General identifier representation method for identifier password updating and revoking

A technology for identifying passwords and general identifications, which is applied in the field of general identification representations, and can solve problems such as unsuitable identification and password systems

Active Publication Date: 2020-04-14
湖南安方信息技术有限公司
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Identity key revocation: The user identity in the identity cryptosystem is the user's key, and revocation of the user key means that the user identity is also invalid. However, in actual usage scenarios, it is usually assumed that the user identity remains unchanged and valid for a long time, but the traditional In the public key cryptography system, the user's public key is pulled i

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • General identifier representation method for identifier password updating and revoking
  • General identifier representation method for identifier password updating and revoking
  • General identifier representation method for identifier password updating and revoking

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] In order to make the purpose, technical solution and advantages of the present invention clearer, the technical solution of the present invention will be described in detail below. Apparently, the described embodiments are only some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other implementations obtained by persons of ordinary skill in the art without making creative efforts fall within the protection scope of the present invention.

[0023] The following is a detailed description of the specific implementation of the present invention in conjunction with the attached table; a complete identification password identification includes: ontology identification, aging identification and version number, the ontology identification part is the identification type plus the identification source, and the aging identification part indicates the life cycle of the identification and effective range.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a general identifier representation method for identifier password updating and revocation. The method comprises the following identification forms: identifier password identifier = body identifier + aging identifier + version number, time efficiency identifier = time slice level + time slice serial number, wherein the identifier password identifier is composed of the body identifier, the time efficiency identifier and the version number; the time efficiency identifier consists of the time slice level and the time slice serial number, and the time efficiency is used forperiodically updating the identifier; the version number is used for revoking the identifier in the validity period, and the version number is accumulated from 0 to top; the time efficiency identifieradopts a form of an effective time slice grade and an effective time slice serial number, along with the improvement of the time slice level, the time length represented by the time slice is increased exponentially, and the time slices of all levels adopt the same starting time. According to the relation between secret key updating and secret key revocation in the identification password system,the characteristics of the layered identifier password system are combined, and secret key revocation comprises two parts of revocation when a secret key expires and active application revocation before the secret key expires.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a general identification representation method for identification password update revocation. [0002] technical background [0003] In the actual application environment of the identification cryptography system, since the user key in the identification cryptography system is directly obtained from the user's identification, and usually, the user's identification is fixed, but when the user needs to update the key (key Key leakage or active application for key replacement), how to ensure the consistency of identification and key update is an open problem. [0004] Identity key revocation: The user identity in the identity cryptosystem is the user’s key, and revocation of the user key means that the user identity is also invalid. However, in actual usage scenarios, it is usually assumed that the user identity remains unchanged and valid for a long time, but the traditiona...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0866H04L9/0891H04L63/108
Inventor 李彪
Owner 湖南安方信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products