CN103546284A - Hufu token authentication system - Google Patents
Hufu token authentication system Download PDFInfo
- Publication number
- CN103546284A CN103546284A CN201210235874.6A CN201210235874A CN103546284A CN 103546284 A CN103546284 A CN 103546284A CN 201210235874 A CN201210235874 A CN 201210235874A CN 103546284 A CN103546284 A CN 103546284A
- Authority
- CN
- China
- Prior art keywords
- token
- generals
- tiger
- data
- ancient china
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention provides a Hufu token authentication system which comprises authentication software and a Hufu token with an anti-counterfeiting identifier. The anti-counterfeiting identifier is a verifiable information code for really describing uniqueness of a main body, and has uniqueness, invariability, expansibility, meaning, standardability and safety. The anti-counterfeiting identifier is applicable to electronic or digital identifier codes, graphic identifier codes and hybrid codes of the identifier codes. The Hufu token authentication system meets development requirements for authentication and management of humans, objects, commodities and electronic commerce, and qualification, credit and the like of e-government related administrative departments such as customs, quarantine inspection, business taxation, intellectual property, environmental protection, banks and insurance in the course of global identifier authentication, network communication and trade. The invention further discloses an identity card electronic authentication method, a financial electronic authentication method and a network security authentication method.
Description
Technical field
The present invention relates to a kind ofly can directly carry out by combination key system tiger-shaped tally issued to generals as imperial authorization for loop movement in ancient China token and the fail-safe software of ID authentication.
Background technology
ID authentication is that Safety Industry does not have the difficult problem solving all the time, utilize combination key system, define intelligent secure ID, by very little memory space, just can realize the feature that name is key, realize direct ID authentication, this is by a quantum leap that is safety certification industry, solved the shortcoming that PKI system can not realize magnanimity authentication service, but as sign itself, therefore also need canonical code form and authentication method, propose and to realize a set of coding and the Verification System that can carry out ID authentication very useful.
Summary of the invention
The invention solves traditional sign and can not carry out the shortcoming of safety certification, a kind of tiger-shaped tally issued to generals as imperial authorization for loop movement in ancient China token authentication system is provided, it is characterized in that, by the tiger-shaped tally issued to generals as imperial authorization for loop movement in ancient China token that comprises only true sign and the fail-safe software that comprises only true ID authentication function, formed, described only very sign employing electronics or Digital ID code and pattern identification code and hybrid coding thereof and combination key framework are realized and can directly be carried out ID authentication, are a kind of information codings for true description main body uniqueness of verifying, described combination key framework refers to take elliptic curve encryption algorithm as basis, many random numbers or particular data are carried out to computing, some to different private keys and PKI with under operational model of generation, be placed on respectively in private key matrix and PKI matrix, by mapping that only true sign is made an abstract, digest value can be converted into some position coordinateses, the new PKI that the result that a plurality of PKI points that in the new private key that the result that a plurality of private key moulds that in private key matrix, correspondence position takes out add forms and corresponding PKI matrix, take out same position add forms remains a pair of PKI pair, PKI matrix and public key calculation algorithm are open, private key matrix is preserved by publisher is secret, the private key generating is transferred to the secret preservation of user oneself, as long as any like this user has the other side's only very sign, just can calculate the other side public key safety give the other side's photos and sending messages, and checking the other side's signature, as long as any user has the private key of oneself, just can untie the enciphered data of sending, and the data that oneself is guaranteed are signed.
Described tiger-shaped tally issued to generals as imperial authorization for loop movement in ancient China token authentication system, is characterized in that, described only very sign is comprised of F1 elementary field and F2 added field, and wherein F1 is encoded by RC distribution, GC sorting code number, and SN string number forms with CC feature coding four parts.
