Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

19 results about "Authentication system" patented technology

Authentication Systems aid the process of verifying the legitimacy of data, most often data used by people attempting to access a system.

Authentication system and method

InactiveUS20090193264A1Digital data authenticationCoded identity card or credit card actuationAuthentication systemStrong authentication
A strong authentication method and system using a Secure ICC component coupled with a Personal device, and relying on the existing cryptographic protocols and keys for managing the secure ICC to generate One-Time-Passwords when the necessary authentication keys or cryptographic protocols are not already present in the Secure ICC configuration for that purpose.
Owner:ACTIVIDENTITY

Digital certificate safety lock device and digital certificate authentication system and method

InactiveCN102255730AImprove general performanceImprove applicabilityUser identity/authority verificationMicrocontrollerTablet computer
The invention relates to a digital certificate safety lock device and a digital certificate authentication system and method. The digital certificate safety lock device comprises a universal encryption and digital signature microcontroller, an audio plug and a first modulation and demodulation module, wherein the universal encryption and digital signature microcontroller is provided with an encryption and digital signature module and a storage for storing a digital certificate, a key of the digital certificate and encryption and decryption algorithms; and the first modulation and demodulation module is used for modulating data information from the encryption and digital signature module for transmitting through an MIC (Microphone) pole of the audio plug, demodulating a signal received from a first sound channel pole of the audio plug and transmitting the demodulated signal to the encryption and digital signature module. The digital certificate safety lock device is provided with a universal audio interface plug which has high university and adaptability and can support communication terminals such as mobile phones, tablet computers, PDAs (Personal Digital Assistants) or PCs (Personal Computers) and the like, with audio interfaces. Due to the functions of independent hardware signature, digital certificate encryption and the like, the security of application logon and transactions of Internet banks or enterprises can be ensured to the maximum extent.
Owner:吴沙林 +1

Safety authentication method and system for wireless network

InactiveCN101959191ASecurity arrangementAuthentication systemWeb authentication
The invention discloses a safety authentication method and a safety authentication system for a wireless network. The system comprises a signal fingerprint monitoring and processing module and a wireless network access authentication module at an access point. The method comprises the following steps that: at a network access point, the signal fingerprint monitoring and processing module performsdown-conversion and digitized sampling on a detected steady-state communication signal and extracts the conventional signal characteristic and the spurious signal characteristic of the steady-state signal by a communication signal processing method; after a higher-dimension spurious signal characteristic is reduced and optimized, the conventional signal characteristic and the spurious characteristic are fused into a steady-state signal fingerprint; and a signal fingerprint matching and safety authentication module matches the monitored steady-state fingerprint of unknown communication equipment and provides a corresponding safety strategy service according to a recognition result by a network authentication protocol. The method and the system are used for performing safety authentication on wireless communication equipment and enhancing the safety of a wireless communication network in combination with a software authentication system and have the characteristics of high concealment, high stability and safe management.
Owner:HUAZHONG UNIV OF SCI & TECH

Digital identity authentication method and system based on secure two-dimensional code

ActiveCN108712382APrevent leakageSecure loginTransmissionDigital identityThird party
The invention provides a digital identity authentication method based on a secure two-dimensional code, comprising that: the third party application initiates an authorization login request; the identity authentication SDK obtains a session key from the server; the identity authentication SDK encrypts the information of the third party application through the session key, and sends the encrypted information and the authorized login request to the server; the server decrypts through the session key to obtain the information of the third-party application, generates a two-dimensional code and atwo-dimensional code url, and encrypts the two-dimensional code url by using a key, and the identity authentication SDK obtains the encrypted two-dimensional code url; the identity authentication SDKdecrypts the encrypted two-dimensional code url, then the third-party application jumps according to the two-dimensional code url to display the two-dimensional code; and the user scans the two-dimensional code for authentication to authorize the third-party application to log in. The invention also provides a digital identity authentication system based on the secure two-dimensional code to ensure the security of the authorization process and the secure login of the third-party application.
Owner:新大陆(福建)公共服务有限公司

