Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

500 results about "Security question" patented technology

A security question is form of shared secret used as an authenticator. It is commonly used by banks, cable companies and wireless providers as an extra security layer. Financial institutions have used questions to authenticate customers since at least the early 20th century. In a 1906 speech at a meeting of a section of the American Bankers Association, Baltimore banker William M. Hayden described his institution's use of security questions as a supplement to customer signature records. He described the signature cards used in opening new accounts, which had spaces for the customer's birthplace, "residence", mother's maiden name, occupation and age.

Security framework for an IP mobility system using variable-based security associations and broker redirection

In an IP-based mobile communications system, the Mobile Node changes its point of attachment to the network while maintaining network connectivity. Security concerns arise in the mobile system because authorized users are subject to the following forms of attack: (1) session stealing where a hostile node hijacks session from mobile node by redirecting packets, (2) spoofing where the identity of an authorized user is utilized in an unauthorized manner to obtain access to the network, and (3) eavesdropping and stealing of data during session with authorized user. No separate secure network exists in the IP-based mobility communications system, and therefore, it is necessary to protect information transmitted in the mobile system from the above-identified security attacks.The present invention improves the security of communications in a IP mobile communications system by creating variable-based Security Associations between various nodes on the system, a Virtual Private Network supported by an Service Level Agreement between various foreign networks and a home network, and an SLA Broker to promote large-scale roaming among different SLAs supported by the SLA Broker or agreements with other SLA Brokers.
Owner:RPX CLEARINGHOUSE

Patient and device location dependent healthcare information processing system

A system automatically establishes context information (e.g., determining changes to user interface workflows, screens, menus, and access requirements for devices such as monitors, ventilators, and diagnostic equipment) used by a worker in using healthcare information applications based on patient geographic location (e.g., a room or bed or department). The system addresses the need for a user to sign onto a system with each location change and manually change context information which consumes computer, server and network resources and represent a potential security problem. A healthcare system selects information to be provided to a user in response to received location dependent context data. The system includes a proximity detector for wirelessly detecting presence of an identification tag substantially within a predetermined vicinity of the detector. The identification tag is associated with at least one of, (a) a particular processing device and (b) a particular person. A location detector determines location information indicating a location associated with an identification tag detected by the proximity detector. A workflow processor automatically alters information presented to a user including information associated with a task sequence to be performed by the user for a patient in response to the determined location information.
Owner:CERNER INNOVATION

Method and system for evaluating network safety situation

The invention relates to a method for evaluating the security situation of a network and a system thereof. The system has a two-surface three-level framework and is provided with a public service surface and a service management surface for executing uniform coordinated management on each functional module of the system; according to a service logic processing flow, the system is divided into three levels: an acquisition level, an analysis level and an exhibition level for completing four evaluating operations of assets, frangibility, threat and security situation; the invention is based on the characteristic of service operation in the network, combines the prior risk evaluation method, the prior flow and the prior security detection tool and provides a set of a novel dynamic real-time evaluation method. The system can analyze the assets and service of the network and the risk of the whole network and carries out the evaluation of the security situation. The system can provide the security state of the whole network in macroscopy, can deepen to specific service and assets and know the specific security problem, thereby effectively helping network security personnel to analyze the root of the security problem and assisting to provide a security solution proposal and implement a defense measure.
Owner:BEIJING UNIV OF POSTS & TELECOMM

Method for securing a payment transaction over a public network

A method for processing a payment transaction between a buyer and a seller over a network using a payment manager is provided. The payment manager manages a plurality of buyer and seller accounts, each account having an account id associated with it. The payment manager receives payment authorization requests for payment transactions, including a payment amount and an identification of a seller. The buyer provides an account id and a location identification to the payment manager, so that the payment manager may determine whether the buyer is communicating over a secure network. If buyer communicates over a secure network, the payment manager requests that the buyer provides a security code to confirm the transaction. If the location identification indicates that the buyer communicates over an insecure network, the payment manager requesting that the buyer answers at least one security question to confirm the transaction. If the confirmation is correct, the payment manager authorizing the payment transaction and sending confirmation to the seller. The security code is used repeatedly for confirmation of all payment transactions for which the location identification indicates that the network is secure, and the security question is repeated randomly for some payment transactions for which the location identification indicates that the network is insecure.
Owner:ROWLEY MICHAEL

Security protection method and security protection system for mobile terminal application

