CN110225515B - Authentication management system, method and device - Google Patents

Authentication management system, method and device Download PDF

Info

Publication number
CN110225515B
CN110225515B CN201910547573.9A CN201910547573A CN110225515B CN 110225515 B CN110225515 B CN 110225515B CN 201910547573 A CN201910547573 A CN 201910547573A CN 110225515 B CN110225515 B CN 110225515B
Authority
CN
China
Prior art keywords
encrypted
unit
authentication
computer devices
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910547573.9A
Other languages
Chinese (zh)
Other versions
CN110225515A (en
Inventor
不公告发明人
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Kasima Beijing Technology Co ltd
Original Assignee
Kasima Beijing Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kasima Beijing Technology Co ltd filed Critical Kasima Beijing Technology Co ltd
Priority to CN201910547573.9A priority Critical patent/CN110225515B/en
Publication of CN110225515A publication Critical patent/CN110225515A/en
Application granted granted Critical
Publication of CN110225515B publication Critical patent/CN110225515B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent

Abstract

The invention belongs to the technical field of network authentication, and particularly relates to an authentication management system, method and device. The system comprises: an authentication request unit provided on each of the different computer devices; the authentication request units each include at least: the system comprises a radio frequency unit, a network identification storage unit, an authentication verification unit and a wireless data transmission unit; the system also comprises a network construction unit arranged on each different computer device; the network construction unit responds to the command of the authentication request unit to construct an encryption sub-network, and the encryption sub-network is used for data transmission of two computers passing authentication verification. The method has the advantage of high safety, and meanwhile, automatic authentication connection is realized.

