Check patentability & draft patents in minutes with Patsnap Eureka AI!

Trusted identifier application method and system

An application method and identification technology, which is applied in the field of information security, can solve problems such as the thick public key cryptosystem, and achieve the effects of fewer parameters, simple calculation methods, and high operational efficiency

Active Publication Date: 2019-11-12
艾芮科技(上海)有限公司
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the public key cryptosystem currently provided is relatively heavy and cannot meet the above requirements.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted identifier application method and system
  • Trusted identifier application method and system
  • Trusted identifier application method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In order to explain the embodiments of the present invention or the technical solutions in the prior art more clearly, the specific embodiments of the present invention will be described below with reference to the drawings. Obviously, the drawings in the following description are only some embodiments of the present invention. For those of ordinary skill in the art, without creative work, other drawings can be obtained based on these drawings and obtained Other embodiments.

[0042] In order to make the drawings concise, the drawings only schematically show the parts related to the present invention, and they do not represent the actual structure of the product. In addition, in order to make the drawings concise and easy to understand, in some drawings, only one of the components with the same structure or function is schematically shown, or only one of them is marked.

[0043] In an embodiment of the present invention, such as figure 1 As shown, a trusted identification a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a credible identifier application method and system, and the method comprises the steps: generating a credible identifier of a first user through a secret key production center,and generating a first root private key and a first root public key; obtaining a synthesized private key according to the user identifier of the first user and the first root private key; signing theauthentication information of the first user by using the synthetic private key to obtain a trusted identifier of the first user; the second user equipment acquires authentication information of thefirst user from the received trusted identifier of the first user, wherein the authentication information comprises the following steps: acquiring a user identifier and a first root public key of thefirst user; obtaining a synthetic public key according to the user identifier and the first root public key; verifying the signature of the trusted identifier of the first user by adopting the synthetic public key; and after the signature verification of the trusted identifier is passed, obtaining the authentication information of the first user from the signature verification. The invention provides a low-consumption, low-cost and high-speed lightweight authentication mechanism, which can meet the safety requirements of large-scale and high-concurrency Internet of Things and mobile Internet.

Description

Technical field [0001] The invention relates to the technical field of information security, in particular to an application method and system of a trusted identifier. Background technique [0002] The existing electronic authentication system adopts an asymmetric key system, and a more mature asymmetric key system is the Public Key Infrastructure (PKI) system. In this system, the user's private key is a random number, and the user's public key is calculated by the user's private key. There is no calculation relationship between the user's public key and the user's identity. A trusted third party is required—the certification center CA realizes the user's identity and the user by issuing digital certificates. The binding of the public key. The application, issuance, verification, revocation, and renewal of digital certificates requires the support of multi-level certification centers and huge computing resources, making it difficult to support ultra-large-scale applications. [0...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/30
CPCH04L9/3013H04L9/3066H04L9/3236H04L9/3247H04L9/3252
Inventor 傅兆伟
Owner 艾芮科技(上海)有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More