Movatterモバイル変換


[0]ホーム

URL:


CN105634741A - Identity authentication method based on trusted tag and identity authentication system based on trusted tag - Google Patents

Identity authentication method based on trusted tag and identity authentication system based on trusted tag
Download PDF

Info

Publication number
CN105634741A
CN105634741ACN201510991475.6ACN201510991475ACN105634741ACN 105634741 ACN105634741 ACN 105634741ACN 201510991475 ACN201510991475 ACN 201510991475ACN 105634741 ACN105634741 ACN 105634741A
Authority
CN
China
Prior art keywords
information
identity
credible label
identity information
credible
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510991475.6A
Other languages
Chinese (zh)
Inventor
祝国龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Laibo Information Technology Co Ltd
Original Assignee
Shanghai Laibo Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Laibo Information Technology Co LtdfiledCriticalShanghai Laibo Information Technology Co Ltd
Priority to CN201510991475.6ApriorityCriticalpatent/CN105634741A/en
Publication of CN105634741ApublicationCriticalpatent/CN105634741A/en
Pendinglegal-statusCriticalCurrent

Links

Classifications

Landscapes

Abstract

The invention discloses an identity authentication method based on a trusted tag and an identity authentication system based on the trusted tag. According to the system, identity information of an authenticated person is included in the trusted tag, integrity of the identity information of the authenticated person is guaranteed by utilizing the tamper-proof and anti-repudiation functions of the trusted tag, and the detailed identity information is displayed at a verification client side for further comparison after passing of verification of the trusted tag so that the further judgment basis is provided for the next step of operation of the authenticated person. The tag has the content tamper-proof and anti-repudiation characteristics so that authenticity and reliability of the identity information or payment information of the authenticated person included in the tag can be guaranteed; the detailed identity information or the detailed payment information can be seen at the verification client side so that a verifier is enabled to perform judgment more visually; the requirement for storage space of the trusted tag can be reduced so that use cost can be further reduced; and a CPU used for encryption is not required so that cost is lower.

