Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

325 results about "Key authentication" patented technology

Key authentication is used to solve the problem of authenticating the keys of the person (say "person B") to whom some other person ("person A") is talking to or trying to talk to. In other words, it is the process of assuring that the key of "person A" held by "person B" does in fact belong to "person A" and vice versa.

Provision of secure communications connection using third party authentication

The present invention relates to communications, and in particular though not exclusively to forming a secure connection between two untrusted devices. The present invention provides a method of securely connecting a first device (A) to a second device (B) using a third party authentication server (AS) coupled to the second device, the first device and the authentication server both having first device shared secret data (SSDa) and the second device and the authentication server both having second device shared secret data (SSDb). The method comprises receiving a request from the first device at the authentication server; the authentication server and the first device both generating a first device key (K_A) using the first device shared secret data in response to a first device random number (RANDa) sent from the authentication server to the first device; the authentication server and the second device both generating a second device key (K_B) using the second device shared secret data in response to a second device random number (RANDb) sent from the authentication server to the second device; and the authentication server securely forwarding to the second device (B) and the first device (A) a common key (K_AB) using the second and first device keys (K_B, K_A).
Owner:BRITISH TELECOMM PLC

Implementation method and system of bluetooth key to car

The invention provides an implementation method and system of a bluetooth key to a car. The implementation method of the bluetooth key to the car comprises the following steps: receiving vehicle use information at least comprising a secrete key to a used car, which is sent by a server, with a vehicle-mounted T-Box; establishing connection with a mobile terminal by bluetooth; performing secret keyauthentication on the mobile terminal according to the secrete key of the used car; after the secret key authentication is passed, sending an unlocking instruction to an electronic control unit of thecar, so as to unlock the car; receiving an operation instruction of the mobile terminal and sending the operation instruction to the electronic control unit of the car, so as to control the car. According to the implementation method, by performing bluetooth secrete key authentication on the vehicle-mounted T-Box with the mobile terminal, an operation of opening a door of the car is implemented,the traditional hardware key is substituted, tedious operations of finding the key and operating the key when the vehicle is used by a user are avoided, the problem of the limitation of car renting time and space can be effectively solved, and the convenience of use of the car is improved.
Owner:SHANGHAI PATEO ELECTRONIC EQUIPMENT MANUFACTURING CO LTD

Secure Key Management in Conferencing System

Principles of the invention provide one or more secure key management protocols for use in a communication environment such as a conferencing system. For example, a method for managing a conference between two or more parties in a communication system comprises the following steps. An identity based authenticated key exchange operation is performed between a conference management element of the communication system and each of the two or more parties seeking to participate in the conference, wherein messages exchanged between the conference management element and the two or more parties are encrypted based on respective identities of recipients of the messages, and further wherein the conference management element receives from each party during the key authentication operation a random key component that is computed based on a random number selected by the party. The conference management element sends to each party a set comprising the random key components computed by the parties. The conference management element receives from each party a random group key component, wherein the random group key component is computed by each party via a computation based on the random number used by the party during the key authentication operation and the random key components computed by a subset of others of the two or more parties seeking to participate in the conference. The conference management element sends to each party a set comprising the random group key components computed by the parties such that each party can compute the same group key for use in communicating with each other party through the conference management element.
Owner:ALCATEL LUCENT SAS

Keyless entry system detecting method for automobile

The invention discloses a keyless entry system detecting method for an automobile. The keyless entry system detecting method for the automobile comprises the following steps that a mobile terminal is bound with an automobile controller; the mobile terminal acquires GPS position information of the automobile controller; the mobile terminal judges whether the distance between the automobile and the mobile terminal is less than a first preset distance or not according to the GPS position information; if the distance between the automobile and the mobile terminal is less than the first preset distance, the mobile terminal remotely wakes up the automobile controller to execute intelligent key detection; the automobile controller judges whether the distance between the automobile and the intelligent key is less than a second preset distance or not; if the distance between the automobile and the intelligent key is less than the second preset distance, the automobile controller performs intelligent key authentication and finishes the intelligent key authentication process; and if the time of keeping the distance between the automobile and the mobile terminal within the first preset distance exceeds a preset time, the automobile controller exits the intelligent key authentication process. According to the invention, the loss of the system is reduced and the practicability, convenience and safety of the system are improved.
Owner:FJ MOTOR GRP YUDO NEW ENERGY AUTOMOBILE CO LTD

Cluster key management method capable of being used for wireless sensor network

The invention provides a cluster key management method capable of being used for a wireless sensor network. Specific classification methods for clustering are not considered in the cluster key management method. Before deployment, nodes are initialized by a key management center, wherein relevant parameters and algorithms of each sensing node are set; after the whole wireless sensor network is clustered, a base station, cluster heads and intra-cluster nodes are formed; communication between the base station and the cluster heads and data transmission security are guaranteed through a compound matrix key, and the cluster heads and the intra-cluster nodes form an internal secure communication area; the cluster heads are in charge of secure data transmission of the intra-cluster nodes, when residual energy of the cluster head nodes is lower than a set threshold value, the conditions for becoming cluster heads are abandoned, the cluster head nodes become common nodes, and when residual energy of the common nodes is lower than a certain threshold value, algorithms and parameters in a chip are destroyed automatically. According to the method, key authentication under KMC control is not needed, calculation and communication cost is reduced, and bidirectional authentication is adopted for every two clusters.
Owner:HUAIHAI INST OF TECH

Method, user terminal device and identity authentication server for recognizing identity through biological feature

