Cloud key authentication system based on public key algorithm

A technology of key authentication and public key algorithm, which is applied in the field of cloud key authentication system, can solve problems such as embezzlement, and achieve high expansion, high concurrency, and high load effects

Active Publication Date: 2019-07-02
BEIJING JINKELIANXIN DATA TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The security risk of this technical solution is that after the smartphone itself is hijacked, the malicious program that obtains Root authority can steal the user's private key in TrustZone

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud key authentication system based on public key algorithm
  • Cloud key authentication system based on public key algorithm
  • Cloud key authentication system based on public key algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary and are intended to explain the present invention and should not be construed as limiting the present invention.

[0022] The present invention proposes a cloud key authentication system based on a public key algorithm. The system proposes a new public key authentication technology model based on commercial cryptographic chips and cloud computing technology, as well as a corresponding certificate and key management system, providing Authentication and transaction signing.

[0023] Such as figure 1 As shown, the cloud key authentication system based on the public key algorithm in the embodiment of the present invention includes: a terminal de...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a cloud secret key authentication system based on a public key algorithm. The cloud secret key authentication system comprises a terminal device, a secret key and certificate management subsystem, a service subsystem. The terminal device authenticates the identity of a user and forwards a service request after authentication succeeds. The secret key and certificate management subsystem is located in a cloud server, and stores user secret keys and digital certificates. The service subsystem analyzes a user authentication result and a risk authentication result. When receiving a response instruction, the secret key and certificate management subsystem provides the terminal device with the user secret key and the digital certificate corresponding to the user. The terminal device receives and stores the user secret key and the digital certificate and performs payment with the service subsystem by using the user secret key and the digital certificate. The cloud secret key authentication system authenticates the identity of the user by using a biological recognition module, uses the risk authentication and biological information authentication of a service provider, and may terminate a high-risk transaction according to the risk authentication and biological information authentication of a service provider so as to avoid losses.

Description

technical field [0001] The invention relates to the technical fields of mobile Internet and cloud computing, in particular to a cloud key authentication system based on a public key algorithm. Background technique [0002] With the popularity of mobile Internet devices such as smartphones and tablets, current consumers need to frequently conduct personal financial transactions such as consumer payments, transfers (such as WeChat red envelopes), and wealth management on mobile smart devices. When conducting financial transactions such as payment and transfer on mobile phones, there is a lack of effective means of identity authentication and non-repudiation using digital signature technology. Smart password keys and smart IC card devices such as Bluetooth, audio code, and NFC can theoretically be used in the above scenarios, but they are limited by the variety of mobile phone models, poor compatibility, and cumbersome personal carrying and use, resulting in poor user experienc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/064H04L63/0861
Inventor 杨海波徐志国
Owner BEIJING JINKELIANXIN DATA TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products