Method for sharing same authentication equipment by multiple persons based on certificate KEY

A technology for authenticating equipment and certificates, applied in the direction of user identity/authority verification, etc., can solve problems such as inability to recognize certificates, and achieve fingerprint and hardware authentication security and confidentiality, and fingerprint and hardware authentication are more effective

Inactive Publication Date: 2016-06-08
SHENZHEN BIOCOME SECURITY TECH CO LTD
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The certificate key is a certificate tool that stores the certificate in the device key. After adding the fingerprint module, the fingerprint is stored in the device together with the certificate. The current traditional method is to put the certificate and the fingerprint together. No matter how many certificates are put in, the fingerprint It exists independently, and you can enter any certificate by swiping any correct fingerprint. As a result, when fingerprint certificates are stored, usually only one person can use one device. Even if multiple certificates are stored, the certificates cannot be identified separately based on fingerprints.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for sharing same authentication equipment by multiple persons based on certificate KEY
  • Method for sharing same authentication equipment by multiple persons based on certificate KEY

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] This embodiment is a preferred implementation mode of the present invention, and other principles and basic structures that are the same or similar to this embodiment are within the protection scope of the present invention.

[0025] The present invention is a method for multiple people to share a key device, which associates the fingerprints and certificates stored in the key device, and realizes the advantage of using a key device for multiple people, and effectively This improves the utilization of the key device. The present invention mainly includes issuing certificates and fingerprints to the key device and the login process of logging into OA / web sites using the present invention.

[0026] Please see attached figure 1 , the present invention issues certificates and fingerprints to the key device as follows:

[0027] Step A1: Issue a certificate to the key device through the certificate structure, and there can be one or more certificates;

[0028] Step A2: Col...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for sharing the same authentication equipment by multiple persons based on a certificate KEY. The method comprises the following steps of associating a fingerprint stored in key equipment with a certificate, and accessing only through the associated fingerprint while accessing the certificate through the fingerprint. According to the invention, resources of the key can be effectively utilized; the same key equipment is used by multiple persons; and safety access of multiple persons is realized on the premise that one computer is shared by multiple persons and casual extraction and insertion of equipment is not provided.

Description

technical field [0001] The invention discloses a security authentication method, especially a method for multiple people to share the same authentication device based on the certificate KEY. A certificate corresponds to a person's fingerprint, and multiple certificates can be stored in a key, which is suitable for use in public or enterprise certificate signing, login and other occasions. Background technique [0002] The certificate signature is some data attached to the data unit, or the cryptographic transformation of the data unit. This data or transformation allows the recipient of the data unit to confirm the origin of the data unit and the integrity of the data unit and to protect the data from forgery by someone (eg, the recipient). It is a method of signing messages in electronic form, and a signed message can be transmitted in a communication network. At present, passwords are the most widely used network identity authentication methods. If other authentication m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
Inventor 张美云肖卫中酆小凯庞新萍马江虹
Owner SHENZHEN BIOCOME SECURITY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products