Electronic identity authentication method, apparatus and device, and storage medium

An authentication method and electronic identity technology, which is applied in the field of security authentication, can solve the problems of cumbersome operation, weak implementation, and low security, and achieve the effect of protecting private information, improving security, and making small changes

Active Publication Date: 2020-02-28
EIDLINK INFORMATION TECH CO LTD
View PDF8 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Aiming at the shortcomings of the existing methods, the present application proposes an electronic identity authentication method, device, equipment and storage medium to solve the technical problems of the prior art that are cumbersome to operate, low in security and not strong in implementation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Electronic identity authentication method, apparatus and device, and storage medium
  • Electronic identity authentication method, apparatus and device, and storage medium
  • Electronic identity authentication method, apparatus and device, and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] The embodiment of this application provides an electronic identity authentication method, the schematic flow chart of the authentication method is as follows figure 1 shown, including:

[0036] S101. Obtain the identity information to be authenticated and the original text to be signed.

[0037] Optionally, obtain the real-name authentication request including the identity information to be authenticated and the original text to be signed.

[0038] In an optional implementation manner, the identity information to be authenticated includes name and ID number.

[0039] In another optional embodiment, the identity information to be authenticated includes name, ID number and SIM (Subscriber Identification Module, user identification card) card unique identification information; wherein the SIM card unique identification information can be IMSI (International Mobile Subscriber Identification Number, International Mobile Subscriber Identity).

[0040] S102. Determine the m...

Embodiment 2

[0124] Based on the same inventive concept, the embodiment of this application provides an electronic identity verification device, the structural framework of the device is shown in Image 6 As shown, it includes: an information acquisition module 601 , a mobile phone number determination module 602 , a signature request module 603 and a signature verification module 604 .

[0125] The information obtaining module 601 is used to obtain the identity information to be authenticated and the original text to be signed.

[0126] The mobile phone number determination module 602 is configured to determine the mobile phone number corresponding to the identity information to be authenticated according to the correspondence between multiple sets of pre-stored identity information and multiple mobile phone numbers.

[0127] The signature request module 603 is configured to send signature request information including the mobile phone number and the original text to be signed to the SIM ...

Embodiment 3

[0139] Based on the same inventive concept, the embodiment of this application provides an electronic identity authentication device, such as Figure 8 as shown, Figure 8 The illustrated electronic identity authentication device 800 includes: a memory 801 and a processor 802 , and the memory 801 is electrically connected to the processor 802 .

[0140] The memory 801 in the embodiment of the present application stores a computer program, and the computer program is executed by the processor 802 to implement the authentication method provided in Embodiment 1 of the present application.

[0141] The memory 801 in the embodiment of the present application may be a ROM (Read-Only Memory, read-only memory) or other types of static storage devices that can store static information and instructions, and may be a RAM (Random Access Memory, random access memory) or Other types of dynamic storage devices that can store information and instructions can also be EEPROM (Electrically Eras...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides an electronic identity authentication method and device, equipment and a storage medium. The authentication method comprises the steps of obtaining to-be-authenticated identity information and a to-be-signed original text; determining a mobile phone number corresponding to the to-be-authenticated identity information according to a pre-stored correspondingrelationship between multiple groups of identity information and multiple mobile phone numbers; signature request information accommodating the mobile phone number and the to-be-signed original text is sent to the SIM shield system; and receiving a signature value fed back by the SIM shield system and signed by the to-be-signed original text or the abstract value of the to-be-signed original text,and verifying the signature value. According to the embodiment of the invention, the safety of the authentication process is improved, and the privacy information of the user is protected; Meanwhile,the issuing transformation period of the electronic identity is effectively shortened, the feasibility is enhanced, and the popularization and promotion of electronic identity authentication are facilitated.

Description

technical field [0001] The present application relates to the technical field of security authentication, and in particular, the present application relates to an electronic identity authentication method, device, equipment and storage medium. Background technique [0002] In the prior art, eID (electronic IDentity) authentication with SIM card as the carrier mainly involves uploading the name to be authenticated, ID number, mobile phone number, and original text to be signed, and the authentication system passes through the signature distribution system. Send a request to the carrier of the SIMeID (citizen network electronic identity stored in the SIM card) to obtain the signature value, and authenticate through the returned signature value. [0003] This method requires the user to input a mobile phone number, which has high operational redundancy, and is not conducive to protecting the user's private information, and has low security; in addition, the SIMeID carrier used ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06H04W12/06H04W12/069
CPCH04L9/3247H04L63/08H04W12/06
Inventor 严硕郭宏杰刘海龙但熹
Owner EIDLINK INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products