Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for multi-terminal unified identity authentication

An identity authentication and multi-terminal technology, which is applied in user identity/authority verification and key distribution, can solve the problems that multi-terminals cannot be unified in identity authentication

Active Publication Date: 2016-02-03
NATIONZ TECH INC
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The present invention provides a method and system for unified identity authentication of multiple terminals, which solves the technical problem that multiple terminals cannot be authenticated uniformly in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for multi-terminal unified identity authentication
  • Method and system for multi-terminal unified identity authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The present invention will be further described in detail below through specific embodiments in conjunction with the accompanying drawings.

[0028] Any terminal to be authenticated in the multi-terminal obtains M private key segments among the N private key segments split by the user's private key, where 2≤N, 2≤M≤N;

[0029] The terminal to be authenticated recovers and obtains the user private key by using the M private key segments;

[0030] The terminal to be authenticated performs identity authentication according to the recovered private key of the user.

[0031] figure 1 It is a flowchart of a multi-terminal unified identity authentication method according to an embodiment of the present invention, please refer to figure 1 :

[0032] In this embodiment, the terminal to be authenticated uses M private key segments to recover the user's private key according to the MOFN algorithm, but it is not limited to the MOFN algorithm, as long as it uses M private key segm...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a system for uniform identification of multiple terminals. The method includes that: M of N private key sections divided by private user keys are acquired by any one terminal to be identified in the multiple terminals, the private user keys are obtained via recovering the M private key sections by the terminal to be identified, and the terminal to be identified is identified according to the private user keys obtained via recovering, wherein 2< / =N and 2< / =M< / =N. According to above technical scheme, the technical problem that the multiple terminals cannot be uniformly identified in the prior art is solved.

Description

technical field [0001] The invention relates to the field of electronic identity authentication, in particular to a method and system for multi-terminal unified identity authentication. Background technique [0002] With the rapid development of computer hardware equipment, the processing capacity has been continuously enhanced. With the enhancement of hardware processing speed, devices such as smart phones and tablet computers (Tablet Personal Computer, referred to as Tablet PC, FlatPc, Tablet, Slates) have become popular. However, due to the interface and software compatibility of these devices, Problems such as online banking and electronic certificates (USBKEY) cannot be used for electronic identity authentication schemes that have been widely used on PCs. The method for solving this problem in the prior art is to issue other forms of electronic certificates to such devices. However, , which will inevitably lead to the problem of multiple identities of a user, which is n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08
Inventor 王东
Owner NATIONZ TECH INC