Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

58 results about "Password" patented technology

A password, sometimes called a passcode, is a memorized secret used to confirm the identity of a user. Using the terminology of the NIST Digital Identity Guidelines, the secret is memorized by a party called the claimant while the party verifying the identity of the claimant is called the verifier. When the claimant successfully demonstrates knowledge of the password to the verifier through an established authentication protocol, the verifier is able to infer the claimant’s identity.

Authentication system and method

InactiveUS20090193264A1Digital data authenticationCoded identity card or credit card actuationAuthentication systemStrong authentication
A strong authentication method and system using a Secure ICC component coupled with a Personal device, and relying on the existing cryptographic protocols and keys for managing the secure ICC to generate One-Time-Passwords when the necessary authentication keys or cryptographic protocols are not already present in the Secure ICC configuration for that purpose.
Owner:ACTIVIDENTITY

User logging-in method under system control

The invention provides a user logging-in method under system control. The method comprises: a user logs in a system; the system determines whether the logging in is realized by means of manual inputting or USB Key; if the logging in is realized by using a USB Key, the information in the USB Key is read by the system and the user inputs card number and password information, so that the user can log in the system without being limited by an IP and an Mac address; and after USB Key acknowledge, the system sends a random short-message verification code to the user, the user inputs the verification code and can not log in the system until the verification code is correct, and the system checks the correctness of the verification code and thus the logging in is done successfully. And if the logging in is realized by the manual logging in way, the user inputs a user name and a password; after the information is checked to be correct, the system sends a random short-message verification code to the user; the user inputs the verification code and can not log in the system until the verification code is correct, and the system checks the correctness of the verification code and thus the logging in is done successfully. Compared with the prior art, the method has advantages of high practicability, security and flexibility.
Owner:安徽天达网络科技有限公司

File encryption operation method and file encryption operation system

The invention discloses a file encryption operation method and a file encryption operation system. The method comprises the steps of: receiving a file operation instruction; transferring an encrypted target file according to the file operation instruction; carrying out memory decryption on the encrypted target file according to key information corresponding to the encrypted target file, and operating the encrypted target file after memory decryption. According to the scheme disclosed by the invention, the password of the encrypted target file does not need to be manually input; opening and operating of the file can be achieved by decrypting the file without a manual operation, and the operating efficiency of the key information is improved. On the other hand, the encrypted target file is decrypted by the key information in the memory; the decrypted file is stored in the memory, and a permanent file is not generated, therefore, the password is not stolen by the others, and the operating security of the encrypted file is improved.
Owner:TENCENT TECH (SHENZHEN) CO LTD +1

Touch-screen-terminal customized lock screen system

The invention relates to a touch-screen-terminal customized lock screen system which comprises a lock-screen attribute setting subsystem and a lock-screen password setting subsystem. The lock-screen attribute setting subsystem is used for setting personal attributes of a touch-screen terminal lock screen, and the lock-screen password setting subsystem is used for setting passwords for the touch-screen terminal lock screen; the lock screen attribute setting subsystem comprises password lock-screen background setting modules, a floating-window display content setting module and a password pattern setting module; the password lock-screen background setting modules include background image setting modules and a background music setting module which are used for setting background images and music of the password lock screen; the floating-window display content setting module is used for setting floating-window display content, the floating-window display content can be displayed in a floating-window displaying mode in the touch-screen terminal lock screen state, and the floating-window display content is used for reminding users of some important information content; the password pattern setting module is used for setting password patterns. By the arrangement, personalized touch-screen-terminal customized lock screen system high in interestingness can be customized.
Owner:SUZHOU TIANPING ADVANCED DIGITAL TECH

Two-dimensional code transmitting and activation method and system

ActiveCN105761090AImprove protectionSecure coding dynamic managementCommerceActivation methodComputer hardware
A two-dimensional code transmitting and activation method and system are disclosed. An enterprise server in the two-dimensional code transmitting method transmits a code transmitting request including but not limited to a device number, an enterprise code, a register account and a login password to a cloud platform through a dedicated code transmitting channel in the production process; the cloud platform receives the code transmitting request, and determines whether the enterprise code, register account and login password are consistent with the enterprise code, register account and login password that are allocated to an enterprise by the cloud platform and whether the device number is associated with the dedicated code transmitting channel; if so, the cloud platform receives the code transmitting request and encrypts an original code to generate and transmit a cloud code with an irregular character sequence to the enterprise server; and the enterprise server receives the cloud code, generates a two-dimensional code adhered to the outer layer of a commodity through a two-dimensional code generating algorithm, and in this way, a secure and reliable code dynamic management Internet code transmitting solution can be provided to the production enterprise.
Owner:深圳中检网络传媒有限公司

Network connection method, network connection device and terminal

ActiveCN106131834AImprove user security experienceImprove securitySecurity arrangementPasswordNetwork connection
The invention provides a network connection method, a network connection device and a terminal. The network connection method comprises the steps of judging whether the SSID (Service Set Identifier), BSSID (Basic Service Set Identifier) and connection password of the wireless network access point are correspondingly stored in a preset safe network list or not when a wireless network access point is scanned; obtaining preset authentication information corresponding to the wireless network access point when the judging result is yes, encrypting the preset authentication information through a preset encryption key and sending the encrypted preset authentication information to the wireless network access point; detecting whether the response information of the wireless network access point for the encrypted preset authentication information is received or not; and determining whether to establish connection with the wireless network access point by employing the connection key or not according to the response information when it is detected that the response information is received. According to the technical scheme, the security of automatic connection with a wireless network can be effectively improved, the connection with phishing is avoided, the information security of the user is ensured, and the use safety experience of the user is improved.
Owner:YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD

Authentication system and method using flash of smart mobile

It is capable of authentication by transmitting through light emitted from a flash of a smart mobile according to foregoing solution of the problem, security and stability can be improved in comparison with other authentication systems such as an ID, a password and a public authentication which are necessary to a bank task, a personal authentication, an identity authentication and a transaction remittance. And, even if the smart mobile is lost or a stranger acquiring this are misappropriating, cryptography such as patterns cannot be solved thereby it is not available. Further, carrying is easy to use anywhere regardless of the place because the transaction is available using a flash equipped to the smart mobile.
Owner:B PLAT LLC

Polyphonic ringtone business system and implementation method based on converged communication

The invention relates to a polyphonic ringtone business system and an implementation method based on converged communication. The polyphonic ringtone business system and the implementation method based on converged communication include that a called client-side orders the polyphonic ringtone business with a music portal module in advance. A calling client-side sends a call request to a call control module. The call control module extracts account information of the called client-side and sending to a business authentication module and meanwhile calls for a request to retransmit the account information to the called client-side. The business authentication module sends a business authentication request to the music portal module based on the account information of the called client-side. The music portal module authenticates the authentication request, and sends ordering information to the business authentication module if the authentication is passed, and meanwhile sends a authentication password to a music library. A polyphonic ringtone broadcast module downloads the polyphonic ringtone scheduled by the called client-side in the music library according to the ordering information, and sends the polyphonic ringtone to the calling client-side after a code stream switch of the polyphonic ringtone. The polyphonic ringtone business system based on converged communication is simple in structure, easy to realize, and low in cost. Polyphonic ringtone business which is personalized and low in cost can be provided for users.
Owner:北京思特奇信息技术股份有限公司

Unlocking device and method thereof

The invention discloses an unlocking device and a method thereof, both applied to an electronic device. The unlocking device is characterized by comprising a setting unit for setting a first unlocking password and a second unlocking password, a storage unit for storing default data, a shielding unit for shielding the default data, a time control unit for setting a default time and a calculation unit; the unlocking device is further characterized in that the electronic device receives a first password in the to-be-unlocked state, if the calculation unit determines that the first password is consistent with the first unlocking password, the electronic device enters the first unlocking state, and at this moment, if the electronic device enters the to-be-unlocked state again in the predetermined time and receives a second password at least once in the to-be-unlocked state, and if the calculation unit determines that the second password is inconsistent with the first unlocking password and the second unlocking password for a plurality of times, the storage unit deletes the stored default data. Due to the adopted electronic device, a user can set two unlocking passwords for the electronic device; when the electronic device enters a to-be-unlocked screen again in the predetermined time after the first time of unlocking, and if the passwords received by the user for a plurality of times are different from the two unlocking passwords, partial data of the electronic device are automatically deleted, and therefore, the security of the personal information of the user can be effectively improved. In addition, twice unlocking is adopted by the unlocking device so that the security of the electronic device is effectively enhanced.
Owner:苏州天鸣信息科技有限公司

Physical no-cloning technology based RFID card type intelligent door lock

The invention discloses a physical no-cloning technology based RFID card type intelligent door lock. The physical no-cloning technology based RFID card type intelligent door lock comprises RFID cards,a door lock and a database, wherein the database is arranged on a background server; while ID which corresponds to the RFID cards is received, data is compared with data in the database through an internet; the database is used for storing ID which corresponds to each RFID card; a door lock inner chip comprises a PUF circuit; the RFID chip comprises an RFID module which is used for generating motivation; after receiving the motivation, the PUF circuit generates a corresponding secret key; and the database provides a matching source and is compared with the secret key generated by the PUF circuit, so that authentication is realized, and therefore, unlocking is performed based on a door lock password authentication mode. The PUF circuit can resist probe attack and physical attack, and is not stored with the secret key information, so that other people cannot read a chip secret key through a probe and the like to steal inner information, and therefore, safety of the door lock is greatlyimproved.
Owner:HOHAI UNIV CHANGZHOU

Method for locking/unlocking bottle cap

ActiveCN102249035ALocking devicesPasswordBottle cap
The invention relates to the field of anti-fake and anti-theft technologies of bottled products and particularly relates to a method for locking/unlocking a bottle cap. The method comprises the following steps of: A, obtaining an initial unlocking password, adjusting the password of a bottle cap lock to an initial unlocking password, and then starting an unlocking device to open the locked cap; B, adjusting the bottle cap lock to a password modifying state, then adjusting the password of the bottle cap lock to a preset password, and then adjusting the bottle cap lock to a decrypting state; C,installing the bottle cap lock at the bottle opening of a primary product and locking the bottle cap lock, and then adjusting the password of the bottle cap lock to be different from the preset password; and D, adjusting the password of the bottle cap lock, unlocking the locked cap of the bottle cap lock when the password of the bottle cap lock is as same as the preset password, and keeping the locking state of the locked cap of the bottle cap lock when the password of the bottle cap lock is different from the preset password. The method for locking/unlocking the bottle cap, disclosed by the invention, has the advantages of good security performance for effectively preventing people who can contact the bottle from opening the locked bottle cap and strong maneuverability for setting and modifying the unlocking password.
Owner:YIFENG MFG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products