Description

Authentication management system, method and device
Technical Field
The invention belongs to the technical field of network authentication, and particularly relates to an authentication management system, method and device.
Background
At present, scenes such as operating an online bank, performing e-commerce transaction, rich media (RCS) communication and the like by using a user terminal are increasingly common, a Wi-Fi network in a public place may be malicious, the malicious Wi-Fi network can monitor and intercept network messages very easily, and even if a secure Wi-Fi network or an operator data network has the possibility of monitoring and intercepting network messages.
For example, when a user logs in an e-commerce website to perform online shopping and completes a transaction, the user is required to input sensitive information such as a payment account number and a password, and a network from a terminal operated by the user to the e-commerce website server or the payment server is unreliable and may be monitored and intercepted by a hacker, so that the information such as the account number and the password is leaked, and economic loss of the user is caused. Therefore, a secret key used for encryption needs to be obtained through negotiation between the user terminal and the server to encrypt communication contents, two schemes for establishing a secure encryption channel exist in practical application at present, one scheme is that a secret key for two-party communication is obtained through a secret key exchange algorithm and is used for encrypting the communication contents, and the secret key exchange scheme cannot solve the problem of man-in-the-middle attack and cannot ensure the security of communication; another scheme is to obtain a secret key for both parties to communicate by using a public and private key and a certificate, for encrypting the communication content, in this scheme, a party to communicate needs to apply for a certificate to an authoritative Certificate Authority (CA), which needs to pay a certain fee, usually the certificate has a certain validity period, and needs to be replaced periodically, and the certificate is troublesome to update.
Disclosure of Invention
In view of the above, the main objective of the present invention is to provide an authentication management system, method and device, which have the advantage of high security and simultaneously implement automatic authentication connection.
In order to achieve the purpose, the technical scheme of the invention is realized as follows:
an authentication management system, the system comprising: an authentication request unit provided on each of the different computer devices; the authentication request units each include at least: the system comprises a radio frequency unit, a network identification storage unit, an authentication verification unit and a wireless data transmission unit; the system also comprises a network construction unit arranged on each different computer device; the network construction unit responds to the command of the authentication request unit to construct an encryption sub-network, and the encryption sub-network is used for data transmission of two computers passing authentication verification.
Further, the authentication verification unit includes: the system comprises a radio frequency Identification (ID) verification module, a network Identification (ID) verification module and a distance verification module; the radio frequency identification ID verification module verifies the radio frequency ID of the opposite side equipment; the network identification ID verification module is used for verifying the network identification ID of the opposite device; and the distance verification module is used for verifying the distance of the opposite equipment.
Further, each computer device has at least one network building unit.
Further, the network construction unit includes: the device comprises an encrypted channel generating unit, an encrypted channel connecting unit and an encryption and decryption algorithm unit; the encrypted channel generating unit is used for generating an encrypted channel for communication of two computer devices; the encrypted channel connecting unit is used for connecting encrypted channels of two pieces of computer equipment, completing the construction of the encrypted channels and completing the encrypted transmission of channel transmission; and the encryption and decryption algorithm unit is used for encrypting and decrypting the data transmitted in the encrypted channel by adopting an encryption and decryption algorithm to finish the encryption transmission of the data transmission.
Further, when the two computer devices to be connected are used for establishing the encrypted channels, the generated methods of the encrypted channels may be the same or different; when the encrypted channel generation methods are the same, the encrypted channel connection unit directly connects the two channels; when the encrypted channel generation methods are different, the encrypted channel connection units of the two parties convert the corresponding generated encrypted channels into a temporary channel connection of a uniform system so as to realize the communication of two different channels.
An authentication management method, the method performing the steps of:
step 1: when two computer devices to be connected are mutually authenticated to realize connection, firstly, verifying the radio frequency ID and the network identification ID of the other side, and if the verification fails, terminating the authentication connection; if the verification is passed, executing the step 2;
and 2, step: measuring and calculating the distance between the two computer devices, executing the step 3 if the distance between the two computer devices meets the set distance threshold, and terminating the authentication connection if the distance between the two computer devices does not meet the set distance threshold;
and 3, step 3: the two computer devices generate own encrypted channels and then connect the generated encrypted channels;
and 4, step 4: when transmitting data through the connected encrypted channel, the transmitting side encrypts the transmitted data again, and the receiving side decrypts the received encrypted data again.
