Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

49 results about "Authentication" patented technology

Authentication (from Greek: αὐθεντικός authentikos, "real, genuine", from αὐθέντης authentes, "author") is the act of proving an assertion, such as the identity of a computer system user. In contrast with identification, the act of indicating a person or thing's identity, authentication is the process of verifying that identity. It might involve validating personal identity documents, verifying the authenticity of a website with a digital certificate, determining the age of an artifact by carbon dating, or ensuring that a product or document is not counterfeit.

Room key based in-room player tracking

A disclosed authentication instrument is used to authorize various services at a hotel-casino complex, such as but not limited to in-room gaming, in-room sports wagering, room access, safe access, mini-bar access, Electronic Fund Transfers (EFT), player tracking services and in-room entertainment services (e.g., video games and movie channels). A smart card, an electronic token and a magnetic striped card are examples of hardware that may be used as authentication instruments. For in-room gaming, the authentication instrument may be used to authorize, in a secure and legal manner, in-room game play sessions on an entertainment terminal connected to a remote gaming machine.
Owner:IGT

System and method for conducting secure commercial order transactions

InactiveUS20060106699A1FinancePayment architecturePaymentService provision
The inventive system and method enable secure remote commercial order transactions between customers and merchants. The inventive system and method ensure that customer entire confidential financial data (CFD) is never transmitted to the merchant by keeping that CFD proprietary to the customer's exiting financial service provider (FSP) with which the customer has established a financial account, and from which the merchant is authorized to receive payments. When an order is placed, the customer provides to the merchant a partial CFD (PCFD) sufficient, along with additional data, to identify the FSP to the merchant, and to identify the customer to the FSP. The merchant then provides the PCFD, along with at least partial order data, to the FSP, and order confirmation data (OCD) to the customer. Various embodiments of a novel order verification process are also provided that enable authorization, by the customer, of the order through contact between the customer and the FSP. In this manner, the complete CFD is kept absolutely secure as it never leaves the possession of the customer and the FSP. Optionally, the FSP is given the opportunity to offer additional services and / or products to the customer during order authentication, that are related or unrelated to the order. Advantageously, the inventive system and method function equally well for interactive electronic (e.g., online) orders, telephone orders, mobile commerce orders, facsimile orders, mail-order orders, and even in-person orders.
Owner:BYZ TEK

Controller regional network bus safety communication method, device and system

ActiveCN108965218AImprove securityReduce transmission overheadUser identity/authority verificationBus networksSecure communicationArea network
The present invention provides a controller regional network bus safety communication method, device and system which can effectively withstand attackers' eavesdropping, injection and attack replay. Agateway ECU (Electronic Control Unit) generates a random number and sends the random number to at least one CAN (Controller Area Network) bus ECU. A first CAN bus ECU obtains the random number sent by the gateway ECU and generates a first information authentication code based on secret keys of a first CAN identifier, the random number sent by the gateway ECU, a counting value of the first CAN identifier and data of a first CAN message. The first CAN bus ECU performs encryption operation based on the secret keys of the first CAN identifier and a second CAN message to obtain a first encryptionoperation result and perform equal length encryption operation for the first encryption operation result, the first information authentication code, the counting value of the first CAN identifier andthe data of the first CAN message so as to obtain the first CAN message with encryption authentication and send the first CAN message with encryption authentication.
Owner:HUAWEI TECH CO LTD

Method and communication terminal capable of automatically matching incoming call number or note number

ActiveCN101304552AAutomatic authenticationWith interceptionRadio/inductive link selection arrangementsBlack listAuthentication
The invention provides a method for automatically matching incoming call number or incoming short-message number and a communication terminal. The method for automatically matching incoming call number or incoming short-message number includes the following step: step A: whether the incoming call number or incoming short-message number is in a local telephone book is judged; step B: if the incoming call number or incoming short-message number is not in the local telephone book, the incoming call number or incoming short-message number is matched with a network blacklist of the communication terminal, the network blacklist is sent down by a network server requested by the communication terminal or automatically sent down by the network server; step C: the matching result is displayed onto the communication terminal. The invention can automatically match the coming calls and short messages with the network blacklist by establishing the network blacklist on the server and obtaining the network blacklist by the communication terminal. Additionally, the communication terminal has the functions of automatically refusing the incoming calls, automatically deleting short messages, etc. so that the communication terminal has the advantages of automatic authentication, garbage incoming call and short message interception, etc.
Owner:JRD COMM (SHENZHEN) LTD