Described tiger-shaped tally issued to generals as imperial authorization for loop movement in ancient China token authentication system, is characterized in that, described tiger-shaped tally issued to generals as imperial authorization for loop movement in ancient China token is also provided with local input interface, for inputting data; Described data storage cell comprises for the not reproducible of storage system critical data but the memory of updatable data; And described tiger-shaped tally issued to generals as imperial authorization for loop movement in ancient China token is integrated safe device, is made into integrated embedding type chip; Be a kind of perfect privacy device, and there is non-reproduction; Described tiger-shaped tally issued to generals as imperial authorization for loop movement in ancient China token is before carrying out conventional control, and data or the signal of the local input of checking, through correct judgment, after only having the authority of acquisition, just make counterpart external device under the control of described tiger-shaped tally issued to generals as imperial authorization for loop movement in ancient China token, carries out normal data communication.
Described tiger-shaped tally issued to generals as imperial authorization for loop movement in ancient China token authentication system, is characterized in that, described tiger-shaped tally issued to generals as imperial authorization for loop movement in ancient China token is smart card module form, and described tiger-shaped tally issued to generals as imperial authorization for loop movement in ancient China token is by processing the data of local input, identifying user identity.
Described tiger-shaped tally issued to generals as imperial authorization for loop movement in ancient China token authentication system, it is characterized in that, described tiger-shaped tally issued to generals as imperial authorization for loop movement in ancient China token is by processing the data of local input, on the memory of but updatable data not reproducible with tiger-shaped tally issued to generals as imperial authorization for loop movement in ancient China token inside, default critical data is carried out collation operation, controls communication authority and/or the data encrypting and deciphering of each communication interface.
Described tiger-shaped tally issued to generals as imperial authorization for loop movement in ancient China token authentication system, is characterized in that, comprises central control unit, program storage, and data storage, communication interface, wherein said central control unit is the central processing unit that is provided with program storage, and/or is encryption logic;
And/or described program storage is read-only memory and/or nonvolatile storage;
And/or described data storage cell, is nonvolatile storage and random asccess memory, wherein, described memory not reproducible but updatable data is nonvolatile storage;
And/or described communication interface is one or more with in lower interface:
USB interface, parallel interface, memory interface, serial communication interface, infrared interface, wave point, general programmable IO interface, indicator light interface, buzzer interface, audio coding decoding interface, pcmcia interface, intelligent card interface, tailor-made algorithm coprocessor interface.
Described tiger-shaped tally issued to generals as imperial authorization for loop movement in ancient China token authentication system, is characterized in that, described tiger-shaped tally issued to generals as imperial authorization for loop movement in ancient China token becomes by configuration parameter the system token that auxiliary security software authenticates.
Described tiger-shaped tally issued to generals as imperial authorization for loop movement in ancient China token authentication system, it is characterized in that, the safe computing of described fail-safe software is assisted realization by system token, and fail-safe software is verified by the secure data of tiger-shaped tally issued to generals as imperial authorization for loop movement in ancient China token is delivered to system token, and issues tiger-shaped tally issued to generals as imperial authorization for loop movement in ancient China token by system token enciphered data.
Concrete verification method is, only true sign adopts combination key framework, by F1 field, through combination key, computing just can obtain unique corresponding crucial key data with F1, wherein at least comprise a pair of PKI pair, be that anyone passes through disclosed operation rule, can obtain the required PKI of signature verification by F1 computing, and SD is used the secret private key corresponding with this PKI to the digest value of the data of F1 and the F2 resulting all or part of result of computing of signing just, by checking this all or part of result, just can determine the authenticity and integrity only really identifying.
