Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Pervasive-network-oriented remote identity authentication system and method

An identity authentication and remote verification technology, applied in the field of remote identity authentication systems, can solve problems such as difficulty for ordinary users to grasp, increase hardware costs, and user rejection, avoid deployment and maintenance work, expand the scope of access, and improve universality. sex and effects

Inactive Publication Date: 2014-04-23
NINGBO JUHUAI ELECTRONICS TECH
View PDF2 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this identity authentication technology also has its serious defects: the system only recognizes the card but not the person. Once the smart card is lost, the user will be rejected by the system, and the smart card is easy to be copied or read the internal secret information; Adding a card reader at each authentication end increases hardware cost
However, biometric-based identity authentication technologies have very high requirements on user terminals, and different identity authentication systems have different human-computer interaction mechanisms. Therefore, a process of training and promotion is required before being accepted by users. The higher the security, the more restrictions on functions, the higher the use environment, the more complicated the operation process, and the stricter the requirements on user quality, making it difficult for ordinary users to master it, so it is difficult to achieve large-scale promotion; moreover, The user only interacts with the user terminal, and the process of identity authentication often relies on the communication network, which is prone to insecure factors

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Pervasive-network-oriented remote identity authentication system and method
  • Pervasive-network-oriented remote identity authentication system and method
  • Pervasive-network-oriented remote identity authentication system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0049] A pervasive network-oriented remote identity authentication system proposed in this embodiment, such as figure 2 As shown, it includes a user terminal located at the client 1, a back-end system 22 located at the remote verification terminal 2, and a front-end system 21 connected to the back-end system 22. The user terminal adopts a smart card 11, which is a device with audio signal playback , receiving and hardware processing functions of the user card, the smart card 11 can be activated by the user, that is, the user needs to input the user credentials to make the smart card start and take effect. The user credentials can be fingerprint information with high security requirements, or it can be universal Stronger and less expensive user passwords, such that the smart card 11 is similar to a current user authentication terminal, allowing communication only when valid user credentials are entered. The smart card 11 has a paired private key and a public key. The smart car...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a pervasive-network-oriented remote identity authentication system and method. The system comprises a user terminal, a rear end system and a front end system connected with the rear end system, wherein an intelligent card is adopted in the user terminal, prestores with user certificate information, is paired with a private key and a public key and is used for issuing the public key to the rear end system in advance; the intelligent card mainly comprises a first central processing module, a user autonomous starting module, a first encrypting and deciphering module, a first modulating and demodulating module and a first audio processing module; the user autonomous starting module, the first encrypting and deciphering module and the first modulating and demodulating module are respectively and mutually communicated with the first central processing module; the first audio processing module and the first modulating and demodulating module are communicated with each other; and the front end system mainly comprises a second audio processing module, a second modulating and demodulating module, a first encrypting and deciphering module and a second central processing module. The pervasive-network-oriented remote identity authentication system and method disclosed by the invention have the advantages of low cost, simplicity for operation, high safety performance, strong universality and good reputation preventing property.

Description

technical field [0001] The invention relates to an identity authentication technology, in particular to a pervasive network-oriented remote identity authentication system and authentication method. Background technique [0002] A huge and reliable communication network is the basis for the construction of a smart city. Driven by the development of modern communication networks such as the Internet, the Internet of Things, and wireless broadband networks, and the trend of triple play, the current new generation of information technology is advancing by leaps and bounds. It is an unprecedented challenge to information security. Identity authentication technology is one of the core technologies of information security. It is a technology that can identify the real identity of the sender and receiver of information. It is the first door to protect information security. Its task is to identify and verify users in the network information system. The legitimacy, authenticity and n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/30
Inventor 黄荻傅松寅张懿
Owner NINGBO JUHUAI ELECTRONICS TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products