Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A security authentication and authorization control method, control system, and program storage medium

A technology of authorization control and security authentication, applied in transmission systems, digital transmission systems, security communication devices, etc., can solve the problem of few security authentication methods, and achieve the effect of strong identifiability

Active Publication Date: 2021-12-28
XIDIAN UNIV
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] (1) Today's network is open, and the data on it is at risk of being intercepted, tampered with, replayed, and blocked by attackers, and there are few security authentication methods for electronic credential service-related fields

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security authentication and authorization control method, control system, and program storage medium
  • A security authentication and authorization control method, control system, and program storage medium
  • A security authentication and authorization control method, control system, and program storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0249] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0250] Aiming at the problems existing in the prior art, the present invention provides a security authentication and authorization control method, a control system, and a program storage medium. The present invention will be described in detail below in conjunction with the accompanying drawings.

[0251] Such as figure 1 As shown, the multi-factor and proxy signature-based security authentication and authorization control method provided by the embodiment of the present invention includes the following steps:

[0252] S101, the system initialization stage;

[0253] S102, the electronic credential service device service ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of communication network security, and discloses a security authentication and authorization control method, a control system, and a program storage medium. After a user completes registration and binding with an electronic credential service device, the electronic credential authentication service sends the user authentication information Hand it over to the electronic credential service device, and generate a user service authentication code. Immediately, the electronic credential service device completes the negotiation of the proxy signature right and the signature key with the electronic credential authentication service device. After the user completes the authentication interaction with the electronic credential service device, and gets the token with the proxy signature, he can add the token to the data package to realize the authenticated access to other services of the electronic credential. Electronic Credentials Other businesses can perform signature verification or batch verification on tokens. For the proxy signer who violates the rules, the present invention can realize privacy revocation and classify the abuse behavior, so as to further correct the abuse behavior of the proxy signer.

Description

technical field [0001] The invention belongs to the technical field of communication network security, and in particular relates to a security authentication and authorization control method, a control system, and a program storage medium. Background technique [0002] With the continuous development of e-commerce and the advent of the era of paperless bills, electronic certificates have become an indispensable part of people's daily life. In 2015, the State Administration of Taxation promulgated the "Announcement on Relevant Issues Concerning the Comprehensive Implementation of the Upgraded Value-Added Tax Invoice System" requiring the full implementation of the upgraded version of the Value-Added Tax Invoice System nationwide. my country's "Thirteenth Five-Year Plan for National Economic and Social Development" also clearly states "promoting electronic invoices". Existing paper invoices have problems such as low efficiency, high cost, high management risk, poor user exper...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06
CPCH04L9/3213H04L9/3247H04L63/123
Inventor 曹进郭振洋李晖赵兴文
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products