The invention discloses a security protection method and a security protection system for a mobile terminal application, and belongs to the field of terminal application security protection. The method comprises the steps that a mobile terminal equipment identity, a mobile subscriber identity and subscriber login information are sent to a server for registration during a registration course, and bound to form a subscriber identity; login information, the mobile terminal equipment identity and the mobile subscriber identity in the current subscriber identity are compared with the original subscriber identity in the server sequentially during a login course to determine information required to be updated; and updating is performed by authentication of the original mobile subscriber identity finally. According to the method and the system, a mobile terminal equipment information binding method is adopted, so that the security problems due to the fact that terminal equipment is updated, an SIM (Subscriber Identity Module) card number is replaced or the subscriber login information is stolen under the condition of single registration of a subscriber are solved, and the security and conveniences of the terminal application are improved.
Owner:方正国际软件(北京)有限公司

Method and system for implementing authentication and data safe transmission

The invention discloses an authentication and safe transmission of data realizing method. A terminal safety device and an authentication terminal after being connected negotiates to have a same data to be used as a root key, and at the same time negotiates to have a same dispersion factor and a same algorithm, the negotiated root key and dispersion factor generate a same session key used as a symmetrical key by using the algorithm, and then, safety authentication and data encryption and decryption can be performed and safety data interaction between the two ends can be realized. The invention also discloses a system for realizing authentication and safe transmission of data, and the system comprises a terminal safety device, an authentication terminal and an authentication server. According to the invention, randomness of the session key for data encryption transmission can be assured, even though a session key is decrypted, the safety of the whole system can be assured, and at the same time, atom manipulation for safety authentication and safe transmission of data can be realized for avoiding that in the current authentication process, once a password is verified by the terminal safety device, limits of authority are totally released and potential safety hazard is generated, therefore, authentication safety is improved greatly.
Owner:BEIJING HUADA ZHIBAO ELECTRONICS SYST

Method, device and system of id based wireless multi-hop network authentication access

A method, device and system of ID based wireless multi-hop network authentication access are provided, which are used for security application protocol when the WAPI frame method (TePA, Triple-Element and Peer Authentication based access control method) is applied over the specific network including the wireless LAN, wireless WAN and wireless private network. The method includes the following steps: defining non-controlled port and controlled port; the coordinator broadcasts the beacon frame, the terminal device sends the connection request command; the coordinator and the terminal device perform the authentication procedure; the coordinator opens the controlled port and sends the connection response command at the same time if the authentication is successful; the terminal device receives the connection response command and opens the controlled port in order to access the network. The method of the present invention solves the technical problem of the presence of the security trouble in the present wireless multi-hop network authentication access method, improves the security and performance of accessing the wireless multi-hop network from the terminal device, and ensures the communication safety between the terminal device and the coordinator.
Owner:CHINA IWNCOMM

Method and device for repairing cheap-copy application programs

The invention discloses a method and device for repairing cheap-copy application programs. The method comprises the steps that the application programs installed on a terminal device are scanned and an application program list is generated according to information obtained through scanning; whether the application programs in the application program list exist in a preset application program white list or not is judged; if the application programs exist in the preset application program white list, whether at least parts of files in installation packages of the application programs are tampered or not is judged; if the parts of files in the installation packages of the application programs are tampered, the application programs on the terminal device are unloaded; official installation packages of the application programs are downloaded from a cloud-side server and are installed on the terminal device. By means of the method and device, a user can be helped to replace the cheap-copy application programs on the terminal device by the application programs in the official version, safety problems brought by malicious codes in the cheap-copy application programs are effectively avoided and the safety of an operation system of the terminal device is improved.
Owner:BEIJING QIHOO TECH CO LTD +1

System and method applied to transaction platform for realizing grading safety processing of financial information

The invention relates to a system applied to a transaction platform for realizing the grading safety processing of financial information. The system comprises an embedded safety control module for acquiring a safety control rule preset by a user, a sensitive information processing module for judging the coincidence degree of the sensitive information in electronic transaction information of the user and the safety control rule and a safety control platform for judging the risk of the electronic transaction and performing identity verification on the user for which the safety rule needs to be altered. The invention also relates to a method applied to the transaction platform for realizing the grading safety processing of the financial information. According to the system, adopting such a structure, and the method applied to the transaction platform to realize grading safety processing of the financial information, the financial information of the user can be divided into the sensitive information and insensitive information, the sensitive information processing module and an electronic transaction client end are integrally packaged, the user information safety is further ensured by grading processing, loss caused by the problem of account unsafety is reduced and the system and method have a wide application range.
Owner:COEUSYS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products