Unlock instant, AI-driven research and patent intelligence for your innovation.

Method, device and system for realizing user authentication by utilizing public key infrastructure

A public key infrastructure and user identity technology, applied in the trust model of public key infrastructure, user identity/authority verification, transmission system, etc., can solve the problem of low security of user identity verification

Inactive Publication Date: 2010-06-16
BEIJING WATCH DATA SYST
View PDF0 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In order to solve the problem of low security of user identity verification, an embodiment of the present invention provides a method for implementing user identity verification using public key infrastructure, including:

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system for realizing user authentication by utilizing public key infrastructure
  • Method, device and system for realizing user authentication by utilizing public key infrastructure
  • Method, device and system for realizing user authentication by utilizing public key infrastructure

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] In order to solve the problem of low security of user identity verification, the embodiment of the present invention provides a method for realizing user identity verification by using public key infrastructure. The device deployment and implementation of this embodiment, such as figure 1 As shown, the PKI authentication device in this embodiment is connected to a PC as a USB device, and the PKI authentication device is equipped with a camera for image collection, and the PC is connected to a financial or other payment server through the Internet.

[0031] The user's facial feature information stored in the PKI authentication device is collected and pre-stored when the device is issued, and can only be changed by special departments using special devices in the future. The method flow is as follows figure 2 shown, including:

[0032] Step 101: The user first accesses the financial server through the Internet from the client PC, and the financial server prompts to inp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses method and system for realizing user authentication by utilizing a public key infrastructure in order to solve the problem of lower safety of the user authentication. The method comprises the following steps: a public key infrastructure PKI authentication device obtains video information obtained by real-time video collection and transmits the obtained video information toa server; the server generates random numbers by utilizing the video information as a parameter and transmits the random numbers to the PKI authentication device; the PKI authentication device generates dynamic passwords according to the random numbers, makes a signature through the private key and transmits the signed dynamic passwords to the server; and the server authenticates the signed dynamic passwords according to the public key and the random numbers. The video information obtained by real-time dynamic collection is used as the random number generation source, thereby greatly improving the randomness and safety of user authentication.

Description

technical field [0001] The invention belongs to the technical field of information processing, and in particular relates to a method, device and system for realizing user identity verification by using public key infrastructure. Background technique [0002] With the popularization of the Internet, people communicate more and more through the Internet, and correspondingly, business activities through the Internet, that is, e-commerce, have also been extensively developed. E-commerce provides a golden opportunity for enterprises to develop markets and utilize various resources. For enterprises, e-commerce truly embodies the advantages of equal competition, high efficiency, low cost, and high quality, and enables enterprises to grasp business opportunities and stand out in the fierce market competition. However, with the rapid development of e-commerce, some Internet security problems have been caused accordingly. In order to solve these Internet security problems, through y...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32H04N5/225
CPCH04L9/006
Inventor 何洋
Owner BEIJING WATCH DATA SYST