Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity authentication method, device and system

An identity authentication device and an identity authentication technology are applied in the field of identity authentication methods, devices and systems, and can solve the problems of reducing the efficiency of identity authentication management and increasing the cost of system development.

Active Publication Date: 2018-11-27
中国电力财务有限公司
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] With the development of Internet technology and the continuous improvement of informatization level, the company has built more and more information systems to support its own business development. Usually, the information system and the identity authentication module have a one-to-one tight coupling relationship, so corresponding to the information system There are more and more identity authentication modules being built, which brings unprecedented challenges to the company's standardized management of identity authentication, reduces the efficiency of identity authentication management, and increases the cost of system development

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method, device and system
  • Identity authentication method, device and system
  • Identity authentication method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] With the development of Internet technology and the continuous improvement of informatization level, the company builds more and more information systems to support its own business development. In each information system, user identity authentication is required to ensure business security. Therefore, in the system design stage, an identity authentication module is usually established for each system that requires identity authentication to meet the signature verification requirements of the system.

[0055] Assuming that a company involved in e-commerce has information systems such as Diancaitong system, core system, and fund settlement system, and deploys application servers for each system separately, the digital signature verification process when a user logs in to the information system is as follows: figure 2 shown.

[0056] When a user of the company's information system (core system, Diancaitong system, etc.) logs in to the information system (core system, Dia...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an identity authentication method, device and system. The method comprises the following steps: receiving request information sent by a client; sending the request information to a uniform identity authentication module, and enabling the uniform identity authentication module to carry out signature processing on the request information to obtain signature request information; receiving the signature request information returned back by the uniform identity authentication module; calling the uniform identity authentication module to carrying out signature identification processing on the signature request information, so as to obtain a signature identification result; receiving the signature identification result returned back by the uniform identity authentication module. With the adoption of the technical scheme, an identity authentication service procedure does not need to be specially configured for an application server, but the uniform identity authentication module is called to finish the signature identification processing on digital signatures. The uniform identity authentication module can realize the aim of providing signature identification services of the digital signatures for each application server, and uniform management of signature identification of the digital signatures is convenient to realize; meanwhile, the development cost of the system can be saved.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to an identity authentication method, device and system. Background technique [0002] Digital signature verification is a common method for authenticating the identity of both parties in Internet interaction. Such as figure 1 As shown, in digital signature verification, the sender uses a hash function to generate a message digest from the message text when sending a message, and then encrypts the digest with its own private key, and the encrypted digest will be The digital signature as the message is sent to the receiver together with the message; the receiver first uses the same hash function as the sender to calculate the message digest from the received original message, and then uses the sender's public key To decrypt the digital signature attached to the message, if the two digests are the same, the receiver can confirm that the digital signature belongs...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L29/06
CPCH04L9/3247H04L63/08
Inventor 刘凯邓洪桥王良浩刘金霞盖永光侯培建侯文捷丁琪董树梓唐日清戴建元刘畅陆嶙许维波曹畅王景刘锡忠张博沙小镰王茜司建超刘明刘芳张益兵李鹏胥杨波李晓博俞艳霞车甜甜郭海华宋慧冰韩筱雯秦高翔雷迪张珣曹伟欧辉陈曦雷玉琴吴琼俞翔李箐
Owner 中国电力财务有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products