Authentication system and method

An identity verification and identity certificate technology, applied in the field of identity verification systems that support cross-system verification, can solve the problems of not being able to verify the identity of system personnel, not supporting personnel identity verification, wasting social resources, etc., so as to reduce the number of issuances and reduce duplication of construction. , the effect of saving social resources

Active Publication Date: 2011-12-07
BEIJING HUADA INFOSEC TECH
View PDF5 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the various identity verification systems currently on the market based on this method can only verify the identity of personnel inside the system, and cannot verify the identity of personnel outside the system. The system application block diagram is as follows figure 1 shown
This identity verification system does not support cross-system personnel identity verification. For example, tickets for va

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication system and method
  • Authentication system and method
  • Authentication system and method

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0023] The inventor noticed that if a certification center recognized by them is set for multiple verification subsystems, and the certification center issues system digital certificates for each verification subsystem, since the system digital certificate is also recognized by other verification subsystems, Therefore, the personal digital certificates and identity certificates issued by each verification subsystem can also be verified in other verification subsystems.

[0024] figure 2 is a schematic structural diagram illustrating an identity verification system according to an embodiment of the present invention. Such as figure 2 As shown, the identity verification system includes: the certification center CA and multiple verification subsystems S1, S2, ..., Sn, where the certification center CA uses the certification center private key RK Pri The system digital certificates SC1, SC2, ..., SCn of the verification subsystems are respectively issued for the plurality of v...

no. 2 example

[0033] Figure 4 A schematic structural diagram of an identity verification system according to another embodiment of the present invention is shown. from Figure 4It can be seen that the verification subsystem includes an identity verification server and an identity verification terminal respectively. In the drawings, for the sake of clarity, only the identity verification server 410 and the identity verification terminal 420 in the verification subsystem 1 are shown with reference numerals. When the identity verification server 410 or identity verification terminal 420 and its components are mentioned below, if there is no special description, it should not be understood as being limited to the relevant components in the verification subsystem 1, but can be extended to other verification subsystems corresponding parts in .

[0034] The identity verification terminal 420 is a terminal device, which can support the public key cryptographic algorithm, and can read the inform...

no. 3 example

[0057] In the second embodiment, the identity verification control subsystem sends the first system list SID_List1 to the identity verification terminal, and the identity verification terminal uses the verified second system list SID_List2 to verify the personal digital certificate PC. In the third embodiment, the identity verification control subsystem can also send the special personnel list PID_List to the identity verification terminal. Among them, the special entry personnel may not belong to any verification subsystem in the first system list SID_List1. Therefore, when the identity verification terminal verifies the personal digital certificate PC in the identity certificate, it also considers the special personnel list PID_List. A detailed description is given below.

[0058] In this embodiment, the identity verification control subsystem 4102 of the identity verification server 410 uses the public key RK of the certification center CA Pub Or the public key certificat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity verifying system based on a public key password technique and a method for verifying an identity certificate by using the identity verifying system. The identity verifying system comprises a certification authority (CA) and a plurality of verifying subsystems, wherein the certification authority (CA) is configured to be used for respectively issuing corresponding system digital certificates for the plurality of verifying subsystems by using a private key PKPri of the certification authority, and the verifying subsystems all can verify the identity certificates issued by the verifying subsystems and other verifying subsystems based on the corresponding system digital certificates and a public key PKPub of the certification authority. By using the identity verifying system, the personnel identity verification among user systems can be realized; the repeated construction of the system is reduced; the quantity of the issued identity certificates is reduced; the social resources are saved; and the social efficiency is improved.

Description

technical field [0001] The invention relates to the field of identity verification, and more specifically relates to an identity verification system and method supporting cross-system verification. Background technique [0002] Due to security and confidentiality requirements, many occasions (such as conferences, exhibitions, performances, etc.), units (such as enterprises, government agencies, civil organizations) or information network systems (such as e-commerce, e-government, online banking, etc.) need to adopt It is necessary to verify the identity of the personnel. At present, the main identity verification methods are inseparable from information processing technology. According to the source of the characteristic data representing the identity of the personnel, it can be divided into two categories: 1. The characteristic data comes from the physiological characteristics of the personnel. (such as fingerprints, palm prints, retina, facial contours, etc.), that is, to ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/30
Inventor 郭瑞宾
Owner BEIJING HUADA INFOSEC TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products