Method, system and device for achieving credible digital identity decryption and signature verification through software library

A digital identity and software library technology, applied in digital data authentication, digital data protection, electronic digital data processing, etc., can solve problems such as not having a dedicated security chip, unable to decrypt data and encrypt part of the data, and restricting digital identity application scenarios. Achieve the effect of expanding the use scenarios and application scope of digital identity

Pending Publication Date: 2021-01-22
新大陆(福建)公共服务有限公司
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the existing technology, a large number of embedded devices do not have a dedicated security chip, which cannot guarantee the authenticity of offline verification of trusted digital identity data, and cannot decrypt the encrypted part of the data. Therefore, digital identity application scenarios are greatly limited.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, system and device for achieving credible digital identity decryption and signature verification through software library
  • Method, system and device for achieving credible digital identity decryption and signature verification through software library
  • Method, system and device for achieving credible digital identity decryption and signature verification through software library

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0025] see figure 1 and figure 2 , a method for realizing trusted digital identity verification and decryption with a software library, comprising the following steps:

[0026] (1) Compile the software with a software library, and the key needed for trusted digital identity reading is built into the software library, so that the software has signature verification and decryption functions;

[0027] (2) Download the software to the device used to scan the QR code of the network certificate, so that the device has its own trusted digital identity verification and decryption functions, even in offline devices without a dedicated security chip installed can also use the built-in The software library executes the program for signature verification and decryption;

[0028] (3) The device scans the QR code of the network certificate containing the citizen identity data issued by the trusted digital identity platform, and receives and obtains the trusted digital identity data; amon...

Embodiment 2

[0035] see image 3 , the invention discloses a system that uses a software library to realize signature verification and decryption of trusted digital identities, including a main control module, a two-dimensional code scanning and reading module for network certificates, a signature verification and decryption module, and an identity information feedback module; the main The control module communicates with the network certificate two-dimensional code scanning and reading module, the network certificate two-dimensional code scanning and reading module connects with the signature verification and decryption module through a function call interface, and the signature verification and decryption module communicates with the identity information feedback module; the main The control module controls the two-dimensional code scanning and reading module of the network certificate to scan the two-dimensional code of the network certificate to obtain credible digital identity data; a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for realizing trusted digital identity signature verification and decryption by using a software library and a system and equipment for realizing the method, and themethod comprises the following steps: (1) compiling software with the software library, and setting a secret key required by trusted digital identity reading in the software library, so that the software has signature verification and decryption functions; (2) downloading the software into equipment for scanning the net certificate two-dimensional code, so that the equipment has trusted digital identity verification and decryption functions; (3) the equipment scanning the net certificate two-dimensional code which is issued by the trusted digital identity platform and contains citizen identitydata, and receiving and acquiring the trusted digital identity data; (4) software in the equipment calling a software library to perform signature verification and decryption on the received credibledigital identity data; and (5) after the software library signature verification and decryption operation is finished, returning a verification result to the software and outputting the verificationresult by the equipment.

Description

technical field [0001] The invention relates to a method, system and equipment for realizing trusted digital identity decryption and signature verification by using a software library, belonging to the technical field of digital security. Background technique [0002] Identity authentication modes are usually divided into four types: real-name, real-person, real-name or online certificate authentication. For a long time, identity authentication has been dominated by real-name and real-person authentication. In recent years, online certificate authentication has gradually become one of the mainstream authentication methods. Trusted digital identity is the network credible certificate of resident ID card (referred to as "net certificate"), which is based on the legal certificate data of the Ministry of Public Security and adopts national secret algorithm. Desensitize and de-identify the identity information carried by the resident ID card, uniformly generate data files that ar...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F21/60G06F21/64G06K17/00
CPCG06F21/31G06F21/602G06F21/64G06K17/0025
Inventor 林龙林海堤陈文印
Owner 新大陆(福建)公共服务有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products