Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity authentication system and method based on electronic identification card

An electronic ID card and identity authentication technology, which is applied in the field of computer networks, can solve the problems of inconvenient use for users, different levels of security, and the inability to effectively prevent personal identities from being fraudulently used or embezzled, etc., so as to improve convenience and reliability , the effect of protecting identity privacy

Active Publication Date: 2015-10-21
尤磊
View PDF7 Cites 48 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this "associated comparison" method has the following problems in large-scale application scenarios: 1) The correct comparison of personal information does not mean that it is the true will of the person, and it cannot effectively prevent the risk of personal identity being fraudulently used or stolen ; 2) The existing network application service agencies that collect personal information have different security levels, that is, the risk of large-scale leakage of personal information is getting higher and higher
It can be seen that this application form still has the problem of not being convenient for users to use, so a new identity authentication system and method that can solve the above problems has become a demand

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication system and method based on electronic identification card
  • Identity authentication system and method based on electronic identification card
  • Identity authentication system and method based on electronic identification card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the specific implementation manners of the present invention will be described below with reference to the accompanying drawings. Obviously, the accompanying drawings in the following description are only some embodiments of the present invention, and those skilled in the art can also obtain other accompanying drawings based on these drawings and obtain other implementations.

[0046] Such as figure 1 Shown is a schematic structural diagram of an identity authentication system based on an electronic ID card in the present invention. It can be seen from the figure that the identity authentication system includes: an intelligent terminal 100, an operator server 200, a network identity authentication center 300, and an application platform 400. Among them, the smart terminal 100 is connected to the operator server 200, and the smart terminal 100 sends ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an identity authentication system and method based on an electronic identification card. The identity authentication system comprises an intelligent terminal, an operator server, a network identity authentication center and an application platform. The intelligent terminal is used for storing a first temporary secret key only associated with the electronic identification card of a user, and generating to-be-authenticated encryption information and first encryption information. The operator server is used for acquiring the first encryption information, authenticating the first encryption information preliminarily, and then generating second encryption information. The network identity authentication center is used for acquiring the second encryption information, generating a second temporary secret key and authenticated encryption information, and comparing the to-be-authenticated encryption information with the authenticated encryption information so as to realize authentication of the user identity. The application platform is connected with a secret key server. The application platform sends an authentication request and is used for acquiring a result of user identity authentication from the operator server. The first temporary secret key is stored in a safe area of the intelligent terminal, so that the user does not need to carry a hardware carrier and are not worry about risks, such as information leakage and so on when in online payment or online identity authentication.

Description

technical field [0001] The invention relates to the technical field of computer networks, in particular to an identity authentication system and method. Background technique [0002] With the rapid development of Internet infrastructure and Internet applications, the development and operation of our country are inseparable from the Internet, and the dependence on the information network is also increasing, and online shopping and online payment are becoming more and more common. But at the same time, more and more problems in the real society will be reflected in the network society, such as Trojan horse attacks, stolen account passwords, etc. are common, so the implementation of network identity management has become a more urgent problem. [0003] At present, the "association comparison" method is generally used in domestic network remote identity verification, that is, the personal information such as "name + ID number" input by the user is transmitted to the management p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3263H04L63/067H04L63/0815H04L63/0838H04L63/0853H04L65/1073
Inventor 尤磊盛学明马碟飞张冬冬
Owner 尤磊
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products