Authentication system and method using flash of smart mobile

It is capable of authentication by transmitting through light emitted from a flash of a smart mobile according to foregoing solution of the problem, security and stability can be improved in comparison with other authentication systems such as an ID, a password and a public authentication which are necessary to a bank task, a personal authentication, an identity authentication and a transaction remittance. And, even if the smart mobile is lost or a stranger acquiring this are misappropriating, cryptography such as patterns cannot be solved thereby it is not available. Further, carrying is easy to use anywhere regardless of the place because the transaction is available using a flash equipped to the smart mobile.
Owner:B PLAT LLC

Authentication system and authentication method based on central node

PendingCN107135228AKey distribution for secure communicationAuthentication systemMulti point
The invention discloses an authentication system based on a central node. The authentication system comprises local verification and authentication units and a remote verification and authentication unit; each of the local verification and authentication units includes a local authentication device; the remote verification and authentication unit includes an authentication central device; the authentication central device and a plurality of the local authentication devices are further respectively connected with a key relay device; the local verification and authentication units are connected to corresponding external devices. The invention further discloses an authentication method based on the central node. Compared with the prior art, through local verification and authentication or remote verification and authentication, on the basis of communication of authentication centers for the local verification and authentication and the remote verification and authentication, the communication connection between the external devices and all devices connected with the authentication centers is implemented by the authentication system and the authentication method, the defect that the external devices only can perform authentication with a designated device is abandoned, and the convenience is provided for multi-point authentication and communication; and in addition, the multi-encrypted transmission of authentication information is implemented in an authentication process, and the security for transmitting the authentication information is guaranteed.
Owner:ZHEJIANG QUANTUM TECH CO LTD

Multimedia data safety monitoring device, receiving terminal, authentication method and system thereof

ActiveCN102457518AEasy to judgeAvoid enteringData switching networksComputer hardwareContent security
The invention relates to the multimedia data communication technology field and provides a multimedia data safety monitoring device, a receiving terminal, a multimedia data authentication method and a system thereof. The authentication system comprises: a multimedia data safety monitoring device and a multimedia data receiving terminal, wherein the multimedia data safety monitoring device is used to acquire multimedia data, carry out safety authentication to the multimedia data and stores authentication result information in a safety checking code database; the multimedia data receiving terminal is used to receive the multimedia data, using a same method which the multimedia data safety monitoring device used to carry out the safety authentication to the multimedia data and feed back the safety authentication result information to the multimedia data safety monitoring device. The multimedia data safety monitoring device carries out comparison authentication to the received safety authentication result information and the corresponding safety authentication result information stored in the safety checking code database. If the two are matched, the authentication is passed and the multimedia data receiving terminal decodes and plays. A technical scheme is easy to be realized. Contents are safe and a definition is simple and strictness. Security is high. Implementation and management costs are low.
Owner:CHANGSHA DILU DIGITAL TECH

Identification learning system for artwork body identification

PendingCN114816850AAvoid critique learningReduce usageDigital data protectionRedundant operation error correctionBody identificationFeature extraction
The invention discloses an identification learning system for artwork body identification, and particularly relates to the field of artwork identification, and the identification learning system comprises a three-dimensional scanning system, a data storage system, a database, a matching system and an identification system.The three-dimensional scanning system carries out three-dimensional scanning on artworks, and carries out classification according to the shapes of the artworks; the data storage system performs conversion and feature extraction on the three-dimensional scanning data, stores the data, matches the data obtained by scanning through the matching system after the data is prevented from being lost, confirms whether the artwork is similar to the artwork in the database, divides the artwork according to the matching frequency of the similar artwork, and stores the artwork in the database; wherein the artworks which are judged to be matched for more than 5 times are common artworks and can be authenticated by novice students, and the artworks which are judged to be matched for less than 5 times and can be authenticated by old students can be authenticated through an authentication system, so that authentication teaching is performed in a targeted manner.
Owner:深圳壹盆花文创科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products