Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Credential verification and issuance through credential service providers

A certificate and issuer technology, applied in user identity/authority verification, wireless communication, secure communication devices, etc., can solve the problems of inability to verify, difficult to verify the authenticity of ID cards, and expensive verification infrastructure.

Active Publication Date: 2021-12-28
TBCASOFT INC
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are three disadvantages of this method. First, it is very expensive to build and maintain the verification infrastructure. Second, the database is usually not open to the public due to private data protection considerations. Third, the verifier needs to connect to a central server to verify the identity. , and when the central terminal is down, verification cannot be performed
The disadvantage of this method is that it is less efficient and requires visitors to register at the counter upon arrival, and it is difficult to ascertain the authenticity of the ID card used in the verification process as it may be fake

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Credential verification and issuance through credential service providers
  • Credential verification and issuance through credential service providers
  • Credential verification and issuance through credential service providers

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] A term is used herein in the broadest manner in which it is to be interpreted, even if it is used in conjunction with a detailed recitation of a particular embodiment of that term. Certain terms may be highlighted below; however, any limiting terms will be clearly defined in this section.

[0023] The embodiments described below can be implemented through programmable circuits programmed or configured by software and / or firmware, or through special function circuits as a whole, or a combination of the above. The special function circuit (if present) can be implemented in the following forms, for example: one or several application-specific integrated circuits (ASICs), programmable logic devices (PLDs), field programmable logic gate arrays (FPGAs), etc. .

[0024] The embodiments described below relate to one or more methods, systems, devices, and computer-readable media that can store processor-executable steps for verifying a credential A required credential for the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Methods, systems, apparatuses, and computer readable mediums storing processor-executable process steps for verifying a requested credential of a credential owner and / or issuing a new credential through one or more credential service providers. A method for verifying and issuing credential, includes providing, by a first credential management system of a first credential service provider, a sharing credential token and a service endpoint to a requesting device of the credential owner, upon a request; receiving, by a second credential management system of a second credential service provider, from a verifying device of a verifier through the requesting device, the sharing credential token and the service endpoint; sending, by the second credential management system, a proof request to the first credential management system based on the service endpoint; generating, by the first credential management system, a proof based on the proof request; and verifying, by the second credential management system, the proof based on credential cryptography information retrieved from a distributed ledger.

Description

technical field [0001] The present application relates to credential verification and / or credential issuance, in particular, credential verification and / or credential issuance involving one or more credential service providers. Background technique [0002] When performing certificate verification or certificate issuance, the certificate owner should present at least one traditional certificate to a person (verifier or issuer) to let the verifier or issuer or its device / organization verify whether the certificate is a real certificate and includes The information required for authentication or issuance, the credential may take a form such as: a piece of paper, a plastic card, a magnetic stripe card, a chip card or similar. From the perspective of the certificate owner, in addition to being difficult to carry in physical form and easily lost and stolen, traditional certificates also have the following disadvantages, which can be confirmed from the following examples. [0003...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04W12/06G06F16/27H04W12/69
CPCG06Q30/018H04L9/3213H04L63/0853H04L9/50H04L9/3218H04L9/3221H04L9/3239H04L9/3297G06F16/27H04L63/123H04W8/18H04W12/068G06Q2220/00
Inventor 李家欣吴陵
Owner TBCASOFT INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products