Description

Identity identifying method and Verification System thereof based on credible label
Technical field
The present invention relates to cryptography, computer network security, authentication and authorization and network payment field, specifically, relate to a kind of identity identifying method based on credible label and Verification System thereof.
Background technology
Rivest, shamir, adelman is the time slot scrambling of a kind of key. Rivest, shamir, adelman needs two keys: public-key cryptography (publickey) and private cipher key (privatekey). Public-key cryptography and private cipher key are a pair, if data are encrypted with public-key cryptography, only could decipher with corresponding private cipher key; If data are encrypted with private cipher key, then only could decipher with corresponding public-key cryptography. Two different keys are used with deciphering, so this algorithm is called rivest, shamir, adelman because encrypting.
Credible label described in this patent is a kind of limited storage space proposed in number of patent application 2015104548965, and carry anti-tamper and the graphical label of anti-repudiation information, digital label or chip tag, the information carried in this label has carried out signature authentication or encryption by asymmetric encryption techniques method, its form of expression can be Quick Response Code, RFID tag, NFC label, electronic tag, chip tag, sensor tag etc.
Being typically all at present and realize authentication with integrated circuit card (i.e. IC-card), its shortcoming is relatively costly. In order to save cost, Ye You businessman attempts adopting Quick Response Code to replace IC-card, but owing to ordinary two dimensional code has inborn easy forgery feature, the therefore safely and effectively authentication means of a kind of low cost of urgent needs.
It addition, developing rapidly along with ecommerce, various means of payment are arisen at the historic moment. Quick Response Code on-line off-line at present pays very popular. But owing to the congenital safety of Quick Response Code is not enough, make this kind of means of payment have serious potential safety hazard.
Summary of the invention
It is an object of the invention to provide a kind of identity identifying method based on credible label and Verification System thereof, it is intended to solve prior art relatively costly, or the problem of poor stability.
For achieving the above object, the technical scheme that the present invention takes is:
A kind of identity identifying method based on credible label; the identity information of the certified person in credible label has been carried out digital signature protection; wherein; digital signature; also referred to as public key digital signature; refer to the one group of specific symbol or code that are attached in a certain electronic document; it utilizes mathematical method and cryptographic algorithm this electronic document is carried out key message extraction and is encrypted and is formed; for identity and the label originator accreditation to electronic document of identification issuer, and can be used for verifying whether this electronic document is tampered in transmitting procedure or forges by recipient. Digital signing operations detailed process is as follows: signed e-file (claiming electronic message in Electronic Signature Law) is done digital digest with hash algorithm by sender, again digital digest signature private key is done asymmetric encryption, namely digital signature is done, it is the PKI of above signature and e-file original text and signing certificate is added together formation signature result be sent to debit afterwards, treats that debit verifies. After recipient receives data, first by the public key decryptions digital signature of sender, derive digital digest, and e-file original text is done same hash algorithm, obtain a new digital digest, the cryptographic Hash that two are made a summary is carried out results contrast, if result is identical, signature is verified, and otherwise signs invalid.
Preferably, described identity information is payment information.
Preferably, described identity information includes at least: complete identity information; Electronic identifications; The network storage address of identity information; For inquiring about the Query Information of the data base comprising identity information; Complete delegated strategy information; The storage network address of delegated strategy; For inquiring about the Query Information of the data base comprising delegated strategy; Complete accounts information; Account identification; Pay labelling; For inquiring about the one in the Query Information of the digital library comprising accounts information.
Preferably, described credible label has an effective time scope, not at this moment between in scope, the failure of credible label Verification.
Preferably, described credible label can be disposable, and when this credible label is previously used after once, credible label ceases to be in force automatically.
Preferably, after credible label Verification passes through, checking client can show detailed identity information or payment information.
Preferably, described data base can in this locality, it is also possible on the internet.
Present invention also offers a kind of identity authorization system based on credible label, including
Credible label creation system, for generating the credible label of the anti-tamper anti-repudiation with authenticating identity;
Credible label Verification client, for verifying the integrity of the identity information comprised in credible label, and when being verified, shows detailed identity information or payment information, and stores server update the result to identity information;
Identity information storage server, for storing the identity information of certified person and delegated strategy information and making corresponding mandate according to delegated strategy, or storage payment information complete to pay, and after the renewal receiving checking client more new database.
The method have the advantages that
(1) the credible label that the present invention uses has label generator's identity certification, and label comprises the feature of content interpolation-preventing anti-repudiation, thus ensure that the identity information of certified person or the verity of payment information and reliability that comprise in label;
