Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

127results about "User identity/authority verification" patented technology

Methods for combating malicious software

ActiveUS20090077664A1Memory loss protectionError detection/correctionCausal treeData segment
A method for combating malware monitors all attempts by any software executing on a computer to write data to the computer's digital storage medium and records details of the attempts in a system database having a causal tree structure. The method also intercepts unauthorized attempts by executing objects to modify the memory allocated to other executing objects or to modify a selected set of protected objects stored on the digital storage medium, and may also intercept write attempts by executing objects that have a buffer overflow or that are executing in a data segment of memory. The method may include a procedure for switching the computer into a quasi-safe mode that disables all non-essential processes. Preferably, the database is automatically organized into software packages classified by malware threat level. Entire or packages or portions thereof may be easily selected and neutralized by a local or remote user.
Owner:ROBOT GENIUS

Efficient, Secure, Cloud-Based Identity Services

InactiveUS20110246765A1Improve securityUser identity/authority verificationWeb serviceSecurity Measure
An Identity Ecosystem Cloud (IEC) provides global, scalable, cloud-based, cryptographic identity services as an identity assurance mechanism for other services, such as data storage, web services, and electronic commerce engines. The IEC complements these other services by providing enhanced identity protection and authentication. An IEC performs identity services using surrogate digital certificates having encryption keys that are never exposed to the public. An individual requesting other services must meet an identity challenge before access to these other services is granted. Service requests to the IEC, and responses from the IEC, are securely encrypted. An IEC integrates smoothly into existing services by layering on top of, or being used in conjunction with, existing security measures. Identity transactions may be logged in a manner that complies with strict medical and financial privacy laws.
Owner:SURIDX

Methods for Single Signon (SSO) Using Decentralized Password and Credential Management

ActiveUS20130166918A1Decentralized credential managementShorten the timeUser identity/authority verificationComputer security arrangementsDistributed serversEnd to end security
A method for single sign-on (SSO) that provides decentralized credential management using end-to-end security. Credential (and other personal user information) management is decentralized in that encryption is performed locally on the user's computer. The user's encrypted credentials may be stored by the login server and / or a plurality of distributed servers / databases (such as a cloud). The login server never has access to the user's credentials or other personal information. When the user wants to use single sign-on, he enters his password into his browser and the browser submits the encrypted / hashed password to the login server for validation. Upon validation, the browser receives the user's encrypted credentials. The credentials are decrypted by the browser and provided to relevant websites to automatically log the user in.
Owner:SHAHBAZI MAJID +1

Digital certificate safety lock device and digital certificate authentication system and method

InactiveCN102255730AImprove general performanceImprove applicabilityUser identity/authority verificationMicrocontrollerTablet computer
The invention relates to a digital certificate safety lock device and a digital certificate authentication system and method. The digital certificate safety lock device comprises a universal encryption and digital signature microcontroller, an audio plug and a first modulation and demodulation module, wherein the universal encryption and digital signature microcontroller is provided with an encryption and digital signature module and a storage for storing a digital certificate, a key of the digital certificate and encryption and decryption algorithms; and the first modulation and demodulation module is used for modulating data information from the encryption and digital signature module for transmitting through an MIC (Microphone) pole of the audio plug, demodulating a signal received from a first sound channel pole of the audio plug and transmitting the demodulated signal to the encryption and digital signature module. The digital certificate safety lock device is provided with a universal audio interface plug which has high university and adaptability and can support communication terminals such as mobile phones, tablet computers, PDAs (Personal Digital Assistants) or PCs (Personal Computers) and the like, with audio interfaces. Due to the functions of independent hardware signature, digital certificate encryption and the like, the security of application logon and transactions of Internet banks or enterprises can be ensured to the maximum extent.
Owner:吴沙林 +1

Controller regional network bus safety communication method, device and system

ActiveCN108965218AImprove securityReduce transmission overheadUser identity/authority verificationBus networksSecure communicationArea network
The present invention provides a controller regional network bus safety communication method, device and system which can effectively withstand attackers' eavesdropping, injection and attack replay. Agateway ECU (Electronic Control Unit) generates a random number and sends the random number to at least one CAN (Controller Area Network) bus ECU. A first CAN bus ECU obtains the random number sent by the gateway ECU and generates a first information authentication code based on secret keys of a first CAN identifier, the random number sent by the gateway ECU, a counting value of the first CAN identifier and data of a first CAN message. The first CAN bus ECU performs encryption operation based on the secret keys of the first CAN identifier and a second CAN message to obtain a first encryptionoperation result and perform equal length encryption operation for the first encryption operation result, the first information authentication code, the counting value of the first CAN identifier andthe data of the first CAN message so as to obtain the first CAN message with encryption authentication and send the first CAN message with encryption authentication.
Owner:HUAWEI TECH CO LTD

Login method and system, computer device and storage medium

InactiveCN108769041AUser identity/authority verificationInformation accessUser identifier
The invention relates to a login method and system, a computer device and a storage medium. The method comprises the steps of acquiring a product trigger instruction via a logged-in page correspondingto a user identifier, wherein the product trigger instruction carries a product-party identifier; generating a product information access request according to the product trigger instruction, and sending the product information access request to a platform-party server, wherein the product information access request carries the user identifier, and the product information access request is used for indicating the platform-party server to generate a security token according to the user identifier; receiving the security token sent by the platform-party server, and generating a login request according to the security token; sending the login request to a product-party server corresponding to the product-party identifier, and receiving a verification result sent by the platform-party server,wherein the login request is used for indicating the product-party server to send the security token to the platform-party server for verification; and when the verification result is that the verification is successful, logging in the product-party server, and receiving product information returned by the product-party server. By adopting the method, a product-party system can be logged in quickly.
Owner:ONE CONNECT SMART TECH CO LTD SHENZHEN

Apparatus and method for authentication and method for registering a person

Wrongful authentication process is prevented. A passive entry authenticating section compares an identification signal sent from a portable unit with an identification signal previously stored in a storage section. A biometrics authenticating section compares the biometrics information of a user inputted through a sensor section with the biometrics information registered in a biometrics database. A control section authenticates an authorized user when there is agreement in both the identification-signal comparison result and the biometrics-information comparison result, and controls a lock system to unlock the door lock of the automobile.
Owner:OMRON AUTOMOTIVE ELECTRONICS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products