Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

70results about How to "Implement two-factor authentication" patented technology

Product service data uploading method and device, product service data evidence storage method and device, equipment and medium

One or more embodiments of the invention disclose a product service data uploading method, a product service data storage method, a product service data storage device, product service data storage equipment and a medium. The product service data uploading method comprises the following steps: sending identity authentication information of a product participation node to a certificate authority CA; receiving a digital certificate sent by the CA, wherein the digital certificate is generated by authenticating the product participation node by the CA according to the identity authentication information; according to the digital certificate, applying for the product participation node to become a node of a block chain; and after the product participation node becomes the node of the block chain, calculating the signature of the product service data for the product service data to be uploaded each time, and sending the product service data, the signature and the digital certificate to the nodes of the block chain except the product participation node.
Owner:ALIPAY (HANGZHOU) INFORMATION TECH CO LTD

Key generation and distribution method for wireless communication system

The invention relates to the technical field of communication security, and more particularly to a key generation and distribution method for a wireless communication system. The key generation and distribution method comprises the steps that: a terminal and an access point generate physical layer keys based on wireless communication channel features of the two parties; an authentication center generates authentication data and a non-access-layer key by means of a root key associated with identity of the terminal and an access-layer authentication key; the terminal authenticates the access point and the authentication center by utilizing the root key, the access-layer authentication key and the received authentication data of the authentication center; the authentication center authenticates the terminal by utilizing the root key, the access-layer authentication key and received terminal authentication data; the terminal and the access point each generates a secondary access-layer encryption and integrity protection key; and the terminal and the access point can update a primary access-layer key and the access-layer authentication key synchronously at any time, and realizes updating and continuous authentication of the access-layer keys. The key generation and distribution method utilizes the uniqueness, reciprocity and time-varying property of the wireless channel, generates the physical layer keys at the terminal and the access point separately, introduces the physical layer keys into the access-layer keys and the authentication keys, realizes dual authentication of identity and path, and can prevent the attack pattern of acquiring the access-layer keys from a non-access layer.
Owner:THE PLA INFORMATION ENG UNIV

Verification code authentication method and system based on biological characteristics

The invention discloses a verification code authentication method and system based on biological characteristics, and the method comprises the steps: transmitting an authentication request, and receiving a verification code; generating a first private key and a first public key according to the acquired biological characteristics; performing hash operation on the biological characteristics to obtain a first private key, and performing elliptic curve encryption on the first private key to obtain a first public key; and signing the verification code according to the first private key, and sending the verification code and the signature information, so as to obtain an authentication result that authentication is completed by the first public key. The biological characteristic value of the user is taken as a private key, thedigital signature is performed on the verification code of the remote server, and the verification code is returned to the remote server; and the remote server authenticates the verification code and the signature information according to the user public key. The biometric features have uniqueness and non-reproducibility, network transmission and key management arenot needed, and the verification code is signed, so that the verification code has authentication, integrity and non-repudiation, and the security of the verification code is improved.
Owner:UNIV OF JINAN

Electronic device, authentication method and storage medium

The invention relates to an electronic device, an authentication method and a storage medium. The method comprises the steps that when a user performs a service in an IVR scenario, a random code of afirst preset digit is broadcast for the user to follow, and acoustic models of a preset type are established for the broadcast random code and the voice followed by the user respectively after following; forced overall aligning is carried out on the acoustic model of the broadcast random code and the acoustic model of the voice followed by the user; a predetermined algorithm is used to calculate the same probability of two aligned acoustic models; if the probability is greater than a preset first threshold, the voiceprint feature vector of the voice followed by the user is extracted; a pre-stored standard voiceprint feature vector of the user after successful register is acquired; and the distance between the voiceprint feature vector of the voice followed by the user and the standard voiceprint feature vector is calculated to authenticate the user. According to the invention, double-effect authentication of the user is realized, and the identity of the user can be accurately confirmed.
Owner:PING AN TECH (SHENZHEN) CO LTD

Management system for safe entering/exiting of bank cash box based on Internet of Things

