User-centered multi-factor authentication method for multi-IDP aggregation
An authentication method and multi-factor technology, applied in the field of information security, can solve problems such as inability to track users and inability to interact, and achieve the effect of improving authentication efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0031] The present invention will be further described below with reference to the accompanying drawings.
[0032] refer to figure 1 The implementation steps of the present invention are further described with the examples.
[0033] The embodiment of the present invention performs identity authentication on a mobile phone user to be authenticated under the condition of two identity providers and three authentication factors.
[0034] Step 1, the data registry generates public parameters and each identity provider's signing key and verification key.
[0035] Step 1.1, using the bilinear mapping rule and the label-based signature algorithm standard, the data registration center will generate 7 public parameters q, p, G respectively. 1 ,G 2 ,g, G T Open, the data registration center transmits the generated identity of each mobile phone user to the user, and each mobile phone user uses its identity to generate a label. The label can be regarded as the alias of the mobile pho...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com