Further, the method for establishing the encrypted channel between the two computer devices comprises the following steps: establishing a first communication channel between the two devices; a first device generates a first key and a first identifier, wherein the first identifier is uniquely corresponding to the first key; the first device splits the first key into N parts, wherein N is a positive integer greater than or equal to 2; and the first device sends X parts of the first key and the first identifier to a second device through the first communication channel, and sends the first identifier and the rest part of the first key to the second device through other communication channels, wherein X is a positive integer smaller than N.
Further, the method for encrypting the transmitted data by the two devices again executes the following steps: dividing a plaintext to be encrypted into a plurality of information units; determining the encryption grade of each information unit and a target encryption method corresponding to the encryption grade according to a preset graded encryption decision maker; and encrypting the current plaintext to be encrypted according to the target encryption method of each information unit.
An authentication management apparatus, the apparatus comprising: a non-transitory computer-readable storage medium storing computing instructions, comprising: when two computer devices to be connected are mutually authenticated to realize connection, firstly, verifying the radio frequency ID and the network identification ID of the other side, and if the verification fails, terminating the authentication connection; if the verification is passed, executing the code segment of the subsequent step; measuring and calculating the distance between two computer devices, if the distance between the two computer devices meets a set distance threshold, executing a code segment of a subsequent step, and if the distance between the two computer devices does not meet the set distance threshold, terminating the authentication connection; the two computer devices generate own encrypted channels and then connect the generated encrypted channels; when data is transmitted through a connected encrypted channel, a transmitting party encrypts the transmitted data again, and a receiving party decrypts the received encrypted data.
The authentication management system, the method and the device have the following beneficial effects that: the authentication process is started by automatically identifying the radio frequency ID of two connected devices, and after the authentication is passed, the encryption channel is established and the data transmission mode is encrypted, so that the double encryption is realized, and the security of the data transmission is ensured.
Drawings
Fig. 1 is a system configuration diagram of an authentication management system according to an embodiment of the present invention;
fig. 2 is a flowchart illustrating a method of an authentication management method according to an embodiment of the present invention.
Detailed Description
The method of the present invention will be described in further detail below with reference to the accompanying drawings and embodiments of the invention.
Example 1
An authentication management system, the system comprising: an authentication request unit provided on each of the different computer devices; the authentication request units each include at least: the system comprises a radio frequency unit, a network identification storage unit, an authentication verification unit and a wireless data transmission unit; the system also comprises a network construction unit arranged on each different computer device; the network construction unit responds to the command of the authentication request unit to construct an encryption sub-network, and the encryption sub-network is used for data transmission of two computers passing authentication verification.
In particular, the method comprises the following steps of,
example 2
On the basis of the above embodiment, the authentication verification unit includes: the system comprises a radio frequency Identification (ID) verification module, a network Identification (ID) verification module and a distance verification module; the radio frequency identification ID verification module verifies the radio frequency ID of the opposite side device; the network identification ID verification module is used for verifying the network identification ID of the opposite device; and the distance verification module is used for verifying the distance of the opposite equipment.
Example 3
On the basis of the above embodiment, each computer device has at least one network construction unit.
Example 4
On the basis of the above embodiment, the network construction unit includes: the device comprises an encrypted channel generating unit, an encrypted channel connecting unit and an encryption and decryption algorithm unit; the encrypted channel generating unit is used for generating an encrypted channel for communication of two computer devices; the encrypted channel connecting unit is used for connecting encrypted channels of two computer devices, completing the construction of the encrypted channels and completing the encrypted transmission of channel transmission; and the encryption and decryption algorithm unit is used for encrypting and decrypting the data transmitted in the encrypted channel by adopting an encryption and decryption algorithm to finish the encryption transmission of the data transmission.
Example 5
On the basis of the previous embodiment, when the two computer devices to be connected are used for establishing the encrypted channels, the generated methods of the encrypted channels may be the same or different; when the encrypted channel generation methods are the same, the encrypted channel connection unit directly connects the two channels; when the encrypted channel generation methods are different, the encrypted channel connection units of both sides convert the generated encrypted channels corresponding to the encrypted channels into a temporary channel connection of a uniform system so as to realize the communication of two different channels.
Example 6
An authentication management method, the method performing the steps of:
step 1: when two computer devices to be connected are mutually authenticated to realize connection, firstly, verifying the radio frequency ID and the network identification ID of the other side, and if the verification fails, terminating the authentication connection; if the verification is passed, executing the step 2;
step 2: measuring and calculating the distance between two computer devices, if the distance between the two computer devices meets the set distance threshold, executing the step 3, and if the distance between the two computer devices does not meet the set distance threshold, terminating the authentication connection;
and step 3: the two computer devices generate own encrypted channels and then connect the generated encrypted channels;