Take elliptic curve encryption algorithm as example, first generate a private key matrix, and one and PKI matrix corresponding to this private key matrix, the PKI that is same position in the private key of ad-hoc location in private key matrix and PKI matrix is a pair of PKI pair, by the only true sign to user, make an abstract, digest value can be converted into some position coordinateses, from PKI matrix correspondence position, taking out a plurality of PKIs does a little and adds, generate client public key, because the algorithm of PKI matrix and calculating client public key is open, anyone can calculate client public key and carry out certifying signature, or issue this user by client public key enciphered data, and this user also can only sign or untie the data that this client public key of use that other people send is encrypted with the private key for user of oneself.In the same territory limiting in elliptic curve, the client public key that the result that in the private key for user that the result that in private key matrix, the private key mould of same position adds forms and corresponding PKI matrix, the PKI point of same position adds forms remains a pair of PKI pair, therefore PKI matrix and public key calculation algorithm are open, and private key matrix is preserved by publisher is secret, the private key for user of generation is transferred to the secret preservation of user oneself.As long as any like this user has the other side's only very sign, just can with the other side's client public key safety give the other side's photos and sending messages, and checking the other side's signature, as long as any user has the private key for user of oneself, just can untie the enciphered data of sending, and the data that oneself is promised to undertake are signed.As expanded application, also have the shared random key based on this computing basis to generate, the multiple Secure Application such as one-time pad.
Only true sign is applicable to electronics or Digital ID code and pattern identification code and hybrid coding thereof.
Accompanying drawing explanation
Fig. 1 is typical structure schematic diagram of the present invention.
Fig. 2 is the present invention's generation schematic diagram in actual applications.
Fig. 3 is the present invention's authentication, encryption and decryption and signature schematic diagram in actual applications.
Embodiment
The structure of RID in transmission packet that only really identify of the present invention, as shown in Fig. 1 of Figure of description, comprises " RID " character string, the only true identification data packet of RID and SD signed data.
Wherein the only true identification data packet of RID comprises again a F1 elementary field and some F2 added field.
F1 elementary field comprises RC distribution coding, GC sorting code number, SN string number and CC feature coding.
F2 added field comprises BN coded data block number and some coded data blocks, and wherein each coded data block comprises again TAG tag types, LEN data length and VAL valid data.
Described only true sign is a kind of information coding for true description main body uniqueness of verifying, has uniqueness (code can only identify an object of classification uniquely, not because the factors such as time, place change); Consistency (encode and do not change in the cycle in whole information system, and coding can not change because external environment condition changes); Autgmentability (have alternate code, allow adding of new data); Brief property (code structure is briefly clear and definite, is conducive to reduce memory space and typing time, and can reduces mistake); Implication (feature of reflection coded object, has memory aid, is convenient to check); The standardization compiling form of the type of same level code, structure, code sign, code bit length and the code (unified) and fail safe (only very sign itself and can both verify its authenticity and legitimacy in application).Only true sign is applicable to electronics or Digital ID code and pattern identification code and hybrid coding thereof; the invention solves in global identity authentication, network communication and trade process; to people, object, commodity, be customs to the authentication administrative department relevant with E-Government with management of ecommerce; quarantine and examination; the industrial and commercial tax, intellectual property, environmental protection; bank, all requirements of the aspect development such as the qualification of insurance, credit.
Embodiment 1 (identity card digital certificate method)
Identity card digital certificate method of the present invention, it is characterized in that, adopt tiger-shaped tally issued to generals as imperial authorization for loop movement in ancient China token authentication system, in the added field of only true sign, define respectively user's son sign, comprise identification card number, Bank Account Number, mailbox number and telephone number etc., 18 ten's digits of coded format due to compatible identity card in the F1 field of only true sign, therefore the unique identity of user is PKI, by without again for user sets up extra safety management system, principal mark is known corresponding key and is substantially not used in and does routine work, only for other son sign is managed, and exist with the form of hardware, key does not leak outside, substantially there is no risk, at principal mark, know under the prerequisite of safety guarantee, user can constantly upgrade and the fail safe of migrate application by combining each sub-sign.
Embodiment 2 (Electronic Finance authentication method)
Electronic Finance authentication method of the present invention, is characterized in that, adopts tiger-shaped tally issued to generals as imperial authorization for loop movement in ancient China token authentication system, defines respectively user's son sign in the added field of only true sign, comprises identification card number, multi-bank account, stock account, mailbox number and telephone number.Sub-sign can be clearly in the term of validity, and in number of times and type of service, the service condition of strict restriction key, makes every kind of financial business have independently safe key, but unified acceptor's tagged keys management.18 ten's digits of coded format due to compatible identity card in the F1 field of only true sign, therefore the unique identity of user is PKI, by without again for user sets up extra safety management system, principal mark is known corresponding key and is substantially not used in and does routine work, only for other son sign is managed, and exist with the form of hardware, key does not leak outside, and substantially there is no risk.At principal mark, know under the prerequisite of safety guarantee, user can constantly upgrade and move the fail safe of financial application by combining each sub-sign.