TDD Uplink and Downlink Configuration Updating Method and Apparatus and TDD Re-Configuration Information Notification Method and Apparatus

InactiveUS20150208382A1Avoid delayAvoid resourcesTime-division multiplexRadio transmissionComputer hardwareEncryption
A method for encrypting a terminal with a subscriber identity card includes: a terminal storing the unique identity number of a subscriber identity card; the terminal detecting an operation of a user and authenticating a current user according to authentication conditions set by the user. Authenticating the current subscriber refers to that the terminal reads the unique identity number of the current subscriber identity card, and compares the read unique identity number of current subscriber identity card with the stored unique identity number of subscriber identity card; if they are the same, the terminal is controlled to enter a normal working state; and if they are different, the terminal locks by itself or disables the access of current user. The present document encrypts a mobile terminal with a subscriber identity card, so as to make the encryption technique of the terminal more secure and reliable, and improve the user experience.
Owner:ZTE CORP

Authentication control method for application client, server and terminals

The invention discloses an authentication control method for an application client, a server and terminals. The method comprises the following steps: receiving a first login request from a user of a first terminal, and confirming the first identity information of the user; receiving a first authentication request from the application client of the first terminal, and establishing an association relation between the first identity information and the first authentication request when the first authentication request is passed; receiving a second login request from a user of a second terminal, and confirming the second identity information of the user; and receiving a second authentication request from the application client of the second terminal, and permitting authentication pass of the second authentication request through the association relation when the first identity information and the second identity information satisfy a preset corresponding relation. Through adoption of the authentication control method, the server and the terminals, the user does not need to repeatedly inputting verification information of authentication request pass while downloading through different terminals or logging into the application client, so that convenience is brought to use for the user, and the user experience is enhanced.
Owner:珠海市魅族通讯设备有限公司

Polyphonic ringtone business system and implementation method based on converged communication

The invention relates to a polyphonic ringtone business system and an implementation method based on converged communication. The polyphonic ringtone business system and the implementation method based on converged communication include that a called client-side orders the polyphonic ringtone business with a music portal module in advance. A calling client-side sends a call request to a call control module. The call control module extracts account information of the called client-side and sending to a business authentication module and meanwhile calls for a request to retransmit the account information to the called client-side. The business authentication module sends a business authentication request to the music portal module based on the account information of the called client-side. The music portal module authenticates the authentication request, and sends ordering information to the business authentication module if the authentication is passed, and meanwhile sends a authentication password to a music library. A polyphonic ringtone broadcast module downloads the polyphonic ringtone scheduled by the called client-side in the music library according to the ordering information, and sends the polyphonic ringtone to the calling client-side after a code stream switch of the polyphonic ringtone. The polyphonic ringtone business system based on converged communication is simple in structure, easy to realize, and low in cost. Polyphonic ringtone business which is personalized and low in cost can be provided for users.
Owner:北京思特奇信息技术股份有限公司

Method for improving on-line speed of user and access equipment for broadband to get access to server remotely

The invention discloses a method for improving on-line speed of a user and access equipment for broadband to get access to a server remotely. The method comprises the steps that BRAS access equipment applies an IP address from a DHCP server by simulating a pseudo-user in advance, and an IP address pool is formed; a dynamic host configuration protocol (DHCP) discovery message for requesting being online carrying an MAC address of a real user from the real user is received; identity authentication is conducted to the real user; if the real user passes through the identity authentication, then an unallocated IP address is selected from the IP address pool to the real user, the selected IP address is set to be in an allocated state, the corresponding relation between the MAC address of the real user and the IP address allocated to the real user is recorded, the IP address allocated to the real user is packaged in a DHCP-ACK message for being transmitted to the real user, and the real user is made to be on-line.
Owner:NEW H3C TECH CO LTD

Third-party application authorization and authentication method based on multi-domain collaborative architecture