and 4, step 4: when transmitting data through the connected encrypted channel, the transmitting side encrypts the transmitted data again, and the receiving side decrypts the received encrypted data again.
Example 7
On the basis of the above embodiment, the method for establishing an encrypted channel between two computer devices comprises: establishing a first communication channel between the two devices; a first device generates a first key and a first identifier, wherein the first identifier is uniquely corresponding to the first key; the first device splits the first key into N parts, wherein N is a positive integer greater than or equal to 2; and the first device sends X parts of the first key and the first identifier to a second device through the first communication channel, and sends the first identifier and the rest part of the first key to the second device through other communication channels, wherein X is a positive integer smaller than N.
Specifically, due to the development of network technologies, in the aspect of influencing the life of people, the network activities of people are more and more frequent, the requirements for security are higher and higher, and the requirements for confidentiality of the network activities are higher and higher. Some encrypted channels are not advanced enough in encryption technology, lack of monitoring results in information leakage, and users are difficult to find the information leakage, so that larger loss is brought.
In particular, the method comprises the following steps of,
example 8
On the basis of the above embodiment, the method for encrypting the transmitted data again by the two devices performs the following steps: dividing a plaintext to be encrypted into a plurality of information units; determining the encryption grade of each information unit and a target encryption method corresponding to the encryption grade according to a preset graded encryption decision maker; and encrypting the current plaintext to be encrypted according to the target encryption method of each information unit.
Specifically, due to the development of network technologies, in the aspect of influencing the life of people, the network activities of people are more and more frequent, the requirements for security are higher and higher, and the requirements for confidentiality of the network activities are higher and higher. Some encrypted channels are not advanced enough in encryption technology, lack of monitoring results in information leakage, and users are difficult to find the information leakage, so that larger loss is brought.
Example 9
An authentication management apparatus, the apparatus comprising: a non-transitory computer-readable storage medium storing computing instructions, comprising: when two computer devices to be connected are mutually authenticated to realize connection, firstly, verifying the radio frequency ID and the network identification ID of the other side, and if the verification fails, terminating the authentication connection; if the verification is passed, executing the code segment of the subsequent step; measuring and calculating the distance between two computer devices, if the distance between the two computer devices meets a set distance threshold, executing a code segment of a subsequent step, and if the distance between the two computer devices does not meet the set distance threshold, terminating the authentication connection; the two computer devices generate own encrypted channels and then connect the generated encrypted channels; when data is transmitted through a connected encrypted channel, a transmitting party encrypts the transmitted data again, and a receiving party decrypts the received encrypted data.
The above description is only an embodiment of the present invention, but not intended to limit the scope of the present invention, and any structural changes made according to the present invention should be considered as being limited within the scope of the present invention without departing from the spirit of the present invention.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working process and related description of the system described above may refer to the corresponding process in the foregoing method embodiments, and will not be described herein again.
It should be noted that, the system provided in the foregoing embodiment is only illustrated by dividing the functional modules, and in practical applications, the functions may be distributed by different functional modules according to needs, that is, the modules or steps in the embodiment of the present invention are further decomposed or combined, for example, the modules in the foregoing embodiment may be combined into one module, or may be further split into multiple sub-modules, so as to complete all or part of the functions described above. Names of the modules and steps related in the embodiments of the present invention are only for distinguishing the modules or steps, and are not to be construed as unduly limiting the present invention.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes and related descriptions of the storage device and the processing device described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
Those of skill in the art will appreciate that the various illustrative modules, method steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that programs corresponding to the software modules, method steps may be located in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art. To clearly illustrate this interchangeability of electronic hardware and software, various illustrative components and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as electronic hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The terms "first," "second," and the like are used for distinguishing between similar elements and not necessarily for describing or implying a particular order or sequence.
The terms "comprises," "comprising," or any other similar term are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
So far, the technical solutions of the present invention have been described in connection with the preferred embodiments shown in the drawings, but it is easily understood by those skilled in the art that the scope of the present invention is obviously not limited to these specific embodiments. Equivalent changes or substitutions of related technical features can be made by those skilled in the art without departing from the principle of the invention, and the technical scheme after the changes or substitutions can fall into the protection scope of the invention.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the scope of the present invention.

