Identity authentication method and device

A technology for identity authentication and identity authentication results, applied in the field of identity authentication methods and devices, can solve problems such as inability to guarantee information security, and achieve the effect of improving security

Pending Publication Date: 2021-04-27
SHANGHAI IND U TECH RES INST
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This will bring about a problem, that is, if the encryption and decryption method is cracked, the security of the information cannot be guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and device
  • Identity authentication method and device
  • Identity authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0040] figure 1 It is a flow chart of the identity authentication method provided in Embodiment 1 of the present application. This embodiment is applicable to the situation of information interaction. The method can be executed by the identity authentication device provided in the embodiment of the present application. The device can be implemented by software and / or hardware and can be integrated into the vehicle system.

[0041] Such as figure 1 As shown, the identity authentication method includes:

[0042] S110. Send the vehicle system decentralized identity and a template request to the cloud platform; the cloud platform obtains the vehicle system public key according to the vehicle system decentralized identity.

[0043] Wherein, the vehicle system may be a system for managing and controlling vehicle information, such as a vehicle manufacturer or the like. Before the vehicle system sends the decentralized identity, the local public key can be uploaded to the chain, an...

Embodiment 2

[0055] figure 2 It is a flow chart of the identity authentication method provided in Embodiment 2 of the present application. This embodiment is applicable to the situation of information interaction. The method can be executed by the identity authentication device provided in the embodiment of the present application. The device can be implemented by software and / or hardware way, and can be integrated in the cloud platform.

[0056] Such as figure 2 As shown, the identity authentication method includes:

[0057] S210. The receiving vehicle system sends the vehicle system decentralized identity and template request.

[0058] Among them, the cloud platform can receive the decentralized identity and template request sent by the vehicle system through the communication module.

[0059] S220. Obtain a vehicle system public key according to the vehicle system decentralized identity.

[0060] Among them, the decentralized identity of the vehicle system can be equivalent to the...

Embodiment 3

[0072] image 3 It is a schematic structural diagram of the identity authentication device provided in Embodiment 3 of the present application. Such as image 3 As shown, the identity authentication device is configured in a vehicle system, and the device includes:

[0073] The request sending module 310 is used to send the vehicle system decentralized identity and template request to the cloud platform; the cloud platform obtains the vehicle system public key according to the vehicle system decentralized identity;

[0074] The return information receiving module 320 is used to receive the return information of the cloud platform, and the return information includes the decentralized identity of the cloud platform, template framework and random numbers; wherein, the return information is encrypted by the public key of the vehicle system;

[0075] The template filling module 330 is used to use the private key of the vehicle system to decrypt the returned information, fill in ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses an identity authentication method and device. The method comprises the following steps: sending a vehicle system decentralized identity and a template request to a cloud platform; the cloud platform obtaining a vehicle system public key according to the vehicle system decentralized identity; receiving return information of the cloud platform, wherein the return information comprises a decentralized identity of the cloud platform, a template framework and a random number; decrypting the returned information by using a vehicle system private key, filling information in the template framework, encrypting the random number and the filled template by using a cloud platform public key, and sending the encrypted random number and filled template to the cloud platform; decrypting by the cloud platform by using the cloud platform private key, and determining an identity authentication result according to the consistency of the random number and the random number stored in the cloud platform; and receiving an identity authentication result returned by the cloud platform. By implementing the technical scheme provided by the invention, the effect of improving the security of the information can be achieved.

Description

technical field [0001] The embodiments of the present application relate to the field of computer technology, and in particular to an identity authentication method and device. Background technique [0002] With the rapid development of science and technology, the transmission of information content tends to adopt the form of the Internet more and more. However, information transmission on the Internet often has certain risks. For example, hackers maliciously use false identities to obtain confidential information, which greatly affects the information security of users. The way people currently use is mainly to encrypt the content of the information and interact with the communication counterparty. This will cause a problem, that is, if the encryption and decryption method is cracked, the security of the information cannot be guaranteed. Contents of the invention [0003] Embodiments of the present application provide an identity authentication method and device, which ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/08H04L29/06
CPCH04L67/12H04L63/08H04L63/0428
Inventor 杨文伟许霞李宏
Owner SHANGHAI IND U TECH RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products