(2) the credible label for authentication or payment of the present invention, at checking client it can be seen that detailed identity information (photo etc. such as certified person) or detailed payment information, thus verifier can be judged more intuitively;
(3) the credible label for authentication or payment of the present invention, detailed identity information, delegated strategy information or payment information can be stored in the webserver, thus reducing the requirement of memory space to credible label, use cost therefore can be reduced further;
(4) the credible label for authentication or payment of the present invention, it is not necessary to possess the CPU for encrypting, therefore lower in cost.
Accompanying drawing explanation
Fig. 1 is the embodiment of the present invention system scenarios structure chart based on the identity authorization system of credible label
Checking client identity process figure in Fig. 2 embodiment of the present invention.
Detailed description of the invention
In order to make objects and advantages of the present invention clearly understand, below in conjunction with embodiment, the present invention is further elaborated. Should be appreciated that specific embodiment described herein is only in order to explain the present invention, is not intended to limit the present invention.
Embodiments providing a kind of identity identifying method based on credible label, the identity information of the certified person in credible label has been carried out digital signature protection, described identity information is payment information. Described identity information includes at least: complete identity information; Electronic identifications; The network storage address of identity information; For inquiring about the Query Information of the data base comprising identity information; Complete delegated strategy information; The storage network address of delegated strategy; For inquiring about the Query Information of the data base comprising delegated strategy; Complete accounts information; Account identification; Pay labelling; For inquiring about the one in the Query Information of the digital library comprising accounts information. Described credible label has an effective time scope, not at this moment between in scope, the failure of credible label Verification. Described credible label can be disposable, and when this credible label is previously used after once, credible label ceases to be in force automatically. After credible label Verification passes through, checking client can show detailed identity information or payment information.
As it is shown in figure 1, the embodiment of the present invention additionally provides a kind of identity authorization system based on credible label, including
Credible label creation system, for generating the credible label of the anti-tamper anti-repudiation with authenticating identity;
Credible label Verification client, for verifying the integrity of the identity information comprised in credible label, and when being verified, shows detailed identity information or payment information, and stores server update the result to identity information;
Identity information storage server, for storing the identity information of certified person and delegated strategy information and making corresponding mandate according to delegated strategy, or storage payment information complete to pay, and after the renewal receiving checking client more new database.
As shown in Figure 2, originally it is embodied as to ensure the identity information of certified person or the true and reliable of payment information, first require that label generator examines the verity of comprised information, then this information is digitally signed protection, therefore, verifier can by verifying that digital signature determines integrity and the verity of identity information or the payment information being verified; Verifier is after the credible label of good authentication, it can be seen that the detailed identification information of the certified person (photo such as authenticatee, height, body weight etc.), or detailed payment information (includes the identity information of beneficiary, dealing money etc.), thus verifier can be judged more intuitively; For the credible label of authentication or payment can replace, with the Query Information of a network storage address or inquiry data base, detailed identification information or the payment information that quantity of information is bigger, after credible label Verification passes through, downloaded by network or database retrieval gets detailed identity information, thus being substantially reduced the requirement of memory space to credible label, thus reducing use cost; Credible label for authentication or payment is that the method adopting digital signature is to ensure integrity and the non-repudiation of the identity information of certified person, therefore, as long as credible label comprises the information needed for checking digital signature, and need not move through embedded CPU etc. and carry out dynamic encryption information
Embodiment
Step one: a detailed member database (including the information such as the essential informations such as member names, height, and the photo of member) is safeguarded in membership club on the server of oneself;
Step 2: membership club is that every member generates the credible two-dimension code that can not distort, and wherein comprises the information such as No. ID of every member and the reference address of data base;
Step 3: when every member arrives club, show the member's Quick Response Code of oneself, the digital signature verifying Quick Response Code can be passed through to determine the integrity of the identity information comprised in Quick Response Code in club foreground, if authentication failed, then authentic membership is insincere;
Step 4: if Quick Response Code is verified, member's detailed identification information that then further the profile of the certified member of comparison and checking client return, if comparison is consistent, then certified member is this club true member, and otherwise authentic membership is insincere.
The above is only the preferred embodiment of the present invention; it should be pointed out that, for those skilled in the art, under the premise without departing from the principles of the invention; can also making some improvements and modifications, these improvements and modifications also should be regarded as protection scope of the present invention.

