Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and system for issuing an identity-based asymmetric key

An asymmetric key, symmetric encryption technology, applied in key distribution, can solve the problems of easy guessing, hidden dangers, easy interception of passwords by hackers, etc., to simplify configuration and management, and enhance security.

Active Publication Date: 2020-01-03
FEITIAN TECHNOLOGIES
View PDF16 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] This traditional authentication method has many security risks. In order to facilitate the user's memory, the user name and password are often too simple and have certain regularity, which are easy to be guessed and leaked; Passwords are also easily intercepted by hackers during transmission; information is transmitted in plain text, or the encryption strength of cipher text is too low, so it is easy to crack; if digital certificates are installed, the security will increase, but the configuration and management of the system are more cumbersome

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for issuing an identity-based asymmetric key
  • A method and system for issuing an identity-based asymmetric key
  • A method and system for issuing an identity-based asymmetric key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0040] Embodiment 1 of the present invention provides an identification-based asymmetric key issuance method, such as figure 1 shown, including:

[0041] Step s101: the key generation center receives the user registration information submitted by the user, saves the user registration information, and determines the key carrier according to the user registration information.

[0042] Among them, when the user applies for registration, the information that needs to be submitted may include: applicant identification type, applicant identification, applicant name, applicant contact information, key carrier network electronic identity (EID), etc.; The network electronic identity identifier EID is used to determine the key carrier.

[0043] Among them, if the user is a first-time registered user, the user needs to go to the designated service point for face-to-face registration and application, and the local registration service provider will complete the preliminary legality revie...

Embodiment 2

[0138] Embodiment 2 of the present invention provides an identification-based asymmetric key issuance method, such as figure 2 shown, including:

[0139] Step s201: the registration proxy server receives the user registration information submitted by the user.

[0140] Among them, when the user applies for registration, the information that needs to be submitted includes: applicant identification type, applicant identification, applicant name, applicant contact information, key carrier network electronic identity (EID), other information, etc.; The key carrier network electronic identity identifier EID is used to determine the key carrier.

[0141] Among them, if the user is a first-time registered user, the user needs to go to the designated service point for face-to-face registration and application, and the local registration service provider will complete the preliminary legality review of the user's application information at the counter.

[0142] Step s202: the regist...

Embodiment 3

[0245] This embodiment provides an identification-based asymmetric key issuance method, such as image 3 shown, including:

[0246] Step s301: The key carrier receives the user verification request sent by the key generation center.

[0247] Specifically, the key carrier receives the user verification request sent by the key generation center, and the instruction format is: 0x80 FC02 00 20;

[0248] Among them, the key carrier is a software / hardware module that can safely store the key; before the user registers, the key carrier has been initialized and has system parameters.

[0249] Step s302: The key carrier prompts the user to input a password, and judges whether the password entered by the user is correct, and if so, executes step s303; otherwise, continues to execute step s302.

[0250] Specifically, step s302 also includes: when the user enters a wrong password, judging whether the number of times the user has entered has reached the upper limit of the number of allow...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity-based asymmetric key issuing method and system. The method includes the following steps: a key generation center receives registration information submitted by a user, determines a key carrier according to the registration information, and sends a communication key negotiation request to the carrier; the key carrier generates a key application request after receiving the communication key negotiation request and sends the key application request to the key generation center; the key generation center generates a user private key after receiving a key application response, encrypts the user private key, and then returns the user private key to the key carrier; and the key carrier performs verification after receiving the user private key, and saves the user private key into a security area after the verification succeeds. The invention relates to an identity-based key issuing method, the configuration and management of key issuing can be simplified, and meanwhile, two-way identity authentication is adopted, and the security can be enhanced.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method and system for signing an asymmetric key based on an identification. Background technique [0002] Identity authentication is one of the important mechanisms of network security, and it is also an important technology to realize the confidentiality of identity information. At present, most application systems use user name plus password to realize identity verification, and information transmission between networks is in plain text. [0003] This traditional authentication method has many security risks. In order to facilitate the user's memory, the user name and password are often too simple and have certain regularity, which are easy to be guessed and leaked; Passwords are also easily intercepted by hackers during transmission; information is transmitted in plain text, or the encryption strength of cipher text is too low, so it is easy to crack; if digital certific...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0822H04L9/0866H04L63/0435H04L63/06H04L63/0815H04L63/083
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES