Mobile device secure binding method based on quick response code identification and application system

A mobile device and application system technology, which is applied in the field of computer technology and information security, can solve the problems of not using two-dimensional codes and mobile device identity security verification, and achieve the effects of flexible use, cost reduction, convenient maintenance and use

Active Publication Date: 2018-02-16
INST OF INFORMATION ENG CHINESE ACAD OF SCI
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] So far, there is still no existing technology in this field that uses two-dimensional codes and mobile devices to achieve identity security verification. The research and exploration of this topic has great value and significance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile device secure binding method based on quick response code identification and application system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In order to make the purpose, technical solution and advantages of the present invention more clear, the present invention will be further described in detail through examples below.

[0026] Such as figure 1 As shown in the figure, it is a schematic flowchart of the mobile device secure binding method based on two-dimensional code identification of the present invention. The figure schematically shows the relationship between the mobile device and the application system and the data interaction verification between the two. In a nutshell, the mobile device transmits its stored public key and related evidence to verify the validity of the public key to the application system; after the application system verifies the validity of the public key, it will bind the mobile device with the identity of the current account, And persist the data of the binding relationship.

[0027] Among them, the mobile device supports the safe storage function of public and private keys and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a mobile device secure binding method based on quick response code identification. The method is applied to binding of a mobile device and an identity account of an applicationsystem. The method comprises the following steps that an uploading quick response code generated by the application system is identified by the mobile device and the mobile device uploads a device public key to the application system according to an identification result; and a verification quick response code generated by the application system is identified by the mobile device, whether the mobile device holds a private key corresponding to the public key or not is verified according to the identification result, and the application system binds the identity account with the mobile device ifthe mobile device holds the private key corresponding to the public key. The method is applied to various mobile devices in support of public and private key pair storage; and through repeated quickresponse code identification, the mobile device and a user account identity of the application system providing service are bound, so the limitation and inconvenience of identifying the user identitythrough utilization of a U-key (USB Key) are solved, and the security is ensured. The invention also provides the application system applicable to the method.

Description

technical field [0001] The invention belongs to the fields of computer technology and information security technology, and relates to a mobile device security binding method based on two-dimensional code identification. It is suitable for use scenarios where account identities in various application systems are bound to mobile devices that support key storage functions. The public-private key pair in the bound device will become a credential for account identities in the system. Background technique [0002] U-Key, full name USB Key. It is a hardware storage device with USB interface. The USB Key has a certain storage space, which can store the user's private key and digital certificate, and the user's identity can be authenticated by using the built-in public key algorithm of the USB Key. At present, USB Key is widely used in the domestic online banking field, and is recognized as a relatively safe identity authentication technology. However, U-Key is a special device, a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08H04L29/06G06K7/14
CPCG06K7/1417H04L9/0894H04L9/3226H04L9/3247H04L63/0815H04L63/108
Inventor 孙荣辛蔡权伟王琼霄赵宇航林璟锵荆继武
Owner INST OF INFORMATION ENG CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products