Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A temporary identity authentication method, device and system

A technology of temporary identity and authentication methods, applied in transmission systems, digital transmission systems, secure communication devices, etc., which can solve problems such as theft of SMS passwords, theft of items in apartments, and easy use by theft

Active Publication Date: 2021-09-21
JUZIX TECH SHENZHEN CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

With the gradual separation of ownership and use rights and the rapid development of sharing economies such as shared car rental and shared apartments, these traditional methods have problems of low efficiency
Moreover, the key or door card is inconvenient and easy to be stolen, and the SMS password also faces potential risks such as theft of the password, which will lead to theft of items in the apartment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A temporary identity authentication method, device and system
  • A temporary identity authentication method, device and system
  • A temporary identity authentication method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0083] In order to enable those skilled in the art to better understand the technical solutions in this specification, the technical solutions in one or more embodiments of this specification will be clearly and completely described below in conjunction with the drawings in one or more embodiments of this specification Obviously, the described embodiments are only some of the embodiments in the description, not all of them. Based on one or more embodiments in the description, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the embodiments of the description.

[0084] Traditionally, the use of rented objects such as apartments and cars is often carried out through remote transmission of passwords, etc., or face-to-face delivery, mailing of keys or access cards. With the gradual separation of ownership and use rights and the rapid development of the shared economy such as shared car ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of this specification discloses a method, device and system for temporary identity authentication. The method includes obtaining the object use request data, and the object use request data includes the contract number corresponding to the object; according to the contract number, the The public key corresponding to the contract number and the first private key fragment of the lessor, wherein the private key and public key corresponding to the contract number are generated by the lessor when the lease is signed, and the private key is divided into at least two pieces , including the first private key fragment used by the lessor for signature and the second private key fragment used by the lessee for signature; based on the first private key fragment and the second private key fragment, the The subject matter use request data is jointly signed; the signed subject matter use request data is verified by using the public key, and when the signature verification is passed, the use permission is released. By utilizing various embodiments of the present specification, the user's temporary right to use the subject matter can be quickly, simply and safely confirmed.

Description

technical field [0001] The present invention relates to the technical field of computer data processing, in particular to a temporary identity authentication method, device and system. Background technique [0002] Traditionally, the use of rented objects such as apartments and cars is often carried out through remote transmission of passwords, etc., or face-to-face delivery, mailing of keys or access cards. With the gradual separation of ownership and use rights and the rapid development of the shared economy such as shared car rental and shared apartments, these traditional methods have problems of low efficiency. Moreover, the key or door card is inconvenient and easy to be used by theft, and the SMS password also faces potential risks such as password theft, which in turn leads to theft of items in the apartment. How to more conveniently and safely confirm the right to use and identity of the subject matter has become an urgent technical problem to be solved. Contents...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/085H04L9/0897H04L63/062H04L63/083H04L63/0853H04L63/0876H04L63/12
Inventor 唐虹刚孙立林
Owner JUZIX TECH SHENZHEN CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products