Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Two-factor authentication method based on digital certificate and biological identification information

A biometric information and digital certificate technology, applied in the field of accounting voucher management system, can solve the problems of enterprise loss, being used by others, and the authenticity of loss transactions, and achieve the effect of ensuring absolute security and ensuring security.

Active Publication Date: 2014-03-05
BEIJING HUACAI REASONABLE ACCOUNT CONSULTANTS
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, although digital certificates can guarantee the non-repudiation of both parties to the transaction, they still cannot guarantee the absolute security of the transaction. For example, after the digital certificate is lost or stolen, such as a notebook or mobile phone with a digital certificate installed is lost and used by others. The problem
[0003] The above problems are particularly prominent in the accounting voucher management system. This is because, for accounting companies, they are entrusted by corporate customers to manage financial affairs for the company; at the same time, they are also subject to the supervision and management of the national taxation department. When the accounting voucher management system is formed, there are strict requirements for the identity of the operator. The accounting vouchers for each transaction need to be signed or authorized by the leaders of the relevant departments of the enterprise. When applying the accounting voucher management system through the computer network, For accounting companies, if only the relevant leaders of corporate customers are required to use digital certificates (usually digital authentication client application plug-ins) for identity authentication, it is impossible to ensure that the leaders using the digital certificates are themselves. Losses or inauthentic transactions will bring losses to the company on the one hand, and on the other hand, it is impossible to clarify the responsibility when pursuing future responsibilities

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-factor authentication method based on digital certificate and biological identification information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] In order to make the above-mentioned purposes, features and advantages of the present invention more obvious and understandable, the realization principle of the present invention is described in detail below, and the present invention is further described in detail in conjunction with the accompanying drawings:

[0015] In 1976, American scholars Dime and Henman proposed a new key exchange protocol in order to solve the problems of information public transmission and key management, allowing communication parties on insecure media to exchange information and securely reach an agreed key. This is the "public key system". Compared with "symmetric encryption algorithm", this method is also called "asymmetric encryption algorithm".

[0016] Unlike symmetric encryption algorithms, asymmetric encryption algorithms require two keys: a public key (publickey) and a private key (privatekey). The public key and the private key are a pair. If the data is encrypted with the public...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a two-factor authentication method based on a digital certificate and biological identification information. The main idea of the method is that a certificate authority (CA) digital certificate is transmitted to a mobile phone or a personal computer (PC) terminal of a user which is a normal user or a financial approval leader in a server such as a server of an accounting document management system, the digital certificate can pass the authentication of a third-party authority electronic authentication center, validity of the user is verified by the digital certificate, and the biological identification information is used as a respective private key in a digital certificate key pair which is used by the server and a client in the authentication process of the digital certificate to further ensure the security of authentication; and the biological information such as iris information and fingerprint information is identity inherent information and cannot be copied or stolen, so that the absolute security of authentication can be ensured.

Description

technical field [0001] The invention belongs to the technical field of digital security authentication, and in particular relates to a security authentication method based on double authentication of digital certificate and biological information identification, which can be applied to an accounting certificate management system with relatively strict requirements on identity authentication. Background technique [0002] The rapid development of computer network and information technology not only promotes the rapid development of informatization, but also brings many new security problems and risks. As the first security checkpoint of the information system, the identity authentication system is an important measure to ensure that only legitimate users can access the information system and read and write information. The traditional username and password authentication method is easy to implement and low in cost, but because the password is static data, it needs to be trans...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 潘瑜青王久立孙丽梅
Owner BEIJING HUACAI REASONABLE ACCOUNT CONSULTANTS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products