Signature identification-based digital certificate authentication method

A technology for digital identification and signature authentication, which is applied in the field of information security and can solve problems such as fraudulent use of identities

Inactive Publication Date: 2021-06-08
讯翱(上海)科技有限公司
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Aiming at the deficiencies in the prior art, the object of the present invention is that the present invention provides a method based on signature identification to solve the problem of fraudulent use of identities in traditional network transactions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Signature identification-based digital certificate authentication method
  • Signature identification-based digital certificate authentication method
  • Signature identification-based digital certificate authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] figure 1 A flow chart of an authentication method based on signature recognition digital certificate according to an exemplary embodiment of the present invention is shown.

[0030] First, collect the feature matrix of the signature information specified by the user according to the above method in S101.

[0031] Log in the designated server address in S102.

[0032] In S102, the server downloads the specified CRL file from the specified publishing website.

[0033] At S103 the server accesses the CR1 file to check the validity of the certificate.

[0034] In S104, if the information of the certificate is recorded in the specified CRL information, the expiration of the certificate ends.

[0035] After the verification in S105 is successful, the first verification is successful.

[0036] In S106, the user writes and inputs the specified information, and performs matrix similarity calculation through the above-mentioned algorithm,

[0037]

[0038] After several i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a signature identification-based digital signature authentication method. High frequency feature points in a signature process are collected, and corresponding feature values are collected through matrix operation. A feature value matrix acquired from an image is encrypted by using a specific CA private key algorithm to form a specific encryption matrix, a hashcode of user information and a hashcode of the encryption matrix are spliced to form a new character string, a new character string is encoded through a Base64 encoding format to generate a feature fingerprint, the feature fingerprint is stored on a certificate, and meanwhile, a database also stores specific fingerprints and specified user name information for identity authentication and comparison.

Description

technical field [0001] The invention relates to the fields of information security and network security, in particular to a digital certificate authentication method based on signature recognition. Background technique [0002] Signature recognition is an identity recognition method based on image processing. By collecting the matrix information of the image in the signing process, and then comparing it with the signature information on the digital certificate, it is beneficial to a strategy similar to double signatures to further prevent users on the network from The identity is fraudulently used to ensure the integrity and security of information and data to a certain extent. Contents of the invention [0003] Aiming at the deficiencies in the prior art, the object of the present invention is that the present invention provides a method based on signature identification to solve the problem of fraudulent use of identities in traditional network transactions. Different f...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30H04L9/32H04L29/06H04L29/08G06K9/00G06K9/62G06Q20/38G06Q20/40
CPCH04L9/3066H04L9/3247H04L9/3263H04L63/0442H04L67/06G06Q20/38215G06Q20/3827G06Q20/3829G06Q20/4014G06V40/30G06F18/22
Inventor 李晓坤徐龙刘清源董潍赫黄逸群付文香张心雨陈伟良赵瑞
Owner 讯翱(上海)科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products