Identity authentication method, identity authentication equipment, server and identity authentication-based encryption method

A technology of identity authentication and encryption method, which is applied in the field of authentication, can solve problems such as economic losses, and achieve the effect of non-repudiation

Active Publication Date: 2013-11-27
BEIJING WATCH DATA SYST
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The identity authentication device of the above type can confirm the authenticity of the key transaction data, but when the user's identity authentication device is stolen by other people, and the thief steals the user's operation password (i.e. password) at the same time, the thief will completely After obtaining all the permissions of the legal user, it is possible to perform transaction operations such as transfer before the user reports the loss, thereby causing economic losses to the user
Moreover, there are also problems in the above-mentioned identity authentication equipment in terms of non-repudiation. This is because if the user with the identity authentication equipment does not admit it after using the identity authentication equipment to carry out a certain transaction, the identity authentication equipment is stolen and used by others under the pretense. There is no direct evidence to fully prove that the transaction was completed by the user himself

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method, identity authentication equipment, server and identity authentication-based encryption method
  • Identity authentication method, identity authentication equipment, server and identity authentication-based encryption method
  • Identity authentication method, identity authentication equipment, server and identity authentication-based encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0053] In this embodiment, the entire user identity authentication process includes two parts: the encryption process performed by the USBKey and the authentication process performed by the verifier. Figure 1A and Figure 1B The flow shown is explained.

[0054] refer to Figure 1A , which is one of the flowcharts of the encryption method based on identity authentication described in Embodiment 1 of the present invention.

[0055] Perform the following steps as a USBKey as an authentication device:

[0056] Step 111, receive confidential data and handwritten signature;

[0057] Wherein, the confidential data refers to transaction data, e-commerce data or electronic documents and other data transmitted between the USBKey and the verifier, and the verifier refers to the party that needs to authenticate the user's identity in various fields such as the background program of online banking .

[0058] The USBKey refers to a USBKey that supports handwritten signatures. After rec...

Embodiment 2

[0093] Based on the content of the first embodiment above, the following will take online banking transactions as an example, through figure 2 and image 3 The flow shown is described in more detail.

[0094] refer to figure 2 , is a transaction flow chart based on USBKey described in Embodiment 2 of the present invention.

[0095] Step 201, initialize the USBKey, enter the corresponding application directory, and obtain the permission to perform transaction operations after passing the user password verification;

[0096] That is, when the user conducts online banking transactions, he uses the USBKey to enter the user password, and after the online banking background verification of the user password is passed, the user can obtain the transaction authority.

[0097] Step 202, the online banking background sends the transaction data to the USBKey;

[0098] The transaction data includes bank name, user name, transaction account number, transaction password and other data....

Embodiment 3

[0116] This embodiment provides an identity authentication device applied to the first and second embodiments above. The identity authentication device supports handwritten signatures. The specific structure is as follows Figure 4 shown.

[0117] refer to Figure 4 , is a structural diagram of an identity authentication device supporting handwritten signatures according to Embodiment 3 of the present invention. The identity authentication device may be a USBKey or other devices with the same function.

[0118] The identity authentication device includes a communication interface 41, a touch screen 42, an analog / digital converter 43, a touch screen controller 44 and a main controller 45, wherein:

[0119] The communication interface 41 is used to receive confidential data and send it to the main controller 45; the confidential data refers to data such as transaction data, e-commerce data or electronic files; the communication interface 41 can be a USB interface or Bluetooth ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an identity authentication method, identity authentication equipment, a server and an identity authentication-based encryption method and aims to solve the counterfeiting and repudiation prevention problems of identity authentication. The method comprises the following steps of: combining a written signature with a digital signature; acquiring the written signature handwriting of a user through the identity authentication equipment such as a universal serial bus (USB) key; combining the written signature handwriting with transaction data and performing digital signing; and transmitting signature data and the encrypted written signature handwriting to a verification party (such as an Internet bank background system). The signature data is verified by the verification party, so that the written signature handwriting and confidentiality data are not tampered in a transmission process; simultaneously, the truth of the written signature handwriting is verified by the verification party, so that the signature of the written signature handwriting by a user is ensured.

Description

technical field [0001] The invention relates to authentication technology, in particular to an encryption method based on identity authentication, an identity authentication method, an identity authentication device and an identity authentication server. Background technique [0002] The identity authentication method based on the identity authentication device is a convenient and safe identity authentication technology. Take the USBKey as an example below. The USBKey is a hardware device with a USB interface. It has a built-in single-chip microcomputer or smart card chip, and has a certain storage space, which can store the user's private key and digital certificate. certification. As a terminal authentication product, USBKey has been widely used in online banking, e-government and other fields. [0003] In recent years, with the vigorous development of the online banking market, identity authentication products with key display function or key voice function have emerged...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 徐海平
Owner BEIJING WATCH DATA SYST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products