Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A digital identity authentication method and system based on a secure two-dimensional code

A technology of identity authentication and digital identity, applied in transmission systems, electrical components, etc., to ensure login security and prevent data leakage

Active Publication Date: 2021-07-06
新大陆(福建)公共服务有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Disadvantages of the current common identity authentication account plus password: easy to be obtained by keylogging and other methods; scratch card verification Disadvantages: use sniffing and monitoring software to obtain the location data and content of the static static code, intercepted multiple times, it can be complete Obtain the static password and graphic verification code of the entire scratch card Disadvantages: Using OCR technology can also obtain the content of graphic verification codes, soft certificates Shortcomings Attackers can use Trojan horse virus tools to steal users' soft certificates; SMS verification codes Disadvantages: mobile phones The verification code can be intercepted by the SMS hijacking tool, and even the SMS will not be displayed on the user's mobile phone, and it will be sent directly to the attacker's mobile phone, and the attacker can easily steal funds

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A digital identity authentication method and system based on a secure two-dimensional code
  • A digital identity authentication method and system based on a secure two-dimensional code
  • A digital identity authentication method and system based on a secure two-dimensional code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] Such as figure 1 , figure 2 with image 3 As shown, the authentication method of the digital identity based on the security two-dimensional code of the present invention includes:

[0027] Step 1. The third-party application initiates an authorization login request;

[0028] Step 2. The identity authentication SDK obtains a session key from the server;

[0029] Step 3. The identity authentication SDK encrypts the third-party application information through the session key, and sends the encrypted information and the authorized login request to the server;

[0030] Step 4. The server decrypts the third-party application information through the session key, generates a QR code and a QR code url, encrypts the QR code url with the session key, and the identity authentication SDK obtains the encrypted QR code url ;

[0031] Step 5. The identity authentication SDK decrypts the encrypted QR code url, and then the third-party application jumps according to the QR code url...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a digital identity authentication method based on a secure two-dimensional code. A third-party application initiates an authorization login request; the identity authentication SDK obtains a session key from the server; the identity authentication SDK uses the session key to process the third-party application information Encrypt, and send the encrypted information and authorized login request to the server; the server decrypts the third-party application information through the session key, and generates a QR code and QR code url, and passes the QR code url through the key After encryption, the identity authentication SDK obtains the encrypted QR code url; the identity authentication SDK decrypts the encrypted QR code url, and then the third-party application jumps according to the QR code url to display the QR code; the user scans the QR code code to authenticate and authorize a third-party application to log in; the present invention also provides a digital identity authentication system based on a secure two-dimensional code to ensure the security of the authorization process and secure login of the third-party application.

Description

technical field [0001] The invention relates to a digital identity authentication method and system based on a secure two-dimensional code. Background technique [0002] With the development of information technology, Internet identity authorization is used more and more frequently, and mainstream Internet applications provide third-party login portals. For example, CSDN can use QQ, WeChat authorized login, etc. [0003] Disadvantages of the current common identity authentication account plus password: easy to be obtained by keylogging and other methods; scratch card verification Disadvantages: use sniffing and monitoring software to obtain the location data and content of the static static code, intercepted multiple times, it can be complete Obtain the static password and graphic verification code of the entire scratch card Disadvantages: Using OCR technology can also obtain the content of graphic verification codes, soft certificates Shortcomings Attackers can use Trojan h...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/0807
Inventor 曾伟东林龙叶明李钻达李霖
Owner 新大陆(福建)公共服务有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products