Generation and verification method for visual digital identity of article

A digital identity and identity verification technology, applied in the direction of user identity/authority verification, etc., can solve problems such as sub-exponential time solutions not found

Inactive Publication Date: 2014-08-27
苏盛辉 +2
View PDF2 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The REESSE1+ system is based on three new provable hard problems for which sub-exponential time solutions have not yet been found

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Generation and verification method for visual digital identity of article
  • Generation and verification method for visual digital identity of article

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0090] The characteristic of the visual digital identity method based on lightweight digital signature is that it adopts asymmetric verification technology, which is fundamentally different from traditional symmetric verification methods such as handwritten signature or round red seal.

[0091] The method uses two keys, one key can only be privately owned by the unit, and is used for generating the visible digital identity, and the other key can be publicly placed on the server, and is used for the verification of the visible digital identity. In this way, it is ensured that the visible digital identity is inimitable and thus the associated item is also unforgeable.

[0092] A pair of private key and public key is prepared by the item production or distribution unit, and the public key is uploaded to the verification server of the unified platform. Of course, the private key must be kept by the person in charge of the unit or its designated agent, and must not be leaked.

[00...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a generation and verification method for the visual digital identity of an article, and belongs to the field of digital signature technologies and computer technologies. The method comprises key configuration, visual digital identity generation and identity verification. An article production or distribution unit has two keys, namely, one is the private key, and the other is the public key. The private key can be only owned by the unit and used for generating the visual digital identity of the article; the private key is composed of 16 characters. The public key can be disclosed and is stored on a unified verification platform and used for allowing a consumer to verify the visual digital identity of the article. According to the generation and verification method for the visual digital identity, neither an electronic chip nor a special card reader is required; the method has the advantages that cost is low, counterfeiting cannot be achieved, verification is convenient, the calculating speed is high, and error codes will not occur; besides, the method can be used for counterfeiting prevention and tracing of foods, medicines, agricultural products, cosmetics, crafts, bills, certificates, documents and the like and can also be used for establishing lightweight Internet of things in a cloud computing mode.

Description

technical field [0001] The method for generating and verifying a visible digital identity belongs to the field of digital signature technology and computer technology, and is a new method for object identity authentication. Background technique [0002] The first digital signature system RSA was born in 1978 (R.L.Rivest, A.Shamir, L.M.Adleman, A Method for Obtaining Digital Signatures and Public-key Cryptosystems, Communications of the ACM, vol.21, no.2, 1978, pp.120-126.). The RSA system is based on the factorization problem, which has a sub-exponential time solution. Therefore, when the user's security requirement is on the order of 2^80, the modulus length of RSA is 1024 bits, which is equivalent to 204 characters. [0003] In April 2012, the original REESSE1+ public key system that the applicant has studied for several years was published by an internationally renowned journal (APublicKeyCryptosystemBasedonThreeNewProvableProblems, TheoreticalComputerScience, vol.426-427...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
Inventor 苏盛辉郑建华吕述望
Owner 苏盛辉
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products