Method and device for user identity authentication

A user identity authentication and identity authentication technology, which is applied in the field of user identity authentication, can solve problems such as potential safety hazards in electronic service systems, and achieve the effects of avoiding expansion, ensuring service quality, and improving security

Active Publication Date: 2010-12-22
吴晓军
View PDF3 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Then, if the USBKEY is attacked by the network and the PIN code is cracked during the verification process, the USBKEY will still consider the user of the PIN code to be a legitimate user, and then digitally sign the service data and send it to the server, and the serv

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for user identity authentication
  • Method and device for user identity authentication
  • Method and device for user identity authentication

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0028] The invention provides a user identity authentication method and device, which are used to improve the security of an electronic service system.

[0029] Preferred embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0030] refer to figure 1 As shown, in the embodiment of the present invention, several clients and servers are included in the e-commerce network, wherein,

[0031] refer to figure 2 As shown, in the embodiment of the present invention, the client includes an acquisition unit 10, a digital signature unit 11 and a communication unit 12, wherein,

[0032] An acquisition unit 10, configured to acquire service data generated when the user uses the electronic service, and receive an identity verification code input by the user;

[0033] A digital signature unit 11, configured to use the service data and the identity verification code together as data to be signed for digital signature process...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an encryption and decryption technology and discloses a method for user identity authentication, which is used for improving safety of a digital signature procedure. The method comprises the following steps: redesigning the whole digital signature process, cancelling originally unreliable links for the user identity authentication at a client-side, and safely retruding the identity authentication process to a server side for accomplishment. The server side can effectively monitor the network environment and timely perceives network attack, thus the effective solutionsfor resisting the network attack can be rapidly adopted and the expansion of the network attack can be avoided, thereby improving the safety of an electronic service system and ensuring the service quality of the electronic service system. The invention also discloses a client-side and a server for the user identity authentication.

Description

technical field [0001] The invention relates to encryption and decryption technology, in particular to a method and device for user identity authentication. Background technique [0002] At present, digital signature technology has been used in various electronic service (eg, e-commerce, e-government, online office, etc.) systems. Digital signature technology is to encrypt the summary information with the sender's private key and transmit it to the receiver together with the original text. The recipient can only decrypt the encrypted summary information with the sent public key, and then use the HASH function to generate a summary information for the received original text, and compare it with the decrypted summary information. If they are the same, it means that the received information is complete and has not been modified during transmission, otherwise it means that the information has been modified, so the digital signature can verify the integrity of the information. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/06
Inventor 吴晓军
Owner 吴晓军
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products