Embodiment 3 (network security certification method)
Network security certification method of the present invention, it is characterized in that, adopt tiger-shaped tally issued to generals as imperial authorization for loop movement in ancient China token authentication system, in the added field of only true sign, define respectively user's son sign, comprise network ip address, Network Interface Module numbering, device numbering, mailbox number and telephone number etc.Owing to can directly carrying out the ID authentication of the network address, will be greatly simplified network safety certification burden, make networking and the use of the safety that operating system and application program can be transparent.At principal mark, know under the prerequisite of safety guarantee, user can constantly upgrade and move the fail safe of network application by combining each sub-sign.
Claims (8)
1. a tiger-shaped tally issued to generals as imperial authorization for loop movement in ancient China token authentication system, it is characterized in that, by the tiger-shaped tally issued to generals as imperial authorization for loop movement in ancient China token that comprises only true sign and the fail-safe software that comprises only true ID authentication function, formed, described only very sign employing electronics or Digital ID code and pattern identification code and hybrid coding thereof and combination key framework are realized and can directly be carried out ID authentication, are a kind of information codings for true description main body uniqueness of verifying, described combination key framework refers to take elliptic curve encryption algorithm as basis, many random numbers or particular data are carried out to computing, some to different private keys and PKI with under operational model of generation, be placed on respectively in private key matrix and PKI matrix, by mapping that only true sign is made an abstract, digest value can be converted into some position coordinateses, the new PKI that the result that a plurality of PKI points that in the new private key that the result that a plurality of private key moulds that in private key matrix, correspondence position takes out add forms and corresponding PKI matrix, take out same position add forms remains a pair of PKI pair, PKI matrix and public key calculation algorithm are open, private key matrix is preserved by publisher is secret, the private key generating is transferred to the secret preservation of user oneself, as long as any like this user has the other side's only very sign, just can calculate the other side public key safety give the other side's photos and sending messages, and checking the other side's signature, as long as any user has the private key of oneself, just can untie the enciphered data of sending, and the data that oneself is guaranteed are signed.
2. according to the tiger-shaped tally issued to generals as imperial authorization for loop movement in ancient China token authentication system described in claim 1, it is characterized in that, described only very sign is comprised of F1 elementary field and F2 added field, and wherein F1 is encoded by RC distribution, GC sorting code number, and SN string number forms with CC feature coding four parts.
3. according to the tiger-shaped tally issued to generals as imperial authorization for loop movement in ancient China token authentication system described in claim 2, it is characterized in that, described tiger-shaped tally issued to generals as imperial authorization for loop movement in ancient China token is also provided with local input interface, for inputting data; Described data storage cell comprises for the not reproducible of storage system critical data but the memory of updatable data; And described tiger-shaped tally issued to generals as imperial authorization for loop movement in ancient China token is integrated safe device, is made into integrated embedding type chip; Be a kind of perfect privacy device, and there is non-reproduction; Described tiger-shaped tally issued to generals as imperial authorization for loop movement in ancient China token is before carrying out conventional control, and data or the signal of the local input of checking, through correct judgment, after only having the authority of acquisition, just make counterpart external device under the control of described tiger-shaped tally issued to generals as imperial authorization for loop movement in ancient China token, carries out normal data communication.
4. tiger-shaped tally issued to generals as imperial authorization for loop movement in ancient China token authentication system according to claim 3, is characterized in that, described tiger-shaped tally issued to generals as imperial authorization for loop movement in ancient China token is smart card module form, and described tiger-shaped tally issued to generals as imperial authorization for loop movement in ancient China token is by processing the data of local input, identifying user identity.
