Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication terminal for compiling password based on identity authentication digital signature

A digital signature and password technology, applied in the field of network information security, can solve the problems of inability to prove the identity of network users, the inability of network users to prove digital signatures, and the inability to verify the authenticity of identity of network users, so as to prevent forged identities The effect of unauthorized access to network resources, defense against fake identity authentication, and defense against attacks on network user identity certification

Pending Publication Date: 2020-05-15
BEIJING PASSWORD TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Because the current network identity authentication system authenticates the client and the identity certificate for the network user to log in, the authentication client cannot authenticate the identity of the network user, and the authentication server can only verify the legality of the network user's identity certificate, but cannot verify the authenticity of the identity certificate of the network user. sex
As a result, attackers forge identities and gain unauthorized access to network resources
Network users cannot digitally sign their identity certificates through the authentication client, and criminals use identity certificates to cooperate with others and maliciously collude with network resources to authorize access to deny

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication terminal for compiling password based on identity authentication digital signature
  • Authentication terminal for compiling password based on identity authentication digital signature

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0007] In order to describe the structural characteristics and operation steps of the present invention in detail, the following preferred embodiments are given below and further described with reference to the accompanying drawings. like figure 1 Shown: the present invention comprises main body 101, and described main body 101 is provided with microprocessor 102, and described microprocessor 102 is the command and control center of whole authentication terminal, has the dynamic password of receiving authentication server, based on the rule key of operation and fingerprint key Correct with memory 4 rule key and fingerprint identification, instruction key signature module 103 and dynamic password digital signature work out password, and send authentication server; Described microprocessor 102 top is provided with key signature module 103, and described key Signature module 103 is used for dynamic password operation digital signature and makes up password; Described key signatur...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an authentication terminal for compiling a password based on an identity authentication digital signature. The terminal is characterized by comprising a main body, the main body is provided with a microprocessor, and the microprocessor is a command and control center of the whole authentication terminal; a secret key signature module is arranged over the microprocessor; the secret key signature module is connected with the microprocessor, and a memory is arranged under the microprocessor; the memory is connected with the microprocessor, the upper end of the microprocessor is provided with an operation interface, the operation interface is provided with a rule key and a fingerprint key, and a dynamic password is arranged above the rule key and the fingerprint key; the dynamic password is connected with the secret key signature module, the dynamic password is connected with the microprocessor, and the microprocessor is connected with the rule key and the fingerprint key. The authentication terminal is simple in operation, convenient to use, safe and reliable, and can be applied to identity authentication digital signature password compiling of a network identity authentication system.

Description

technical field [0001] The invention relates to the field of network information security, in particular to an authentication terminal in the field of network information security that compiles a password based on an identity authentication digital signature. Background technique [0002] With the rapid development of the Internet, communication 5G, artificial intelligence, the Internet of Things, and big data have increasingly become the leading forces for innovation-driven development. Cyberspace has become the "fifth frontier" after land, sea, air, and space. People are becoming more and more dependent on cyberspace, information exchanges and interactions in cyberspace are increasing, and the things carried by cyberspace are becoming more and more important. Network identity authentication has become the first line of defense to protect network information resources. Because the current network identity authentication system authenticates the client and the identity cert...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/0853H04L9/3247H04L63/083H04L63/0861
Inventor 不公告发明人
Owner BEIJING PASSWORD TECH