Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Object authentication method and system based on universal unique token chain of multiple identifier partition sections

An authentication method and segmented technology, which is applied in the field of the generation system of the multi-identification segmented universal unique token chain, to achieve the effect of avoiding the leakage of biological characteristics

Inactive Publication Date: 2018-11-13
隆正信息科技有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Traditional network devices are based on UUID or GUID or MAC address systems. The disadvantage of these systems is that the ID generation is completely based on the manufacturer's data, and there is no other information that can be used for authentication.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Object authentication method and system based on universal unique token chain of multiple identifier partition sections
  • Object authentication method and system based on universal unique token chain of multiple identifier partition sections
  • Object authentication method and system based on universal unique token chain of multiple identifier partition sections

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] Practical example 1: In the Bluetooth positioning application, after the Bluetooth sniffer obtains the signal strength RSSI values ​​of different Bluetooth beacons, the obtained Bluetooth signal strength event sending process: First, according to the OwnerID of the owner of the sniffer (the fixed line is in the The sniffer or the front-end processing unit) requests the URL address of the cloud server corresponding to the OwnerID from the ANS server. After obtaining the address, the Bluetooth sniffer sends the obtained Bluetooth signal strength event and RSSI value directly to the URL address.

Embodiment 2

[0036] Practical example 2: In the face recognition shopping application, after the face data obtained by the recognition terminal is compared and found, the event data transmission process obtained: first send the OwnerID of the terminal to the ANS server, and the ANS server is in its OwnerID list Find the URL address of the cloud server corresponding to the OwnerID, and return the URL address to the terminal. The terminal sends the acquired event data directly to the URL address.

[0037] Such as figure 2 Shown is the data flow during the user's use. A user's various tokens and terminals share the same CA certificate, use its private key and private key to perform hash operations to obtain the OwnerID, and query the ANS server to obtain the URL address of the user's data container in the cloud for data forwarding. The data is sent directly to the data container owned by the user in the cloud.

[0038] Compared with the traditional identity verification, the present inven...

Embodiment 3

[0040] Security level 1: Company sign-in, only need to provide verification of one of the authentication results. Such as work permits, fingerprints, or personal mobile phones. You only need to pass one of them to be certified.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an object authentication system and method based on the universal unique token chain of multiple identifier partition sections. According to the real property or document digitization of a person or a device, a field having a fixed byte number is formed by adoption of a Hash algorithm; the personal ID is composed of multiple sections of fields, and stored at the fixed position of a cloud side; when verification needs to be carried out, according to different requirements and stages, verification can be carried out through one or more real properties or documents; furthermore, characteristic authentication is provided while behaviours are recorded; simultaneously, an ANS server is increased; the data owner is provided to the addressing service of the URL address of the cloud side; and the fact that data is directly uploaded to the address of the owner is ensured. By means of the object authentication method and system based on the universal unique token chain ofthe multiple identifier partition sections disclosed by the invention, the fact that an authentication party cannot obtain practical biological characteristic parameters of an authenticated party in an authentication process can be ensured; biological characteristic leakage, even reconstruction, of the authenticated party can be avoided; multi-dimensional dynamic continuous authentication can be continuously carried out in a use process; and characteristic authentication is provided while the behaviours are recorded.

Description

technical field [0001] The invention relates to a generation system of a multi-identification segmented universal unique token chain, and belongs to the technical field of Internet of Things authentication. Background technique [0002] The popularity of the Internet of Things and cloud computing has greatly increased the number of nodes of people and things on the global network, but currently there is no universal unique ID system that can fully identify people. [0003] Traditional network devices are based on UUID or GUID or MAC address systems. The disadvantage of these systems is that the ID generation is completely based on the manufacturer's data, without any other information that can be used for authentication. Contents of the invention [0004] The technical problem to be solved by the present invention is to provide a universally unique ID generation system for multi-identification subsections, so as to overcome the shortcomings of the prior art, and can use on...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/06
CPCH04L9/0643H04L63/0876
Inventor 吴向东张东倪伟赵智海
Owner 隆正信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products