Uni-directional cross-domain identity verification based on low correlation of private cipher key and application thereof

An identity verification method and private key technology, applied in the direction of user identity/authority verification, etc., can solve problems such as one-way identity verification function, separate registration, etc., and achieve the effect of good privacy, low correlation, and convenient use

Inactive Publication Date: 2009-07-08
黄希 +1
View PDF0 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method solves the problem that users (End users) need to register and log in separately to access different websites on computers or mobile phones to obtain personalized services, and realize that after logging in at the service master station (CommonID ​​Server), users can...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Uni-directional cross-domain identity verification based on low correlation of private cipher key and application thereof
  • Uni-directional cross-domain identity verification based on low correlation of private cipher key and application thereof
  • Uni-directional cross-domain identity verification based on low correlation of private cipher key and application thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0035] Figure 2 ~ Figure 4 Show the specific process of the present invention, by figure 2 , image 3 It can be seen that the low-correlation one-way cross-domain authentication method based on the private key includes the following steps:

[0036] (1-1) Before users operate, in order to support the identification number (CommonID) function, the alliance website needs to make the following modifications to the original system (see Figure 4 ): (1) Add "receiving module" and "data access module". The function of "receiving module" is to obtain two parameters from the service master station: identification number and key; (2) Add "CommonID ​​automatic login module" and "CommonID ​​automatic registration module", "CommonID ​​automatic login module" is to realize the common ID + password The "CommonID ​​automatic registration module" is to realize the automatic registration through the identification number CommonID+key method, and the parameters required for the user registr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for low-correlation one-way cross-domain identity authentication based on private key. The method comprises the following steps: a user registers a user name in a common ID server and the system allocates a common ID to the user if the registration is successful; the user logins to the common ID server to acquire the authenticated ID; the user clicks the link of a Website in the common ID server and the common ID server transfers the common ID of the user and a relevant key to the Website; the Website receives the parameters transferred from the common ID server, if determining the first visit, allocates the user name to the user by use of the acquired two parameters (i.e. common ID and key) and calls a log-in module to succeed in the identity authentication; and if determining the second visit, the Website calls the log-in module to succeed in the identity authentication by use of the acquired two parameters (i.e. common ID and key). The method is applied to the log-in procedure bound to the mobile telephone number of the user and the multiple internet application names of the user in the mobile internet, and has the advantages of good privacy property, easy use, convenience for network management and strong applicability.

Description

technical field [0001] The invention relates to an Internet identity verification technology, in particular to a private key-based low-correlation one-way cross-domain identity verification method and its application. Background technique [0002] General Internet applications require users to submit information to register and log in, so as to provide personalized services. In order to solve the problem that users need to repeatedly register and log in repeatedly when visiting different websites, there is currently an open and discrete method for user digital identification called OpenID. The authentication process of this method is as follows: figure 1 As shown, the following steps are included: (1) the end user (End User) first needs to register an OpenID account on the OpenID service website (OpenID Provider), and the OpenID account generally adopts the form of URL (Uniform Resource Locator Uniform Resource Locator); (2) The terminal user visits the business website (We...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32
Inventor 黄希伍如建
Owner 黄希
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products