User-centered mobile internet identity managing and identifying method

A mobile Internet and identity management technology, applied in the field of mobile Internet identity management and authentication, can solve problems such as phishing attacks, inefficient password input, password fatigue, etc., and achieve the effect of preventing phishing attacks

Inactive Publication Date: 2013-03-20
WUHAN UNIV
View PDF3 Cites 47 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method can be used for identity management and authentication of the mobile Internet, and solves problems such as inefficient passwor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User-centered mobile internet identity managing and identifying method
  • User-centered mobile internet identity managing and identifying method
  • User-centered mobile internet identity managing and identifying method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The technical solution of the present invention will be described in detail below in conjunction with the drawings and embodiments.

[0047] Such as figure 1 As shown, the operation of the embodiment involves three parties, and the specific operating system consists of a user (User), a client application (Client Application, usually referring to a browser), an identity agent (IdA, Identity Agent), an identity provider (Identity Provider, IdP ) and the Web site (Relying Party, RP) that the user pre-logs in. The user, client application, and identity agent belong to the client side, and the client application and identity agent are set on the client device (such as computer, mobile smart device Mobie Platform, etc.) used by the user. Any browser can be used as the browser, and IdA is an original setting of the present invention, which can be realized by computer software technology during specific implementation, such as on the Android system. RP and IdP are usually a w...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Disclosed is a user-centered mobile internet identity managing and identifying method. User identity agency which is in charge of managing user identity information is set on a mobile platform by the method. An identity information card of a user can be created by the user through the user identity agency. Identity information can also be issued by a trusted third party through request and management of the user identity agency. The identity information of the user is shown in the form of a virtual card. The identity information of the user is managed by the user, and the user only needs to submit essential identity information needed by a website to the website. The submission of the identity information of the user needs to acquire authorization of the user, and therefore the user-centered characteristic and characteristic of user controlled identity information are shown in identity management. Identity authentication is conducted through a public and private key when the user needs to register or login on the website, and no longer relies on the identity authentication method of username/password. If a repeater (RP) is provided with a legal digital certificate, the digital certificate of the RP can be checked through the user identity agency by the system, and therefore phishing is prevented.

Description

technical field [0001] The invention belongs to the technical field of the Internet, and in particular relates to a new user-centered mobile Internet identity management and authentication based on a virtual card. Background technique [0002] From the perspective of the development process of identity management, it has probably gone through three development stages: centralized identity management, federated identity management and distributed identity management. [0003] The characteristic of centralized identity management is that the user's identity information is managed by the identity provider (Identity Provider, IdP) in the domain and is only used in the domain, such as Kerberos and Microsoft's Cardspace. The user has a unique identity in the domain, and can use all the services in the domain through this digital ID. Centralized identity management is easy to use in a specific range, but cannot meet the needs of identity authentication in a cross-domain environmen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32
Inventor 王鹃谢旭晖周斯珺宋蕊霞杨明何琪蒋万伟余茗婧唐西铭王勇
Owner WUHAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products