ActiveCN107018128ASafe and reliable authorized accessTroubleshoot authentication issuesTransmissionThird partySoftware engineering
The invention belongs to the technical field of computer applications, and discloses a third-party application authorization and authentication method based on multi-domain collaborative architecture. Multi-domain collaborative layered architecture is adopted, and consists of a plurality of layers of domains; each domain consists of an Internet of things platform, sensor equipment and a third-party application; permission management and partition are performed on each domain in a layered way; each target domain administrator audits authorization information; after pass of auditing, a plurality of domains through which auditing information passes can be taken as a resource group; and a developer finishes developing work according to an authorization result. Through adoption of the third-party application authorization and authentication method for use among a plurality of domains of the layered architecture, safe and reliable authorization access between a platform and a third-party application is ensured, and a rapid and convenient channel is provided for data interaction between the platform and the third-party application. Compared with a conventional third-party application permission authentication method, the method has the advantage that the authentication problem between a platform permission administrator, a third-party application developer and a platform user in the multi-domain collaborative architecture is solved.
Owner:陕西沃傲信息科技有限公司

Community-based visitor management method, community server and storage medium

The invention discloses a community-based visitor management method, a community server, and a storage medium. The community-based visitor management method includes a step of receiving visitor information sent by a gate machine, a step of determining whether a visitor is an invited visitor or not based on the visitor information, a step of sending an authentication instruction to the gate machineif not such that the gate machine obtains a visitor request of the visitor according to the authentication instruction, wherein the visitor request comprises information of a visited owner, and a step of sending the visitor request according to the information of the visited owner. In the above manner, the invention can effectively improve the convenience and security of allowing the visitor to enter a community.
Owner:EVERGRANDE SMART TECH CO LTD

Physical no-cloning technology based RFID card type intelligent door lock

The invention discloses a physical no-cloning technology based RFID card type intelligent door lock. The physical no-cloning technology based RFID card type intelligent door lock comprises RFID cards,a door lock and a database, wherein the database is arranged on a background server; while ID which corresponds to the RFID cards is received, data is compared with data in the database through an internet; the database is used for storing ID which corresponds to each RFID card; a door lock inner chip comprises a PUF circuit; the RFID chip comprises an RFID module which is used for generating motivation; after receiving the motivation, the PUF circuit generates a corresponding secret key; and the database provides a matching source and is compared with the secret key generated by the PUF circuit, so that authentication is realized, and therefore, unlocking is performed based on a door lock password authentication mode. The PUF circuit can resist probe attack and physical attack, and is not stored with the secret key information, so that other people cannot read a chip secret key through a probe and the like to steal inner information, and therefore, safety of the door lock is greatlyimproved.
Owner:HOHAI UNIV CHANGZHOU

Examination system and processing method thereof

ActiveCN109711263AExam Situation MonitoringPrevent substitute examsData processing applicationsCharacter and pattern recognitionComputer scienceInformation acquisition
The invention discloses an examination system and a processing method thereof, and the system comprises an identity information collection module which is used for collecting the identity informationof an examinee; The image acquisition module is used for acquiring examinee images at certain sampling time intervals; The examination question pushing module is used for judging whether the identityinformation of the examinee is matched with the examinee image or not, and pushing a corresponding examination question to the examinee under the condition that the identity information of the examinee is matched with the examinee image; The examination monitoring module is used for processing, identifying and analyzing the examinee image acquired by the image acquisition module to obtain a monitoring result and sending the monitoring result to the display terminal; and the display terminal is used for the teacher and/or the examinee to log in the display terminal to check the examination condition. Examination conditions of examinees can be effectively monitored, the identity information acquisition module and the image acquisition module are adopted for double identity verification, andthe phenomenon of examination substitution and replacement can be more effectively prevented.
Owner:BEIJING GZT NETWORK TECH

Electronic payment method, device and terminal

InactiveCN106570691AReduce the risk of lossAvoid unreadableTransmissionProtocol authorisationUser inputBackup validation
The embodiment of the invention discloses an electronic payment method comprising the following steps: receiving a user inputted payment confirm order; responding to the payment confirm order, sending verify essential factor request information to N storage nodes, wherein the verify essential factor request information is used for requesting a server to issue verify essential factors forming an identity verify template, and N is an integer >=2; receiving M verify essential factors of K storage nodes from N storage nodes, wherein K and M are respectively integer >=1, and K is <N; combining M verify essential factors so as to form the identity verify template; using the identity verify template to verify user inputted to-be-verified information; if verification fails, using a backup identity verify flow to verify the to-be-verified information; if the backup identity verify flow successes, sending an online payment order to the server, wherein the online payment order is used for indicating the server to carry out online payment. The embodiment also discloses an electronic payment device and a terminal.
Owner:NUBIA TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products