Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

63 results about "Public key authentication" patented technology

Public key authentication is an alternative means of identifying yourself to a login server, instead of typing a password. It is more secure and more flexible, but more difficult to set up. In conventional password authentication, you prove you are who you claim to be by proving that you know the correct password.

Method for cross-isomerism domain identity authentication and session key negotiation based on access authorization ticket

The invention provides a method for cross-isomerism domain identity authentication and session key negotiation based on an access authorization ticket. The method mainly comprises the steps that firstly, a first-level trust relationship is established between a CA of a PKI domain and an AS of a Kerberos domain through a distributed trust model based on a public key authentication mechanism; on the basis, the authorization ticket allowing an outer-domain user to have access to resources of the domain is generated and distributed by the CA or the AS united with a TGS, and through design of a two-way cross-domain authentication and key negotiation protocol based on a symmetric key cryptosystem, a second-level trust relationship allowing the outer-domain user to have access to the resources of the domain is established. On the premise that the requirements for safety of the levels are satisfied, the calculated amount and the communication traffic of a terminal are effectively reduced, public key encryption and decryption operations of a Kerberos domain terminal can be completely avoided, and the implementation is good in the cross-isomerism domain identity authentication process of a dynamic distributed type system, session key negotiation is completed when identity authentication is conducted, and the protocol efficiency is high.
Owner:四川华创智能科技有限公司

Lightweight certificateless authentication method, client and system

The invention discloses a lightweight certificateless authentication method, client and system, and relates to the technical field of information security. The method comprises the following steps: the client generates a temporary public key and a temporary private key, and sends an identity label and the temporary public key to a key generation center; the key generation center calculates according to the identity identifier and the temporary public key to obtain a part of public key and a part of private key, and sends the part of public key and the part of private key to the client; the client calculates according to the temporary private key and the part of private key to obtain a complete private key; and when the client performs public key verification with a third party, verification is performed with the third party according to the complete private key, the identity identifier and the part of the public key. The method is suitable for the environment of the Internet of Things,is low in operation complexity, can be compatible with an existing public key infrastructure, and does not need complex certificate management, the client has complete autonomy for the private key, does not have a secret key escrow problem, and needs less data to be transmitted during public key authentication.
Owner:BEIJING SANSEC TECH DEV

Non-contact processor card based on combined public key authentication and use method

The invention belongs to the technical field of CPU cards and provides a non-contact processor card based on combined public key authentication and a use method. The non-contact processor card comprises a chip, a safe serial port, a radio frequency unit, a micro processor, an RAM, an ROM, an EEPROM, a safe logic unit and a self-destruction unit, wherein the safe serial port, the radio frequency unit, the micro processor, the RAM, the ROM, the EEPROM, the safe logic unit and the self-destruction unit are installed on the chip and are connected with the chip through circuits. The use method of the combined public key authentication is achieved, collusion attack prevention capacity is improved by means of a chaotic random sequence generated by means of chaotic mapping, a puzzling secret key of a reversion prevention project is additionally arranged in a secrete key unit, meanwhile, a self-destruction logic unit for preventing temptation attacks is additionally arranged, transmission secrete keys are not needed, requirements for safety in the communication process are not high, use safety is high, large-scale popularization and use are facilitated, and the CPU card and the use method are suitable for meeting service requirements on the basis of mobile communication.
Owner:上海象形通讯科技股份有限公司

Without-trust third party public key authentication method based on speaker voice print

The invention discloses a without-trust third party public key authentication method based on a speaker voice print, comprising the following steps that 1. the two parties determine a voice channel; 2. the two parties enable the voice channel and respectively establish a GMM (Gaussian mixture model) of the speaker voice print of the opposite side; 3. the two parties respectively generate a public and private key pair; the two parties are symmetrical below; 4. a public key sender states a public key for a receiver through the voice; 5. a public key receiver carries out voice print identification on a voice stream for stating the public key by using the speaker GMM to judge whether to be the sender or not, if yes, carrying out a step 6, and if not, denying; 6. the public receiver extracts the public key of the call voice, and the encrypted public key for a random number is generated and sent to a public key sending end; and 7. after the public key sender receives the random number, the random number is encrypted by the public key and sent to the receiver; after the receiver receives the random number, the random number is decrypted and verified by the public key in the step 6, if pass, the public key authentication is successful, and if fail, the public key authentication fails. The invention does not need the third party to participate and is convenient and flexible to use; and the two communication parties directly transfer and authenticate the public key through a voice call, thereby effectively preventing the attack of other people.
Owner:HANGZHOU DIANZI UNIV

Identity authentication method and electronic equipment

The invention relates to the technical field of video conferences, and particularly discloses an identity authentication method and electronic equipment, and the method comprises the steps: generatinga temporary key pair, wherein the temporary key pair comprises a temporary public key and a temporary private key; sending the temporary public key to the security hardware; receiving temporary public key authentication data returned by the security hardware based on the temporary public key, wherein the temporary public key authentication data is obtained by signing a temporary public key by using a hardware private key by the security hardware; signing the identity authentication data sent by the client based on the temporary private key to obtain a signature message, and adding the temporary public key authentication data into the signature message; and sending the signature message to the client, so that the client performs identity authentication on the server. In the security hardware, only the hardware private key needs to be adopted to sign the temporary public key for one time, and the other signatures of the identity authentication data sent by all the clients can be completed in the server; and the processing performance of the server is used for signing, so that the identity authentication efficiency is greatly improved.
Owner:SUZHOU KEDA TECH

Character deformation-based graphical password authentication method

The invention relates to a character deformation-based graphical password authentication method. The scheme comprises the following steps of: adopting a personalized character deformation graphical password instead of a text password, and presetting a plurality of cartoon character graphics corresponding to a plurality of postures and deformation effects by using a system; constructing an image deformation technology-based public key authentication system in an image password transmission process, transmitting a public key which is an image deformation parameter, and performing authentication by taking an image backward deformation parameter as a private key, wherein a deformation and backward deformation key pair is generated by deformation restrictions, and the private key is insoluble from the public key; enhancing the machine authentication resistance of an image password system by adopting a multi-posture and identical-semanteme cartoon character model generation technology; and fusing a character image deformation technology into the graphical password to increase the coding fuzziness of the password as well as brute force cracking complexity. The method is easy to operate by a user, convenient to memorize and high in system security. The operability and security can be improved by adopting a character picture selection operating way in combination with the cartoon character model generation technology and the image deformation technology.
Owner:SUN YAT SEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products