Claims (8)

CN201510991475.6A2015-12-242015-12-24Identity authentication method based on trusted tag and identity authentication system based on trusted tagPendingCN105634741A (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201510991475.6ACN105634741A (en)2015-12-242015-12-24Identity authentication method based on trusted tag and identity authentication system based on trusted tag

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201510991475.6ACN105634741A (en)2015-12-242015-12-24Identity authentication method based on trusted tag and identity authentication system based on trusted tag

Publications (1)

Publication NumberPublication Date
CN105634741Atrue CN105634741A (en)2016-06-01

Family

ID=56049297

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201510991475.6APendingCN105634741A (en)2015-12-242015-12-24Identity authentication method based on trusted tag and identity authentication system based on trusted tag

Country Status (1)

CountryLink
CN (1)CN105634741A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN108537315A (en)*2018-04-132018-09-14中国人民武装警察部队工程大学A kind of generation of safe Quick Response Code and authentication method
CN111340464A (en)*2016-09-202020-06-26徐蔚Digital currency payment method and device based on digital person and mobile terminal
CN115065529A (en)*2022-06-132022-09-16北京寰宇天穹信息技术有限公司Access control method based on credible label fusing host and object key information

Citations (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN103617531A (en)*2013-12-162014-03-05信雅达系统工程股份有限公司Safety payment method and device based on credible two-dimension code
CN104933610A (en)*2015-06-102015-09-23金亚东Mobile payment system and method for self-service purchase of goods and services
CN105024824A (en)*2014-11-052015-11-04祝国龙Method for generating and verifying credible label based on asymmetrical encryption algorithm and system
CN105095728A (en)*2015-06-152015-11-25南京市信息中心Two-dimensional code identification method based on digital signatures and timestamps

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN103617531A (en)*2013-12-162014-03-05信雅达系统工程股份有限公司Safety payment method and device based on credible two-dimension code
CN105024824A (en)*2014-11-052015-11-04祝国龙Method for generating and verifying credible label based on asymmetrical encryption algorithm and system
CN104933610A (en)*2015-06-102015-09-23金亚东Mobile payment system and method for self-service purchase of goods and services
CN105095728A (en)*2015-06-152015-11-25南京市信息中心Two-dimensional code identification method based on digital signatures and timestamps

Cited By (7)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN111340464A (en)*2016-09-202020-06-26徐蔚Digital currency payment method and device based on digital person and mobile terminal
CN111541728A (en)*2016-09-202020-08-14徐蔚Digital currency payment method and device using payment mark and mobile terminal
CN111541728B (en)*2016-09-202023-10-10徐蔚Payment method and device using payment mark and mobile terminal
CN111340464B (en)*2016-09-202023-12-12徐蔚Digital person payment method and device and mobile terminal
CN108537315A (en)*2018-04-132018-09-14中国人民武装警察部队工程大学A kind of generation of safe Quick Response Code and authentication method
CN115065529A (en)*2022-06-132022-09-16北京寰宇天穹信息技术有限公司Access control method based on credible label fusing host and object key information
CN115065529B (en)*2022-06-132023-11-03北京寰宇天穹信息技术有限公司Access control method based on trusted tag fusing key information of host and guest

Similar Documents

PublicationPublication DateTitle
US12316784B2 (en)Method and system for authentication credential
US12219069B1 (en)Signcrypted biometric electronic signature tokens
CN103067401B (en)Method and system for key protection
TWI497336B (en)Data security devices and computer program
CN102255917B (en)Method, system and device for updating and synchronizing keys of dynamic token
CN103078742B (en)Generation method and system of digital certificate
CN109064324A (en)Method of commerce, electronic device and readable storage medium storing program for executing based on alliance's chain
CN103854180B (en)Credit voucher generating method and system, and application authorization method and system
JPWO2007094165A1 (en) Identification system and program, and identification method
KR20140035775A (en)Payment method, server performing the same, storage media storing the same and system performing the same
US20140289129A1 (en)Method for secure contactless communication of a smart card and a point of sale terminal
JP2003521154A (en) How to issue electronic identification information
US20070118736A1 (en)Customization of a bank card for other applications
CN103036681B (en)A kind of password safety keyboard device and system
CN105009154A (en)Method for mutual authentication for payment device
US20070118753A1 (en)Customization of an electronic circuit
US20180205714A1 (en)System and Method for Authenticating Electronic Tags
JP2009272671A (en)Secret authentication system
US20230065163A1 (en)Techniques and systems to perform authentication and payment operations with a contactless card to provide items and services
CN102054250A (en)System and method for obtaining an authorization key to use a product
JP7400444B2 (en) Public key certificate generation method for IoT key management system, secure device, IoT device, device management device, and secure element
CN105634741A (en)Identity authentication method based on trusted tag and identity authentication system based on trusted tag
KR102122555B1 (en)System and Method for Identification Based on Finanace Card Possessed by User
Rosati et al.Elliptic curve certificates and signatures for nfc signature records
CN105427102A (en)Financial IC card based authentication method and corresponding device and system

Legal Events

DateCodeTitleDescription
C06Publication
PB01Publication
C10Entry into substantive examination
SE01Entry into force of request for substantive examination
RJ01Rejection of invention patent application after publication
RJ01Rejection of invention patent application after publication

Application publication date:20160601


[8]ページ先頭

©2009-2025 Movatter.jp