Claims (5)

1. An authentication management system, the system comprising: an authentication request unit provided on each of the different computer devices; the authentication request units each include at least: the system comprises a radio frequency unit, a network identification storage unit, an authentication verification unit and a wireless data transmission unit; the system also comprises a network construction unit arranged on each different computer device; the network construction unit responds to the command of the authentication request unit to construct an encryption sub-network, and the encryption sub-network is used for data transmission of two computers passing authentication verification; the authentication verification unit includes: the system comprises a radio frequency Identification (ID) verification module, a network Identification (ID) verification module and a distance verification module; the radio frequency identification ID verification module verifies the radio frequency ID of the opposite side device; the network identification ID verification module is used for verifying the network identification ID of the opposite device; the distance verification module is used for verifying the distance of the opposite equipment; the network construction unit includes: the device comprises an encrypted channel generating unit, an encrypted channel connecting unit and an encryption and decryption algorithm unit; the encrypted channel generating unit is used for generating an encrypted channel for communication of two computer devices; the encrypted channel connecting unit is used for connecting encrypted channels of two computer devices, completing the construction of the encrypted channels and completing the encrypted transmission of channel transmission; the encryption and decryption algorithm unit is used for encrypting and decrypting data transmitted in the encryption channel by adopting an encryption and decryption algorithm to finish encryption transmission of data transmission; each computer device is provided with at least one network construction unit; when two computer devices to be connected are used for establishing an encrypted channel, the generated methods of the encrypted channels may be the same or different; when the encrypted channel generation methods are the same, the encrypted channel connection unit directly connects the two channels; when the encrypted channel generation methods are different, the encrypted channel connection units of both sides convert the generated encrypted channels corresponding to the encrypted channels into a temporary channel connection of a uniform system so as to realize the communication of two different channels.
2. An authentication management method based on the system of claim 1, characterized in that the method performs the following steps:
step 1: when two computer devices to be connected mutually authenticate to realize connection, firstly, verifying the radio frequency ID and the network identification ID of the other side, and if the verification fails, terminating the authentication connection; if the verification is passed, executing the step 2;
step 2: measuring and calculating the distance between two computer devices, if the distance between the two computer devices meets the set distance threshold, executing the step 3, and if the distance between the two computer devices does not meet the set distance threshold, terminating the authentication connection;
and 3, step 3: the two computer devices generate own encrypted channels and then connect the generated encrypted channels;
and 4, step 4: when transmitting data through the connected encrypted channel, the transmitting side encrypts the transmitted data again, and the receiving side decrypts the received encrypted data again.
3. The method of claim 2, wherein the method of establishing an encrypted channel between the two computer devices comprises: establishing a first communication channel between the two devices; a first device generates a first key and a first identifier, wherein the first identifier is uniquely corresponding to the first key; the first device splits the first key into N parts, wherein N is a positive integer greater than or equal to 2; and the first device sends X parts of the first key and the first identifier to a second device through the first communication channel, and sends the first identifier and the rest part of the first key to the second device through other communication channels, wherein X is a positive integer smaller than N.
4. A method according to claim 3, characterized in that the method of the two devices encrypting the transmitted data again performs the following steps: dividing a plaintext to be encrypted into a plurality of information units; determining the encryption grade of each information unit and a target encryption method corresponding to the encryption grade according to a preset graded encryption decision maker; and encrypting the current plaintext to be encrypted according to the target encryption method of each information unit.
5. An authentication management apparatus based on the authentication management method according to any one of claims 2 to 4, the apparatus comprising: a non-transitory computer-readable storage medium storing computing instructions, comprising: when two computer devices to be connected mutually authenticate to realize connection, firstly, verifying the radio frequency ID and the network identification ID of the other side, and if the verification fails, terminating the authentication connection; if the verification is passed, executing the code segment of the subsequent step; measuring and calculating the distance between two computer devices, if the distance between the two computer devices meets a set distance threshold, executing a code segment of a subsequent step, and if the distance between the two computer devices does not meet the set distance threshold, terminating the authentication connection; the two computer devices generate own encrypted channels and then connect the generated encrypted channels; when transmitting data through the connected encrypted channel, the transmitting side encrypts the transmitted data again, and the receiving side decrypts the received encrypted data again.
CN201910547573.9A 2019-06-24 2019-06-24 Authentication management system, method and device Active CN110225515B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910547573.9A CN110225515B (en) 2019-06-24 2019-06-24 Authentication management system, method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910547573.9A CN110225515B (en) 2019-06-24 2019-06-24 Authentication management system, method and device

