Supercharge Your Innovation With Domain-Expert AI Agents!

UMA service method, device and system based on human-certificate integration

A witness and server technology, applied in the UMA service field based on the integration of witnesses and witnesses, can solve the problems of being unable to verify the real identity of the registrant, unable to authorize other users, and requiring high security protection capabilities of smart terminals, so that it is not easy to forge and tamper , improve safety and convenience, and improve the effect of the scope of application

Inactive Publication Date: 2019-12-06
NANJING NARI GROUP CORP +4
View PDF7 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0015] In order to solve the deficiencies in the prior art, the present invention provides a UMA service method, device and system based on the combination of human and ID, which solves the problem that the existing OAuth service method based on biometrics cannot verify the real identity of the registrant, and cannot The problem of authorization of other users and high requirements on the security protection capabilities of smart terminals has a wider scope of application

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • UMA service method, device and system based on human-certificate integration
  • UMA service method, device and system based on human-certificate integration
  • UMA service method, device and system based on human-certificate integration

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0050] A UMA service system based on the integration of human and certificate, including resource server, authorization server and terminal equipment;

[0051] The resource server is used to save the resources uploaded by the resource owner, and the resources include visible resources such as documents or authorization credentials;

[0052] The authorization server provides services that meet the requirements of the UMA protocol for user registration, user verification, resource server and resource registration, and access token generation.

[0053] The terminal equipment is COTS equipment (Commercial Off-The-Shelf, commercial off-the-shelf or technology, refers to the software or hardware products that can be purchased with an interface defined by an open standard, which can save cost and time. For example, a mobile phone or a tablet is a A COTS device), an APP running on the terminal device is used to collect ID photos and face avatars and receive UMA service push information (when...

Embodiment 2

[0056] A UMA service method based on the integration of human and evidence includes the following steps:

[0057] Step 1. Perform traditional information registration and ID card registration on the authorization server that provides UMA services, and the authorization server encrypts and saves user registration information;

[0058] Traditional information registration, traditional information registration includes user name / password, gender, hometown, contact information, etc., and automatically generates a unique user ID (identity identification number) number for the user. The user name and password can be used as login credentials for UMA services or as User authentication information required by low security level;

[0059] ID photo registration, collect ID photo through COTS equipment camera, verify whether the ID photo is true and valid, mainly check whether the ID name and number are the same and the authenticity of the ID image; if the ID card is confirmed to be true and va...

Embodiment 3

[0082] Such as figure 1 As shown, a UMA service method based on the integration of human and certificate includes the following steps:

[0083] Step 1. The user registers on the authorization server that provides UMA services; figure 2 As shown, registration includes:

[0084] Traditional information registration, traditional information registration mainly includes user name / password, gender, hometown, contact information, etc., and automatically generates a unique ID number for the user. The user name and password can be used as login credentials for UMA services or as low security requirements. User authentication; such as figure 2 As shown,

[0085] ID photo registration, collect ID photo through COTS equipment camera, verify whether the ID photo is true and valid, mainly check whether the ID name and number are the same and the authenticity of the ID image; if the ID card is confirmed to be true and valid, the server is authorized Encrypted storage of user information, ID pho...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a UMA service method, device and system based on human-certificate integration. When a resource applicant accesses a resource, the authorization server judges whether the useris the registered user or not through human-certificate unification comparison according to the head portrait picture uploaded by the resource applicant; if so, an access certificate provided by the applicant is obtained according to a resource authorization strategy; whether the access certificate meets the requirement or not is judged, if so, it is indicated that the user is authorized, and if the user is not the registered user or the access certificate does not meet the requirement, it is indicated that the user is not authorized; the authorization server issues an access token comprisingan authorization result to the client of the resource applicant by using the private key, wherein the access token is used for being provided for the resource server to pass public key signature verification, and if signature verification is passed and authorization is performed, the resource is sent to the resource applicant. According to the invention, the user is ensured to be a legal user andis certainly a registered user, so that the user is not easy to forge and tamper, and the authorization security is effectively ensured.

Description

Technical field [0001] The present invention relates to the field of Internet and mobile communication technology, and in particular to a method, device and system for UMA service based on the integration of human identification and identification. Background technique [0002] OAuth is a security protocol used to protect a large and growing number of Web APIs worldwide. OAuth is a delegation protocol that provides a cross-system authorization scheme, replacing the password sharing anti-pattern with a more usable and secure delegation protocol. It is used to connect different websites and also supports connections between native applications and mobile applications and cloud services. It is the security layer in standard protocols in various fields, covering a wide range of applications from medical to identity management, from energy to social networking. OAuth has become the dominant security method on the Web today. OAuth is not an identity authentication framework, but ide...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3247H04L63/0807H04L63/0853H04L63/0861
Inventor 徐睿杨华飞郑立刘坤马锋陈梦娴蔡怡挺朱犇王佑曹国强游佳张子谦
Owner NANJING NARI GROUP CORP
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More