Authentication system and method for issuing user identification certificate

A user identification and authentication system technology, applied in the field of authentication system and user identification certificate issuance, can solve the problems of difficult to support identification tasks, high cost, complex authentication system management and supervision, etc., to avoid security threats, high security, reduce cost effect

Active Publication Date: 2007-09-19
广东南方信息安全产业基地有限公司
View PDF0 Cites 57 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It is especially difficult to support identification tasks in systems such as multi-agents and la

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication system and method for issuing user identification certificate
  • Authentication system and method for issuing user identification certificate
  • Authentication system and method for issuing user identification certificate

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] At first the definitions and descriptions of terms involved in the present invention:

[0060] Key generation base: mainly includes public key generation base and private key generation base.

[0061] Public key generation base: mainly includes root public key generation base and scope public key generation base.

[0062] Private key generation base: mainly includes root private key generation base and scope private key generation base.

[0063] Root key generation base: mainly includes root public key generation base and root private key generation base.

[0064] Scope key generation base: mainly includes scope public key generation base and scope private key generation base.

[0065] In the present invention, a unified key generation parameter can be constructed based on the elliptic curve algorithm, and then a large-scale user key can be obtained from the key generation parameter through a combination algorithm by using the user identification as an input parameter...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses authentication system, including a user's terminal body for applying user's label certification by user's label information; a subsystem key generation basis to generate a user key generation basis for user key accounting including a public key generation basis and a private key generation basis; a certification management subsystem for responding the application of the user's terminal body to generate the public key and private key of the user with the user's label, the user key generation basis and the user's label combination accounting, and to sign the user's label certification including the public key and private key of the user and send them the certification to the applied user's terminal body. In addition, the invention discloses a corresponding method of releasing user's label certification. The invention takes advantages of low cost without a third party certifying, achieving key producing with scale and low requirement to the system resource and scale.

Description

technical field [0001] The invention relates to the technical field of security authentication, and more specifically, the invention relates to an authentication system and a method for issuing user identification certificates. Background technique [0002] With the continuous development of network and informatization applications, security issues have become the focus of network and informatization work. Authentication technology to ensure transaction security is one of the main fields of information technology. The industry urgently needs to realize security authentication and establish a trusted network system so that Provide services such as authenticity certification, responsibility certification, and digital signatures for network transactions. On the other hand, after more than ten years of development, there are currently two popular authentication systems in the world: one is based on public key infrastructure (PKI) technology The second is the authentication syste...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/08
Inventor 郭国章田文春郑东曦
Owner 广东南方信息安全产业基地有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products