Supercharge Your Innovation With Domain-Expert AI Agents!

EID digital identity authentication methods and systems based on mobile side software password module

A digital identity and cryptographic module technology, applied in the field of network applications, to achieve the effect of ensuring security, ensuring safe use, and protecting privacy

Active Publication Date: 2019-02-05
上海收付宝科技有限公司
View PDF10 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Whether it is a general-purpose eID or SIMeID, the user needs to apply for a carrier equipped with a corresponding security chip before it can be opened. The carrier must be carried with him and used in an environment where the security chip can be read. Installation and other inconvenience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • EID digital identity authentication methods and systems based on mobile side software password module
  • EID digital identity authentication methods and systems based on mobile side software password module
  • EID digital identity authentication methods and systems based on mobile side software password module

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] Specific embodiments of the present invention will be described in detail below, and it should be noted that the embodiments described here are only for illustration, not for limiting the present invention. In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. It will be apparent, however, to one of ordinary skill in the art that these specific details need not be employed to practice the present invention. In other instances, well-known circuits, software or methods have not been described in detail in order not to obscure the present invention.

[0013] Throughout this specification, reference to "one embodiment," "an embodiment," "an example," or "example" means that a particular feature, structure, or characteristic described in connection with the embodiment or example is included in the present invention. In at least one embodiment. Thus, appearances of the phrases "in one emb...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of network application and particularly relates to eID digital identity authentication methods and systems based on a mobile side software password module.The method comprises the steps of receiving an eID digital identity coding application sent by an eID digital identity plug-in; generating eID digital identity codes according to the eID digital identity coding application; receiving to-be-signed data sent by the eID digital identity plug-in, signing successfully checked to-be-signed data, and signing and issuing application identification codes;and returning a digital signature and the application identification codes to a mobile side application party for signature verification. According to the methods and the systems, on the premise of sufficiently protecting user privacy security, a convenient and effective identity authentication function is provided through utilization of a mobile side; user wish is reflected through utilization of a digital certificate signing process; a programming interface is guaranteed to only accept a legal instruction submitted by a trusted business system; and moreover, a platform party only accepts aninteraction request of a trusted plug-in, and the platform party is prevented from being bypassed by an illegal client.

Description

technical field [0001] The invention relates to the technical field of network applications, in particular to an eID digital identity authentication method and system based on a mobile terminal software cryptographic module. Background technique [0002] eID is based on cryptographic technology, with an intelligent security chip as a carrier, and issued to citizens by the "Ministry of Public Security's Citizen Network Identification System". It can remotely identify identities online without revealing identity information. According to different carrier types, eID currently mainly includes general eID and SIMeID. Among them, general eID is often loaded on bank financial IC cards, social security cards, USB keys, mobile phone security chips, etc., and SIMeID is mainly loaded on carriers that support SIM / USIM functions. The common ones are SIM card, USIM card, SIM film card, eSIM chip, etc. Whether it is a general-purpose eID or SIMeID, the user needs to apply for a carrier e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/02H04W12/06H04L9/32H04W12/069
CPCH04L9/3247H04L9/3263H04W12/02H04W12/06
Inventor 陈彪
Owner 上海收付宝科技有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More