Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

58 results about "Digest access authentication" patented technology

Digest access authentication is one of the agreed-upon methods a web server can use to negotiate credentials, such as username or password, with a user's web browser. This can be used to confirm the identity of a user before sending sensitive information, such as online banking transaction history. It applies a hash function to the username and password before sending them over the network. In contrast, basic access authentication uses the easily reversible Base64 encoding instead of hashing, making it non-secure unless used in conjunction with TLS.

Method, device and system of access authentication

The invention discloses a method, a device and a system of access authentication, belonging to the field of computer technologies. The method of access authentication comprises the following steps that a device identification of a visited device is obtained; the device identification and a user account of an access device are transmitted to a third-party device, and the third-party device is used for transmitting an authentication request to a login end when the device identification is bound with a user account and the user account is different from the user account of the access device, and transmitting an access password of the visited device to the access device after the access allowed response fed back by the login end is received; and the visited device is visited by the received access password. Through carrying out authentication on the login end in the third-party device, after authentication is successful, the access password is transmitted to the access device, and the access device visits the visited device according to the access password; the problems that a user needs to manually input the access password on a mobile phone App to cause an illegal user to obtain the access password easily and have worse safety are solved; the effect of improving safety of the visited device is achieved.
Owner:XIAOMI INC

Wireless local area network two-way access authentication system and method based on identity certificates

ActiveCN103491540AEfficient access authenticationImprove access authentication efficiencySecurity arrangementAccess networkDigest access authentication
The invention discloses a wireless local area network two-way access authentication system and method based on identity certificates. The wireless local area network two-way access authentication system comprises access routers arranged in a safety area and further comprises an identity certificate management server and an authentication server. The identity certificate management server is used for managing the identity certificates of entities in the safety area, namely, issuing the identity certificates and maintaining the identity certificates. The authentication server is used for authenticating access certification application of mobile subscribers and completing shared key negotiation with the mobile subscribers. The access routers are used for controlling whether the mobile subscribers have access to the wireless local area network or not according to the authentication result fed back from the authentication server and receiving and forwarding authentication information between the mobile subscribers and the authentication server. According to the wireless local area network two-way access authentication system and method, in an autonomous security domain, two-way access authentication and secret key negotiation between the mobile subscribers and the accessed network can be achieved, efficient access authentication conducted when the mobile subscribers switch between the different access routers is supported, and the access authentication efficiency is improved.
Owner:NORTHEASTERN UNIV

Safety access method of wireless metropolitan area network

The invention relates to a method for safe accessing of a wireless metropolitan area network, which comprises an authenticating step and a session key negotiating step. The authenticating step comprises that: a subscriber station SS sends a request message for access authentication to a base station BS; the BS sends a request message for certificate authentication to an authentication server AS; the AS verifies the request message for certificate authentication and sends a response message for certificate authentication to the BS; the BS verifies the validity of the identity of the SS according to the response message for certificate authentication; if the SS is valid, the BS sends the response message for access authentication to the SS; the SS verifies the validity of the BS according to the response message for access authentication; if the BS is valid, the SS uses the encryption certificate key of the SS to decrypt the material of authentication key. The SS signing certificate in the proposal is used for stating the identity and the SS encrypting certificate is used for encrypting and decrypting the material of authentication key so as to reduce the risk that the key is decrypted; through verifying the certificates of the BS and the SS by the AS, authentication for the subscriber station SS and the base station BS is realized and security level is improved.
Owner:GCI SCI & TECH

Method of access authentication and recertification in home NodeB system of user terminal

The invention discloses methods of access authentication and recertification of a user terminal in a home NodeB system, mainly overcoming the defect that the existing standard does not provide an authentication method of the user terminal for accessing a core network through the home NodeB. The access authentication process comprises the following steps: firstly, simultaneously sending the identification of a user and the identification of the home NodeB to HNBHLR to inquire, judging according to whether the identification of the user exists in the CSG list of the home NodeB; and secondly, adopting the modified EAP-AKA protocol to perform authentication between the user terminal and a authentication server. The recertification process comprises the following steps: firstly, judging according to whether the identification of the user is as the same as the identification stored in the home NodeB network, and secondly, using a hierarchy secret key to modify the existing EAP-AKA recertification method to realize the mutual authentication between the user terminal and the authentication server. The methods of the invention has the advantages of simple processes, high efficiency, reliable performance, good safety and the like, thus being applicable to the access authentication and recertification of the user terminal in the home NodeB system.
Owner:XIDIAN UNIV

Secure Bootstrapping Architecture Method Based on Password-Based Digest Authentication

The present invention is related to a method, apparatus, and computer program product, in which a password-based digest access authentication procedure is used for performing authentication between a client and a server, wherein the authentication procedure is secured by at least one of modifying a digest-response parameter with a user password and generating a bootstrapped key based on the user password and at least one fresh parameter not used in a previous protocol run between the client and the server.
Owner:NOKIA TECHNOLOGLES OY

Intelligent terminal management method

The invention discloses an intelligent terminal management method, which is implemented based on an improved broadcast television hardware architecture. A UDP message receiving client and a UDP message forwarding Server are deployed on an HEMS server, which are used to receive UDP behavior operation data of a cloud media set-top box terminal and report the UDP behavior operation data; a terminal and a front-end system communicate with each other based on a TR069 protocol, and a connection request is implemented by using a bidirectional HTTP digest authentication method; in addition, the intelligent terminal management method further comprises the functions of terminal access, terminal parameter reading, terminal parameter configuration, remote application startup, file reading, fault diagnosis, fault management and signal monitoring, management data reading, user behavior data acquisition and analysis and so on. The intelligent terminal management method provided by the invention improves the communication security between a managed CPE and the front-end system; and a custom UDP data format can reduce the packet loss rate and network overhead, and collection and statistical analysis can be performed on the user behavior data.
Owner:JIANGSU BROADCASTING CABLE INFORMATION NETWORK CORP

Certificateless aggregation signature LTE-R network group authentication key negotiation method

A certificateless aggregation signature LTE-R network group authentication key negotiation method comprises the following main operation steps: A, system establishment and participant registration: anentity participating in authentication completing registration at a key generation center, and obtaining public and private key information; B, initial access authentication: the user equipment beinguniformly accessed to LTE-before departure of a train; when R network is carried out, executing the certificateless signature algorithm to generate respective signatures, sending the signatures to the relay server, and the relay server executing the certificateless aggregation signature algorithm to realize rapid mutual authentication among the user equipment, the relay server and the roadside base station and negotiating to share the key; C, switching authentication: in the running process of the train, the user equipment being always stably connected with the relay server, and the relay server and the roadside base station realizing quick and frequent switching authentication by executing a certificateless signature algorithm; D, terminating the session. The method is high in authentication efficiency, low in signaling overhead and good in security.
Owner:CHINA ACADEMY OF RAILWAY SCI CORP LTD +1

3G/WiFi network access authentication system and achieving method thereof

The invention relates to a 3G/WiFi network access authentication system and an achieving method of the 3G/WiFi network access authentication system. A user searches for available network hot spot information nearby through a hot spot management module, the available network hot spot information nearby is pushed to the user through a hot spot information push module, the user is reminded of an available WiFi network through a terminal WLAN/3G/LTE management module, and the user starts a WLAN to be automatically connected with the network. Through a network search and access module, the user acquires corresponding operator Internet surfing account passwords from all operator account management modules, and logs in by inputting the passwords. Through a network authentication module, access is achieved through user information authentication. Through a user timekeeping/accounting management module, after user connection succeeds, timekeeping/accounting management is carried out on the Internet surfing behavior of the user, and when the user has no Internet surfing duration, the user is offline. When the user needs to buy the Internet surfing duration, interaction is carried out through a payment capacity sealing module and a payment platform module. A user management module stores and manages user information.
Owner:KESHENG WIRELESS SUZHOU