5. tiger-shaped tally issued to generals as imperial authorization for loop movement in ancient China token authentication system according to claim 3, it is characterized in that, described tiger-shaped tally issued to generals as imperial authorization for loop movement in ancient China token is by processing the data of local input, on the memory of but updatable data not reproducible with tiger-shaped tally issued to generals as imperial authorization for loop movement in ancient China token inside, default critical data is carried out collation operation, controls communication authority and/or the data encrypting and deciphering of each communication interface.
6. according to the arbitrary described tiger-shaped tally issued to generals as imperial authorization for loop movement in ancient China token authentication system of claim 3 to 5, it is characterized in that, comprise central control unit, program storage, data storage, communication interface, wherein said central control unit is the central processing unit that is provided with program storage, and/or is encryption logic;
And/or described program storage is read-only memory and/or nonvolatile storage;
And/or described data storage cell, is nonvolatile storage and random asccess memory, wherein, described memory not reproducible but updatable data is nonvolatile storage;
And/or described communication interface is one or more with in lower interface:
USB interface, parallel interface, memory interface, serial communication interface, infrared interface, wave point, general programmable IO interface, indicator light interface, buzzer interface, audio coding decoding interface, pcmcia interface, intelligent card interface, tailor-made algorithm coprocessor interface.
7. according to the tiger-shaped tally issued to generals as imperial authorization for loop movement in ancient China token authentication system described in claim 6, it is characterized in that, described tiger-shaped tally issued to generals as imperial authorization for loop movement in ancient China token becomes by configuration parameter the system token that auxiliary security software authenticates.
8. according to the tiger-shaped tally issued to generals as imperial authorization for loop movement in ancient China token authentication system described in claim 7, it is characterized in that, the safe computing of described fail-safe software is assisted realization by system token, be that fail-safe software is verified by the secure data of tiger-shaped tally issued to generals as imperial authorization for loop movement in ancient China token is delivered to system token, and issue tiger-shaped tally issued to generals as imperial authorization for loop movement in ancient China token by system token enciphered data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210235874.6A CN103546284A (en) | 2012-07-10 | 2012-07-10 | Hufu token authentication system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210235874.6A CN103546284A (en) | 2012-07-10 | 2012-07-10 | Hufu token authentication system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103546284A true CN103546284A (en) | 2014-01-29 |
Family
ID=49969364
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210235874.6A Pending CN103546284A (en) | 2012-07-10 | 2012-07-10 | Hufu token authentication system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103546284A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106027246A (en) * | 2016-07-27 | 2016-10-12 | 浪潮(苏州)金融技术服务有限公司 | Private key, public key and decryption method |
CN106161017A (en) * | 2015-03-20 | 2016-11-23 | 北京虎符科技有限公司 | ID authentication safety management system |
CN108737099A (en) * | 2017-04-20 | 2018-11-02 | 青岛博文广成信息安全技术有限公司 | Tiger-shaped tally issued to generals as imperial authorization for loop movement in ancient China key certificate technology method |
CN110505205A (en) * | 2019-07-18 | 2019-11-26 | 华信永道(北京)科技股份有限公司 | Cloud platform encryption and decryption services cut-in method and access system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101336436A (en) * | 2005-12-29 | 2008-12-31 | 阿克西奥尼奇有限公司 | Security token and method for authentication of a user with the security token |
CN102118381A (en) * | 2010-09-20 | 2011-07-06 | 中科方德软件有限公司 | Safe mail system based on USBKEY (Universal Serial Bus Key) and mail encrypting-decrypting method |
CN102332979A (en) * | 2011-05-31 | 2012-01-25 | 北京虎符科技有限公司 | RID (Reseller Identity) code and verification method thereof |
