Identity authentication method and identity authentication system

An identity authentication and authenticator technology, applied in the field of identity authentication methods and identity authentication systems, can solve the problems of lack of security protection mechanism, difficult application of cryptography, and difficulty in multi-platform compatibility, so as to improve the abnormal risk processing mechanism, The effect of reducing the difficulty of integration and deployment and improving the security protection mechanism

Active Publication Date: 2021-06-11
GUOMIN RENZHENG TECH BEIJING CO LTD
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the process of using digital certificates, it is necessary to design operating systems and basic application software (such as browsers, etc.). Due to the lack of unified protocol support, users need to install various management tools, plug-ins, etc. It is difficult to be compatible with multiple platforms, and users are complicated to use. Poor; the security of digital certificates mainly focuses on key management security, but the security of front-end and back-end interaction proce

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and identity authentication system
  • Identity authentication method and identity authentication system
  • Identity authentication method and identity authentication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0044] Embodiment 1. Taking fingerprint verification as an example to illustrate the identity authentication method

[0045] 1. The user activates the certificate function, the steps are as follows:

[0046] Precondition: The user has enabled the fingerprint verification function on the user terminal, that is, the terminal device has the function of the authenticator component to collect, store and match fingerprints, and the user can already use the fingerprint to log in to the terminal device (unlock).

[0047] (1) After the user creates a user name and completes the necessary identity verification, the server sends a registration request message to the user terminal, including user ID, random number, security policy, etc.

[0048] (2) After the user performs corresponding security verification on the registration request message received by the user terminal, the user terminal then sends an instruction to the authenticator component (or independent hardware unit) to require...

Embodiment 2

[0072] Embodiment 2, fingerprint mouse FIDO combined with PKI certificate for authentication

[0073] Explanation of terms:

[0074] PKI: An infrastructure system that supports public key management and can support authentication, encryption, integrity, and accountability services.

[0075] FIDO: Fast Identity Online, an online fast identity verification alliance, provides a completely open FIDO unified authentication protocol.

[0076] COS: The execution program written in the mouse security chip, in this example, includes fingerprint, FID authenticator and PKI related content.

[0077] Most of the current PC-side login, application login, and application transaction processing are still processed by PIN codes. With the popularization of biometric devices, biometric devices such as fingerprint KEY and binocular cameras have emerged. Biometric devices have Quick authentication, without password, allows users to quickly log in and authenticate through biometric features such ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity authentication method and an identity authentication system. A unified authentication protocol is adopted for communication between a server side of the system and a user terminal, and the user terminal is connected with an authenticator element. The authentication method comprises the following steps that after receiving an authentication request, a server side issues an authentication request message to a user terminal and waits for an authentication response message; after receiving an authentication response message generated by the user terminal, the server side performs message verification, performs digital signature verification of the digital certificate and issues an authentication result, wherein the authenticator element is a terminal authentication device capable of realizing identity feature acquisition, extraction, storage and matching. The system and the method are based on a digital certificate security application mechanism of a unified protocol, are compatible with a PKI system, provide unified authentication service for services, reduce integration deployment difficulty, are good in user experience and high in security, and also protect user privacy.

Description

technical field [0001] The invention relates to the technical field of user identity authentication, in particular to an identity authentication method and an identity authentication system with good compatibility. Background technique [0002] At present, the popular authentication solution in the industry is to manage keys through special hardware devices, provide different management tools and plug-ins for different operating systems and application software to complete the use of the application side, and send the digital signature results to the backend through the communication link. The terminal completes the digital signature verification. [0003] In the process of using digital certificates, it is necessary to design operating systems and basic application software (such as browsers, etc.). Due to the lack of unified protocol support, users need to install various management tools, plug-ins, etc. It is difficult to be compatible with multiple platforms, and users a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/0823H04L63/083H04L63/0861H04L9/3247H04L9/3226H04L9/3231H04L9/3268
Inventor 韩少波胡永亮
Owner GUOMIN RENZHENG TECH BEIJING CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products