ActiveCN103530918ARealize automatic handoverSafe Handover GuaranteeIndividual entry/exit registersSensing by electromagnetic radiationData processingCard reader
The invention provides a management system for safe entering / exiting of a bank cash box based on Internet of Things. The management system comprises a website sensing unit, a vault sensing unit and a data processing and applying unit; a website industrial personal computer is in real-time connection with a bank database server by a wireless VPN (Virtual Private Network); a website computer is in real-time connection with the bank database server by a bank private network; a vault computer is in real-time connection with the bank database server by the bank private network; a website ultra-high-frequency card reader, a vault ultra-high-frequency card reader, a camera, a door guard, an alarm and corresponding industrial personal computers are in real-time connection by RJ-45 cables; an entering card reader antenna, an exiting card reader antenna and the ultra-high-frequency card reader are in wireless connection. Based on an application technology of the Internet of Things, the working efficiency of working escort personnel is improved, safe guarantees are provided for escort work of the bank cash boxes and tracing evidences are provided for treating emergency situations.
Owner:江苏腾源智能科技有限公司

Security authentication method and system, and computer readable storage medium

ActiveCN107819766ARealize the corresponding relationshipImplement one-to-one bindingMessaging/mailboxes/announcementsTransmissionUser inputComputer terminal
Embodiments of the invention provide a security authentication method and system, and a computer readable storage medium. The method comprises the following steps of collecting user information of a user logging in to the authentication system and first preset equipment hardware information of a mobile terminal used when the user logs in to the authentication system for binding before security authentication, and binding and storing the user information and the first preset equipment hardware information in a one-to-one manner; during a security authentication process, collecting the user information and second preset equipment hardware information of a mobile terminal used when the user logs in to the authentication system for authentication, instructing a communication device to send a short message verification code to the mobile terminal used for authentication by the user, and storing the short message verification code; receiving the verification code input by the user; and whenthe first preset equipment hardware information is successfully matched with the second preset equipment hardware information, and the verification code input by the user is successfully matched withthe short message verification code, passing the authentication.
Owner:BANK OF CHINA

Authentication method integrating mac authentication and web authentication

The invention is applicable to the Internet field and provides an authentication method integrating mac authentication and web authentication. The method comprises the steps that a logical net entity sends a first mac authentication request message to an authentication server; the authentication server returns a first mac authentication response message, and a re-directed URL and a session identity value are carried in the response message; the logical net entity returns the re-directed URL to terminal equipment; according to web authentication information, after confirming that a terminal user passes the web authentication, the authentication server returns a response message of passing the web authentication to the logical net entity; after receiving the response message of passing the web authentication, the logical net entity sends a second mac authentication request message to the authentication server, and the session identity value is carried in the second mac authentication request message; when confirming that the session identity value carried in the second mac authentication request message is received, the authentication server returns a message of passing the mac authentication to the logical net entity. By means of the method, the server mainly releases the re-directed url, and manual configuration on the logical net entity can be avoided, so that the configuration quantity is reduced.
Owner:FENGHUO COMM SCI & TECH CO LTD

Network configuration method, network configuration device, electronic equipment and readable storage medium

The invention relates to the technical field of communication, and provides a network configuration method, a network configuration device, electronic equipment and a readable storage medium, the network configuration method comprising: receiving a network distribution request of equipment to be accessed to a network; determining an equipment identifier of the equipment to be accessed to the network based on the network distribution request; determining a check code based on the equipment identifier; controlling an optical transmitter to flicker according to a target frequency based on the check code so as to be received by an optical receiver of the equipment to be accessed to the network; receiving a verification result fed back by the equipment to be accessed to the network; and determining that the verification is passed, and sending the distribution network information. According to the network configuration method provided by the embodiment of the invention, an optical signal isused as a verification medium when the network configuration request is received, and the light cannot penetrate through a wall, so that the safety of the network configuration can be ensured, and thepotential safety hazard and risk existing in the later period can be reduced.
Owner:MIDEA SMART TECH CO LTD +1

Dynamic token working method and dynamic token working system

The invention a dynamic token working method and a dynamic token working system. The authentication requirements of users are divided into two categories in advance, namely login authentication requirements and signature authentication requirements during signature in the transaction processes (after login); after the dynamic token is activated successfully, the dynamic token generates corresponding login private keys and signature private keys for the two categories of the authentication requirements in advance. Subsequently, when a user has the transaction requirement and needs login or signature authentication, the dynamic token generates a corresponding login answer-back code or a signature answer-back code for the user according to the login private key or the signature private key in combination with a challenge code input by the user at the moment. Obviously, according to the dynamic token working method, different calculation private keys are set for different authentication requirements of the users, and therefore, the private keys of the dynamic token are not easy to break, and the working mechanism and the working flow of the dynamic token are safer; besides, dual authentication during the transactions of the users is realized, the difficulty for lawbreakers to reversely infer the working principle of the dynamic token is improved, and the security of user accounts is guaranteed.
Owner:CHINA CONSTRUCTION BANK

