EID security control method and system based on eID
A real identity and security control technology, applied in the computer field, can solve the problems of user privacy protection, unrealistic, and the maintainer of the user's trusted digital identity information does not provide the binding function, so as to improve privacy, enhance security, enhance The effect of flexibility
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0045] The present invention will be described in more detail below through specific embodiments in conjunction with the accompanying drawings.
[0046] 1. Identity Binding Method
[0047] This embodiment is based on the following scenario setting. The application system AS uses the virtual identity management system VIMS to manage its user virtual account and authentication. The user U who holds an eID identity Ie has registered a virtual account Iv in VIMS and hopes to perform eID through EMS. Binding of identity and virtual account.
[0048] Figure 4 The entire process of binding the user identity is shown, and the details are as follows:
[0049] 1. The user accesses the virtual identity management system VIMS and initiates an identity binding request;
[0050] 2. The IMPM component located on the VIMS is responsible for processing the request, and first asks the user to log in with a virtual account.
[0051] 3. The user accesses the login page in VIMS, uses the regi...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com