The invention discloses a method for recognizing an identity through a biological feature. At a user terminal device side, a pair of public and private keys are provided for an account which logs in an application in a biological feature recognition mode; the account, a public key of the account and a biological feature index address of a login account are signed through a built-in device private key; a registration request is generated based on the account, the public key of the account and the biological feature index address of the login account; and the registration request is checked through a device public key pre-stored in an identity authentication server, after the check is successful, the account, the public key of the account and the biological feature index address of the login account are stored, thereby checking an authentication request of the terminal device. According to the method, double public and private key authentication and once biological feature comparison check authentication are carried out on the biological feature of the login account, the precise matching of the biological feature of the login account is ensured, the biological feature with the right to logging the terminal device is further authenticated and then the service (such as transaction service related to money) of the application can be used, the friendly cheat is avoided, and the privacy and property safety is improved.
Owner:GUOMIN RENZHENG TECH BEIJING CO LTD

Smart password key authentication based cross-platform heterogeneous system login method

The invention provides a smart password key authentication based cross-platform heterogeneous system login method. The method is to provide a uniform authentication service platform for a multi-service system user by utilizing a smart password key, a digital signature and a digital certificate authentication mechanism based on a PKI theoretical system and to perform uniform authentication of the user identity and access control through integrating service systems and content, thereby realizing single-point login and integration of information resources of each service system. An enterprise employee, as long as remembering a command, can log in multiple heterogeneous systems in the access process of an application system; uniform user identity information is provided, so information sharing can be carried out even the user identity information content and data format of each application system are non-uniform, and interconnection and mutual communication are realized; after the smart password key authentication is encrypted, the data transmitted by the user are guaranteed to be the original text without being tampered maliciously; and the identity of the user can be confirmed.
Owner:SHANDONG INSPUR GENESOFT INFORMATION TECH CO LTD

Engine anti-theft authentication method and device of engine anti-theft system

The invention provides an engine anti-theft authentication method. Engine anti-theft authentication comprises key authentication and engine controller authentication. Engine controller authentication comprises the following steps that an engine management module generates a set of random numbers and transmits the numbers to an intelligent access key-free starting module through a vehicle body controller communication gateway; the intelligent access key-free starting module carries out encryption calculation through an XTEA algorithm according to a fixed code stored in the intelligent access key-free starting module, a secret key and the received random numbers, replaces part of digits in the calculation result with the key authentication result to generate second data, and transmits the second data back to the engine management module through the vehicle body controller communication gateway; the engine management module compares the key authentication result pre-stored in the engine management module and first data generated through the XTEA algorithm with the fed back second data, permits the engine to start if the data are matched, otherwise forbids starting. The invention further provides an engine anti-theft authentication device. The engine anti-theft authentication method and device adopt the XTEA algorithm, and are small in occupied space and short in calculation time.
Owner:GUANGZHOU AUTOMOBILE GROUP CO LTD

Method, device and system for vehicle intelligent unlocking

The invention provides a method, device and system for vehicle intelligent unlocking. The method in one embodiment comprises the steps that when a whole vehicle is in a locked state, antennas arranged on the vehicle are controlled to sent low-frequency signals; a first response signal returned when a vehicle intelligent key receives the low-frequency signals of the antennas is received, and the first response signal comprises the signal strength, detected by the vehicle intelligent key, of the antennas; the area where the vehicle intelligent key is located is determined according to the signal strength of the antennas in the first response signal; when the vehicle intelligent key is located in a meeting area, intelligent key pre-authentication is carried out on the vehicle intelligent key, and prompting information is sent after intelligent key pre-authentication succeeds; and when the vehicle intelligent key is close to an unlocking area, intelligent key authentication is carried out on the vehicle intelligent key, the whole vehicle is controlled to be unlocked after intelligent key authentication succeeds, and after the whole vehicle is unlocked, and when any vehicle door of the vehicle is in an opened state, the antennas are controlled to stop sending the low-frequency signals. According to the method, device and system for vehicle intelligent unlocking, the use experience of vehicle users is improved, and convenience is improved.
Owner:GUANGZHOU AUTOMOBILE GROUP CO LTD

Login authentication method and login signature procedure

The invention provides a login authentication method and a login signing procedure which relate to the technical field of computer software, internetwork communication and information security. The system presents a login screen which comprises a user name, password child window, besides, a challenging child window which gives random message generated dynamically and an agreed response child window which collects the signing information of users. Users can choose freely from a compatible password authentication and a signing authentication. The registration password is also the authentication password and the symmetrical key authentication signing; the remembrance of the registered single password can apply to the two authentications methods; the login signing procedure operates independently, instructs and judges users on the target login screen to point at or fall on the challenging child window, picks up automatically random message which is signed by a cipher device to form the signing information, fixes the position according to the predetermined strategic orientation of the signing and issuance and sends the signing information to the response child window. The method of the invention does not relate to the hardware but is the thoroughfare for a stable and seamless transition from weak password authentication to the strong signing authentication; the procedure of the invention does not relate to the application, is generally applicable and commonly used and can effectively protect the accounts of users.
Owner:杨筑平

Internet of Things safety management system

The invention relates to an Internet of Things security management system. A private key center and an application server perform communication authentication data transmission through a soft shield;the application server side performs mutual communication of key distribution, identity authentication and data encryption with the client control terminal and the Internet of Things terminal at the same time; mutual communication of identity authentication and data encryption is carried out between the client control terminal and the Internet of Things terminal, wherein the private key center comprises a KPC key production assembly, a KMC key management assembly and a key authentication assembly, the application server comprises a security edge computing SDK module and a server application module, and the client control terminal comprises an encryption and decryption security module and a client application module, and the Internet of Things terminal comprises an Internet of Things communication module, a security algorithm module and an SE chip. According to the Internet of Things security management system, only the user is completely autonomous and controllable in the Internet of Things system, the cloud system does not have the authority of directly operating the user equipment, and the Internet of Things control security level can be effectively improved.
Owner:深圳前海智安信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products