processor (DSP) terminal, space communication is destroyed, and normal operation of the ACARS system is blocked, and major accidents such as an aircraft crash are even caused. According to the safety penetration testing method of the ACARS data chain, a computer is disguised as a DSP through simple assembly, and sends an illegal control message to an aircraft in the air, a skyborne terminal can not detect legality of the illegal control message, and thus the illegal control message is responded. According to the technical scheme, safety loopholes of the ACARS data chain can be found out, and the safety penetration testing method of the ACARS data chain plays an active part in protection of safety of the ACARS data chain.
Owner:CIVIL AVIATION UNIV OF CHINA

Method for verifying RFID label group

The invention discloses a method for verifying an RFID label group, wherein the method relates to the technical field of Internet-of-things safe communication. An entity of the method comprises a verifier, reader-writer and multiple labels. In each group proving and authentication process, the reader-writer firstly acquires authorization and then broadcasts a message to a label in an anonymous packaging manner; and after label receives the message, the label verifies validity of the reader-writer and transmits the sensitive message to the reader-writer in a ciphertext manner. After the reader-writer receives the message of the group label, the reader-writer generates a group identification and transmits to the verifier for verification by the verifier. In the verification process, exchange and transmission between the entities are realized through the encrypted message. The method comprises the steps of authorization, challenge, response, calculation, matching, etc. According to the method, by means of group identity identification sharing technology, not only is expandability problem settled, but also independence of a label reading sequence is realized. Playback attack, impersonation attack and the like are resisted through a time sequence manner. Furthermore the message is transmitted between the entities in the ciphertext manner, thereby improving privacy protection for the sensitive message.
Owner:JIANGNAN UNIV

Data transmission method, device and system thereof

ActiveCN104283667AAvoid Phishing AttacksGuaranteed distribution of public parametersData switching by path configurationSecuring communicationCiphertextKey generator
The invention discloses a data transmission method, a device and a system thereof, wherein the data transmission method for a node comprises the steps of: generating a first cryptograph through a communication request of a first secret key encryption node and a private key generator, wherein the first secret key is a symmetrical secret key which is distributed by a secret key distribution center to the node; transmitting the first cryptograph to the secret key distribution center; receiving and using the first secret key for decrypting a second cryptograph which returns from the secret key distribution center, obtaining the secret key of a session at this time and a third cryptograph; forwarding the third cryptograph to the private key generator; and receiving and using the secret key of the session at this time for decrypting a fourth cryptograph which is transmitted by the private key generator and is encrypted by the secret key at this time, and obtaining a public parameter and the private key. According to the data transmission method, the node uses the secret key distribution center for communicating with the private key generator through one-time session keys which are distributed according to different symmetrical keys as nodes, thereby effectively preventing impersonation attacks to the node, and simultaneously ensuring high safety in distributing a public parameter and a private key of the node by a private key server.
Owner:CHINA MOBILE GRP HEILONGJIANG CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products