Method and system for uniform identification of multiple terminals
An identity authentication, multi-terminal technology, applied in user identity/authority verification, key distribution, and can solve problems such as the inability of unified identity authentication for multiple terminals
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0027] The present invention will be further described in detail below through specific embodiments in conjunction with the accompanying drawings.
[0028] Any terminal to be authenticated in the multi-terminal obtains M private key segments among the N private key segments split by the user's private key, where 2≤N, 2≤M≤N;
[0029] The terminal to be authenticated recovers and obtains the user private key by using the M private key segments;
[0030] The terminal to be authenticated performs identity authentication according to the recovered private key of the user.
[0031] figure 1 It is a flowchart of a multi-terminal unified identity authentication method according to an embodiment of the present invention, please refer to figure 1 :
[0032] In this embodiment, the terminal to be authenticated uses M private key segments to recover the user's private key according to the MOFN algorithm, but it is not limited to the MOFN algorithm, as long as it uses M private key segm...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 