Financial data encryption method and system, financial data decryption method and system, equipment and storage medium

PendingCN112685786AImprove securityImplement separation of privilegesFinanceDigital data protectionKey storageData information
The invention provides a financial data encryption and decryption method, system and device and a storage medium, and the method comprises the following steps: a server receiving data information sent by a client, wherein the data information comprises plaintext data and label information; setting a first secret key according to the label information, encrypting the plaintext data to obtain first data, and storing the first secret key into a cipher machine; performing encryption calculation on the plaintext data according to a message digest algorithm to obtain second data, generating a second key, and storing the second key in a cipher machine; and storing the first data and the second data in a database. The authority of data information management and the authority of secret key management are separated, when the data information is obtained, double verification of the server side and the cipher machine needs to be carried out on the client side, and the safety of the data information is improved.
Owner:永辉云金科技有限公司

Two-factor authentication method based on photoplethysmography sensor

ActiveCN111444489APersistent mobile two-factor authenticationSecure Mobile Two-Factor AuthenticationDiagnostic signal processingDiagnostics using lightTime domainAdaptive filter
The invention relates to a two-factor authentication method based on a photoplethysmography sensor, and belongs to the technical field of mobile computing application. The photoelectric volume pulse wave sensor is used for collecting heartbeat signals of a user. A semi-blind source separation technology and an adaptive filtering technology are utilized to carry out noise removal processing on heartbeat signals interfered by motion artifacts, and pure heartbeat signals are extracted. And time domain and angle domain coordinate conversion is carried out on the extracted heartbeat signals. And the geometrical characteristics are extracted from the converted heartbeat signals, and a series of characteristics capable of uniquely identifying the user are obtained after conversion and encryptionalgorithm processing. Heartbeat signals are collected through the photoelectric volume pulse wave sensor of the intelligent wrist strap device, and double-factor authentication of a user is achieved.According to the invention, high-security identity authentication is supported, and the user is allowed to re-register the alternative credentials so as to resist replay attacks and man-in-the-middleattacks. A user does not need to keep still, and a common verification method can be used at the same time.
Owner:BEIJING INSTITUTE OF TECHNOLOGYGY

Social security card PIN resetting method and system based on standard interface and medium

PendingCN114239006AThe development logic is ingeniousUniversalDigital data protectionEmbedded systemData processing
The invention discloses a social security card PIN resetting method and system based on a standard interface, and a medium. The method comprises the following steps: configuring an encryption module, a first standard interface and a block encryption algorithm; setting data character bits; detecting a social security card PIN reset demand, and executing an information reading operation based on the encryption module, the first standard interface, the data character bit and the social security card PIN reset demand to obtain reset authentication information; executing a PIN reset operation based on the encryption module, the first standard interface, the block encryption algorithm, the data character bit and the reset authentication information; according to the method, the unified standard interface of the social security card data processing module can be designed and called, information reading, information dual authentication and PIN resetting of the social security card can be realized without repeatedly developing or repeatedly designing a port by the social security card data processing module, and more comprehensive social security card data processing requirements are met.
Owner:INSPUR FINANCIAL INFORMATION TECH CO LTD

Fingerprint registration method and device and fingerprint verification method and device

The invention relates to a fingerprint registration method and device and a fingerprint verification method and device. The fingerprint registration method comprises the following steps: acquiring a fingerprint to be registered; generating a registration fingerprint template according to the fingerprint to be registered; performing abstract operation on the registered fingerprint template to obtain a first hash value; wherein the first hash value is used for verifying that the fingerprint template for fingerprint verification is a registered fingerprint template during fingerprint verification; storing the registered fingerprint template; and sending the first hash value to a main control unit for storage. Abstract operation can be performed on the registered fingerprint template to obtainthe first hash value.According to the invention, the first hash value is stored in the main control unit, and when fingerprint verification needs to be carried out, whether the fingerprint template of the comparison fingerprint is the registered fingerprint template or not needs to be verified in addition to the comparison fingerprint, so that dual verification is realized, the fingerprint template is prevented from being replaced, and the safety of fingerprint verification is improved.
Owner:广东华芯微特集成电路有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products