Publications (2)

Publication Number Publication Date
CN110225515A CN110225515A (en) 2019-09-10
CN110225515B true CN110225515B (en) 2022-08-23

Family

ID=67814562

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910547573.9A Active CN110225515B (en) 2019-06-24 2019-06-24 Authentication management system, method and device

Country Status (1)

Country Link
CN (1) CN110225515B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20130047300A (en) * 2011-10-31 2013-05-08 삼성전자주식회사 Apparatus and method for configurating access in wireless network
CN103475661A (en) * 2013-09-12 2013-12-25 深圳市文鼎创数据科技有限公司 Method and system for safely obtaining authentication programs
CN104580189A (en) * 2014-12-30 2015-04-29 北京奇虎科技有限公司 Safety communication system
CN104618113A (en) * 2015-01-20 2015-05-13 西安交通大学 Method for authenticating identity of mobile terminal and constructing safety channel
WO2017123433A1 (en) * 2016-01-04 2017-07-20 Clevx, Llc Data security system with encryption

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20130047300A (en) * 2011-10-31 2013-05-08 삼성전자주식회사 Apparatus and method for configurating access in wireless network
CN103475661A (en) * 2013-09-12 2013-12-25 深圳市文鼎创数据科技有限公司 Method and system for safely obtaining authentication programs
CN104580189A (en) * 2014-12-30 2015-04-29 北京奇虎科技有限公司 Safety communication system
CN104618113A (en) * 2015-01-20 2015-05-13 西安交通大学 Method for authenticating identity of mobile terminal and constructing safety channel
WO2017123433A1 (en) * 2016-01-04 2017-07-20 Clevx, Llc Data security system with encryption

Also Published As

Publication number Publication date
CN110225515A (en) 2019-09-10

Similar Documents

Publication Publication Date Title
CN102812684B (en) Implement the system and method for computer strategy
CN100580657C (en) Distributed single sign-on service
CN105553951A (en) Data transmission method and data transmission device
CN105553666B (en) Intelligent power terminal safety authentication system and method
EP2879421B1 (en) Terminal identity verification and service authentication method, system, and terminal
CN104660605A (en) Multi-factor identity authentication method and system
CN103297403A (en) Method and system for achieving dynamic password authentication
CN113497778A (en) Data transmission method and device
CN111512608A (en) Trusted execution environment based authentication protocol
CN103118363A (en) Method, system, terminal device and platform device of secret information transmission
Li et al. A secure sign-on protocol for smart homes over named data networking
CN114765534B (en) Private key distribution system and method based on national secret identification cryptographic algorithm
CN107094156A (en) A kind of safety communicating method and system based on P2P patterns
CN105812334A (en) Network authentication method
CN112351037A (en) Information processing method and device for secure communication
CN103634265A (en) Method, device and system for security authentication
CN111416712B (en) Quantum secret communication identity authentication system and method based on multiple mobile devices
CN111756528A (en) Quantum session key distribution method and device and communication architecture
CN110138558B (en) Transmission method and device of session key and computer-readable storage medium
CN113411187A (en) Identity authentication method and system, storage medium and processor
CN109451504B (en) Internet of things module authentication method and system
CN107888548A (en) A kind of Information Authentication method and device
CN107786978B (en) NFC authentication system based on quantum encryption
US10671717B2 (en) Communication device, communication method and computer program
Fukumitsu et al. A proposal of a password manager satisfying security and usability by using the secret sharing and a personal server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20220729

Address after: Room 425, 4th floor, No. 6, South Third Street, Zhongguancun, Haidian District, Beijing 100089

Applicant after: Kasima (Beijing) Technology Co.,Ltd.

Address before: Room 1301, building 3, Haiyin Xingyue, No. 555, North Panyu Avenue, Panyu District, Guangzhou, Guangdong 510000

Applicant before: Yan Baohua

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant