Security authentication and authorization control method, control system and program storage medium

A technology of authorization control and security authentication, applied in transmission systems, digital transmission systems, secure communication devices, etc., can solve the problem of few security authentication methods and achieve strong recognizability

Active Publication Date: 2021-06-15
XIDIAN UNIV
View PDF10 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] (1) Today's network is open, and the data on it is at risk of being intercepted, tampered with, replayed, and blocked by attackers, and there are few security authentication methods for electronic credential service-related fields

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security authentication and authorization control method, control system and program storage medium
  • Security authentication and authorization control method, control system and program storage medium
  • Security authentication and authorization control method, control system and program storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0249] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0250] Aiming at the problems existing in the prior art, the present invention provides a security authentication and authorization control method, a control system, and a program storage medium. The present invention will be described in detail below in conjunction with the accompanying drawings.

[0251] like figure 1 As shown, the multi-factor and proxy signature-based security authentication and authorization control method provided by the embodiment of the present invention includes the following steps:

[0252] S101, the system initialization stage;

[0253] S102, the electronic credential service device service reg...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of communication network security, and discloses a security authentication and authorization control method, a control system and a program storage medium. After a user completes registration and binding with an electronic credential service device, an electronic credential authentication service submits user authentication information to the electronic credential service device, and generates a user service authentication code. Immediately, the electronic credential service equipment completes agreement of the proxy signature right and the signature key with the electronic credential authentication service equipment. After the user completes authentication interaction with the electronic credential service equipment, the user obtains the token with the proxy signature, and then authentication access to other services of the electronic credential can be achieved by adding the token into the data packet. The electronic credential may perform signature verification or batch verification on the token according to other services. For the agency signer with violation, privacy revocation can be realized and the abuse behavior can be graded, so that the abuse behavior of the agency signer can be further corrected.

Description

technical field [0001] The invention belongs to the technical field of communication network security, and in particular relates to a security authentication and authorization control method, a control system, and a program storage medium. Background technique [0002] With the continuous development of e-commerce and the advent of the era of paperless bills, electronic certificates have become an indispensable part of people's daily life. In 2015, the State Administration of Taxation promulgated the "Announcement on Relevant Issues Concerning the Comprehensive Implementation of the Upgraded Value-Added Tax Invoice System" requiring the full implementation of the upgraded version of the Value-Added Tax Invoice System nationwide. my country's "Thirteenth Five-Year Plan for National Economic and Social Development" also clearly states "promoting electronic invoices". Existing paper invoices have problems such as low efficiency, high cost, high management risk, poor user exper...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
CPCH04L9/3213H04L9/3247H04L63/123
Inventor 曹进郭振洋李晖赵兴文
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products