Two-way access authentication method

A two-way access authentication method comprises: According to the system parameters pre-established by the third entity, the first entity sends the access authentication request packet to the second entity, then the second entity validates whether the signature of first entity is correct, and if yes, the share master key of second entity is calculated; the second entity generates the access authentication response packet and sends it to the first entity, then the first entity validates whether the signature of access authentication response packet and the message integrity check code are correct; if yes, the share master key of first entity is calculated; the first entity sends the access authentication acknowledge packet to the second entity, then the second entity validates the integrity of the access authentication acknowledge packet, if passing the validation, the share master key of first entity is consistent with that of the second entity, and the access authentication is achieved. For improving the security, after received the access authentication request packet sent by the first entity, the second entity may perform the identity validity validation and generates the access authentication response packet after passing the validation.
Owner:CHINA IWNCOMM

Two-way access authentication method

A two-way access authentication method comprises: According to the system parameters pre-established by the third entity, the first entity sends the access authentication request packet to the second entity, then the second entity validates whether the signature of first entity is correct, and if yes, the share master key of second entity is calculated; the second entity generates the access authentication response packet and sends it to the first entity, then the first entity validates whether the signature of access authentication response packet and the message integrity check code are correct; if yes, the share master key of first entity is calculated; the first entity sends the access authentication acknowledge packet to the second entity, then the second entity validates the integrity of the access authentication acknowledge packet, if passing the validation, the share master key of first entity is consistent with that of the second entity, and the access authentication is achieved. For improving the security, after received the access authentication request packet sent by the first entity, the second entity may perform the identity validity validation and generates the access authentication response packet after passing the validation.
Owner:CHINA IWNCOMM

Method and device for achieving access authentication of wireless local area network

The invention discloses a method and device for achieving access authentication of a wireless local area network, and belongs to the field of wireless communication. The method comprises the steps of carrying out a connectivity test on an access point with an access mode of wireless fidelity access, opening a login program if the connectivity test fails, and automatically calling a system browser or a browser control through the login program to open a login page to enable a user to achieve the login operation of the wireless local area network in the login page. The device comprises a first testing module and a login module. According to the method and device for achieving the access authentication of the wireless local area network, the system browser or the browser control is automatically called through the login program to open the login page, the user is made to achieve the login operation of the wireless local area network in the login page, the fact that an uniformed mode is used for carrying out authentication on the WIFI access is achieved, the user can also be made to achieve a login process in an original login page, the cognition of the user on an access network is facilitated, and the experience of the user is improved.
Owner:TENCENT TECH (SHENZHEN) CO LTD

Method and device for access authentication of wireless local area network

Disclosed are an access authentication method and device for a wireless local area network. The method mentioned above comprises: sending a request message to a server, the request message being used for obtaining authentication information which passes WEB PORTAL authentication; and extracting the authentication information from the response message returned by the server, and initiating WEB PORTAL authentication according to the authentication information. The technical solution provided in the present invention simplifies the operation flow for a mobile terminal to access an operator wireless local area network, and saves the time for the mobile terminal to access the operator wireless local area network.
Owner:ZTE CORP

Method for carrying out access authentication through monitoring client spectrum field intensity

InactiveCN105592462ALow requirements for authorized accessImprove access experienceSecurity arrangementFrequency spectrumCable Internet access
The present invention discloses a method for carrying out access authentication through monitoring client spectrum field intensity. The method comprises the following steps that: firstly, a client opens WLAN wireless access, searches the SSID of a wireless access point broadcast and initiates an association request, a wireless access point returns successful association information and records the MAC address of the client; and then the client approaches the wireless access point, the wireless access point automatically monitors the field intensity in a specified spectrum emitted by the client, when the spectrum field intensity reaches or exceeds a preset threshold, the wireless access point writes the MAC address of the client into a legitimate MAC address list, the authentication of the client is passed, and the normal Internet access is available. According to the method, the requirement of client authorized access is low, and the simple authorized Internet access of the client can be realized without the special function of the client.
Owner:GUANGDONG SHUNDE ZHONGKA CLOUD NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products