Offline physical isolation authentication method and authentication system thereof

An authentication method and physical isolation technology, applied in the field of offline physical isolation authentication methods and authentication systems, can solve problems such as being hacked, and achieve the effects of convenient use, good promotion, and security.

Active Publication Date: 2020-01-07
SICHUAN PANOVASIC TECH
View PDF7 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, all of the above methods require networking or physical contact. At the same time, with the development of hacker technology, any method with network connection and physical contact will have the possibility of being hacked.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Offline physical isolation authentication method and authentication system thereof
  • Offline physical isolation authentication method and authentication system thereof
  • Offline physical isolation authentication method and authentication system thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0026] Such as figure 1 As shown, this embodiment provides an authentication method for offline physical isolation based on digital certificate KPI, including hardware devices and business platforms. The hardware devices can recognize two-dimensional codes and display information, and have certain storage capabilities and computing capabilities. Contains the key generation algorithm. Through the key generation algorithm, a pair of public and private key pairs are generated. The private key is stored in the hardware device as a write-only, and the public key is displayed on the hardware device. After purchasing or obtaining this hardware device, the user can generate a public-private key pair by himself, or use the previous public-private key pair. When identity authentication with the business platform is required, the user's information and the public key corresponding to the hardware device are first bound on the business platform, that is, the public key can represent the u...

Embodiment 2

[0045] Such as Figure 5 As shown, this embodiment is an authentication system that implements the offline physical isolation authentication method of Embodiment 1, specifically including hardware devices and business platforms, and the authentication system also includes:

[0046] A processor, a memory, a display screen and a first camera on the hardware device side, wherein the processor is used to generate a public key and a private key, the memory is used to store the private key, and the display screen is used to display the The public key and the second authentication code signed by the private key, the first camera is used to scan the first authentication code; specifically, it also includes a portable battery and a device switch for switching the device;

[0047]The second camera on the service platform side is used to scan the second authentication code signed by the private key.

[0048] When the user needs to be authenticated, turn on the power of the hardware devi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an off-line physical isolation authentication method, which comprises hardware equipment and a service platform, and comprises the following steps that: the hardware equipmentrandomly generates a pair of public key and private key, the private key is only written and stored, and the public key is displayed; the user acquires hardware equipment and a corresponding public key; the user applies for binding to the service platform through a public key, wherein the public key is used for verifying the identity of the user; the user is bound with the hardware equipment in the service platform; when the service platform needs to verify the identity of the user, a first authentication code is generated for a string of random information; the user scans the first authentication code by using the hardware device; the hardware equipment signs the scanned first authentication code data through a private key, and generates a second authentication code from signed information; and the service platform scans the second authentication code and then carries out verification by using the public key of the user so as to authenticate the user identity and return authenticationinformation. The invention further discloses an authentication system for offline physical isolation. The authentication process is offline and physically isolated.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to an off-line physical isolation authentication method and an authentication system thereof. Background technique [0002] With the continuous development of Internet technology, security certification is becoming more and more important. Especially in the financial field and IoT scenarios, the security of authentication directly determines the quality of a product. Looking at the industry, some current security certifications probably include one-time SMS verification codes, hardware tokens, mobile phone tokens, and push-based authentication tokens. One-time SMS verification code refers to the use of SMS as an authentication factor. A random six-digit number is sent to the user's mobile phone by text message, so in theory only people with the correct mobile phone can pass the verification. Hardware tokens, as an important method in active multi-factor authenticatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/33G06K19/06H04L9/00
CPCG06F21/33G06K19/06037H04L9/006
Inventor 黄德俊夏苗
Owner SICHUAN PANOVASIC TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products