Check patentability & draft patents in minutes with Patsnap Eureka AI!

Ciphertext-Based Authentication Methods

An identity verification method and ciphertext technology, applied in the field of ciphertext-based identity verification, can solve problems such as malicious use of personal passwords, illegal eavesdropping, and high cost, so as to avoid potential risks of illegal eavesdropping and attacks, enhance security, and use convenient effect

Active Publication Date: 2020-05-22
CHINA UNIONPAY
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the above-mentioned existing technical solutions have the following problems: (1) Since the personal password needs to be input on the security information interaction terminal before the actual security information interaction process is implemented, there is a potential risk of the personal password being used maliciously; ( 2) Since the security information exchange request is initiated only when the identity verification is successful, there is a potential risk of being illegally eavesdropped and attacked; (3) Because it needs to use a specific security unit or pass through a public Internet channel, the cost is high and Inconvenient to use

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Ciphertext-Based Authentication Methods

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] figure 1 is a flow chart of a ciphertext-based identity verification method according to an embodiment of the present invention. Such as figure 1 As shown, the ciphertext-based authentication method disclosed in the present invention includes the following steps: (A1) The data processing server (such as the cloud server of the financial service provider) periodically or based on a request to the user's mobile terminal (such as a smart phone) ) pushing one or more first restricted keys and one or more second restricted keys, wherein each of the one or more second restricted keys is associated with the user's personal password; ( A2) When the user initiates a security information interaction process through the mobile terminal, the security application residing on the mobile terminal uses one of the one or more first restricted keys to generate an application ciphertext, and Use one of the one or more second restricted keys to generate a user ciphertext, and then send t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention proposes a ciphertext-based authentication method, which includes: the data processing server pushes one or more first restricted keys and one or more second restricted keys to the user's mobile terminal periodically or based on a request; When the user initiates a security information interaction process through the mobile terminal, the security application resident on the mobile terminal uses one of the one or more first restricted keys to generate an application ciphertext, and uses the one or more One of the second restricted keys generates user ciphertext, and then sends the application ciphertext and user ciphertext to the security information interaction terminal; after receiving the application ciphertext and user ciphertext, the security information interaction terminal A security information interaction request is constructed, and the security information interaction request is sent to the data processing server for subsequent security information interaction process. The method disclosed in the present invention has enhanced safety and is convenient to use.

Description

technical field [0001] The present invention relates to an identity verification method, and more specifically, to a ciphertext-based identity verification method. Background technique [0002] At present, with the increasingly widespread application of computers and networks and the increasing variety of business types in different fields, the use of mobile terminals to implement security information interaction processes (that is, data interaction processes that require high security, such as payment transactions in the financial field )become more and more important. [0003] In existing technical solutions, before implementing the actual security information interaction process, it is typically necessary to complete the user's identity verification operation, and only initiate a security information interaction request (such as a payment order containing a payment order) only when the identity verification is successful request), the following two authentication methods...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/14
CPCH04L9/14H04L63/0428
Inventor 张栋丁林润李春欢陆东东
Owner CHINA UNIONPAY
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More