CN102648610A (en) * | 2009-10-23 | 2012-08-22 | 威斯科数据安全国际有限公司 | Strong authentication token usable with a plurality of independent application providers |
-
2012
- 2012-07-10 CN CN201210235874.6A patent/CN103546284A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101336436A (en) * | 2005-12-29 | 2008-12-31 | 阿克西奥尼奇有限公司 | Security token and method for authentication of a user with the security token |
CN102648610A (en) * | 2009-10-23 | 2012-08-22 | 威斯科数据安全国际有限公司 | Strong authentication token usable with a plurality of independent application providers |
CN102118381A (en) * | 2010-09-20 | 2011-07-06 | 中科方德软件有限公司 | Safe mail system based on USBKEY (Universal Serial Bus Key) and mail encrypting-decrypting method |
CN102332979A (en) * | 2011-05-31 | 2012-01-25 | 北京虎符科技有限公司 | RID (Reseller Identity) code and verification method thereof |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106161017A (en) * | 2015-03-20 | 2016-11-23 | 北京虎符科技有限公司 | ID authentication safety management system |
CN106027246A (en) * | 2016-07-27 | 2016-10-12 | 浪潮(苏州)金融技术服务有限公司 | Private key, public key and decryption method |
CN106027246B (en) * | 2016-07-27 | 2019-09-24 | 浪潮金融信息技术有限公司 | A kind of private key, public key and a kind of decryption method |
CN108737099A (en) * | 2017-04-20 | 2018-11-02 | 青岛博文广成信息安全技术有限公司 | Tiger-shaped tally issued to generals as imperial authorization for loop movement in ancient China key certificate technology method |
CN108737099B (en) * | 2017-04-20 | 2021-04-30 | 青岛博文广成信息安全技术有限公司 | Tiger-symbol key authentication technical method |
CN110505205A (en) * | 2019-07-18 | 2019-11-26 | 华信永道(北京)科技股份有限公司 | Cloud platform encryption and decryption services cut-in method and access system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105024824B (en) | The generation and verification method and system of credible label based on rivest, shamir, adelman | |
AU2024201591A1 (en) | Methods and systems for automatic object recognition and authentication | |
US10999276B2 (en) | Industrial internet encryption system | |
CN103413159B (en) | A kind of RFID electronic certificate off-line false proof realization method and system of Jianzhen based on CPK | |
WO2020144008A2 (en) | Methods and systems for preparing and performing an object authentication | |
CN106452756A (en) | Construction verification method and device capable of verifying security two-dimensional code offline | |
CN106209877A (en) | A kind of be certification core with block chain backstage false-proof authentication system | |
CN104008322B (en) | Quick Response Code publisher's identity identifying method based on reliable digit signature | |
CN104166871B (en) | Anti-counterfeit label and anti-counterfeit method based on combination of two-dimension codes and RFID chips | |
CN102799989A (en) | Product source tracing scheme based on PKI (Public Key Infrastructure) and two-dimensional codes | |
US20120125997A1 (en) | System and method for providing and verifying a passport | |
CN101765996A (en) | Remote Authentication And Transaction Signatures | |
CN102799990A (en) | Double-two-dimensional product anti-counterfeiting scheme based on PKI (Public Key Infrastructure) | |
CN108206831A (en) | Implementation method and server, the client and readable storage medium storing program for executing of E-seal | |
CN102663591A (en) | Product anti-counterfeiting method and system based on electronic tag | |
CN103473592B (en) | A kind of label off-line authenticating method and device based on CPK system | |
CN101340282A (en) | Generation method of composite public key | |
CN102779263A (en) | Credible two-dimensional code scheme based on public key infrastructure (PKI) and digital signature | |
CN102171652A (en) | Method for provisioning trusted software to an electronic device | |
KR20020047131A (en) | Method of data protection | |
Chen et al. | An IoT-based traceable drug anti-counterfeiting management system | |
CN103326864A (en) | Electronic tag anti-fake authentication method | |
CN101388767A (en) | Certificate false proof method based on light weight digital signature scheme | |
Olaniyi et al. | Design of secure electronic voting system using multifactor authentication and cryptographic hash functions | |
CN116582266B (en) | Electronic signature method, electronic signature system, and readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20140129 |
|
RJ01 | Rejection of invention patent application after publication |