CN116349198B - Method and system for authenticating credentials - Google Patents
Method and system for authenticating credentials Download PDFInfo
- Publication number
- CN116349198B CN116349198B CN202180067717.6A CN202180067717A CN116349198B CN 116349198 B CN116349198 B CN 116349198B CN 202180067717 A CN202180067717 A CN 202180067717A CN 116349198 B CN116349198 B CN 116349198B
- Authority
- CN
- China
- Prior art keywords
- authority
- issuing
- digital
- issuing authority
- computer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
发行机构(IA)可以验证用户的身份并向所述用户发行数字许可。IA可以生成IA公私钥对,并向验证机构(CA)提供IA公钥。IA可以用IA私钥对数字许可进行签名,并在用户装置上配置有签名的数字许可。IA可以请求CA验证所述数字许可。CA可以使用IA公钥验证所述数字许可,并用CA私钥对IA公钥进行签名,从而生成链接到所述数字许可的与所述发行机构相关联的数字证书。依赖方可以使用CA公钥来验证所述数字许可。所述依赖方可以从所述数字许可中检取信息,并相信所检取的信息是合法的。
An Issuing Authority (IA) can verify a user's identity and issue a digital license to said user. IA can generate an IA public and private key pair and provide the IA public key to the certification authority (CA). IA can sign the digital license with the IA private key and configure the signed digital license on the user device. The IA can request the CA to verify the digital license. The CA can verify the digital license using the IA public key and sign the IA public key with the CA private key, thereby generating a digital certificate associated with the issuing authority linked to the digital license. Relying parties can use the CA public key to verify the digital license. The relying party can retrieve information from the digital license and trust that the retrieved information is legitimate.
Description
相关申请交叉引用Related application cross-references
本申请根据35USC§119(e)要求于2020年12月18日提交的标题为“用于认证凭证的方法和系统(Method and System for Authentication Credential)”的第63/127,515号美国临时专利申请和于2021年7月23日提交的标题为“用于数字许可的方法和系统(Methodand System for Digital License)”的第63/225,313号美国临时专利申请的权益,所述美国临时专利申请的公开内容以引用的方式整体并入本文中用于所有目的。This application is filed under 35 USC § 119(e) in U.S. Provisional Patent Application No. 63/127,515 titled "Method and System for Authentication Credential" filed on December 18, 2020 and Interests in U.S. Provisional Patent Application No. 63/225,313, entitled "Method and System for Digital License", filed on July 23, 2021, the disclosure content of said U.S. Provisional Patent Application This document is incorporated by reference in its entirety for all purposes.
背景技术Background technique
标识信息的发行方(例如,DMV、医疗服务提供者、城市、州或联邦政府机构)提供关于交易中使用的人(用户)的数据。然而,发行方不一定是依赖方(例如,商家)已知的,因此不能保证是真实的。并非所有交易都发生在与在线认证服务具有稳定连接的位置。此外,即使存在在线认证服务,也必须验证认证服务的真实性。当前的解决方案将需要其它形式的验证,例如提供物理驾驶执照、疫苗接种记录或其它类型的验证,这可以揭示关于用户的比交易所需的更多信息。The issuer of the identifying information (e.g., DMV, medical provider, city, state, or federal government agency) provides data about the person (user) used in the transaction. However, the issuer is not necessarily known to the relying party (e.g., the merchant) and therefore cannot be guaranteed to be authentic. Not all transactions occur in locations with stable connections to online authentication services. Furthermore, even if an online authentication service exists, the authenticity of the authentication service must be verified. Current solutions will require other forms of verification, such as providing a physical driver's license, vaccination records, or other types of verification, which can reveal more information about the user than is required for the transaction.
实施例涉及单独地以及共同地解决这些问题和其它问题。Embodiments are directed to solving these and other problems, individually and collectively.
发明内容Contents of the invention
实施例允许离线认证数字许可的发行机构。离线发行方认证允许在依赖方可能不知道发行方的交易中维持高水平的信任。验证机构生成的数字证书可以与数字许可相关联(例如,集成或附加到数字许可中),可以认证数字许可的发行机构。Embodiments allow offline certification of the issuing authority of a digital license. Offline issuer authentication allows maintaining a high level of trust in transactions where the relying party may not be aware of the issuer. The digital certificate generated by the verification authority can be associated with the digital license (eg, integrated or appended to the digital license) and can authenticate the issuing authority of the digital license.
实施例提供了一种由验证机构的验证机构计算机执行的方法。所述方法包括:认证发行机构;从发行机构的发行机构计算机接收发行机构公钥;使用验证机构的私钥对发行机构公钥进行数字签名;以及生成与发行机构相关联的数字证书。数字证书包括经数字签名的发行机构公钥。所述方法还包括将数字证书发送到接收方,以使所述数字证书与由发行机构生成的数字许可相关联,并与一方或多方共享验证机构公钥,所述一方或多方适于从数字许可的持有人接收数字许可和相关联证书。Embodiments provide a method performed by a verification authority computer of a verification authority. The method includes: certifying the issuing authority; receiving the issuing authority's public key from the issuing authority's issuing authority computer; digitally signing the issuing authority's public key using the verification authority's private key; and generating a digital certificate associated with the issuing authority. A digital certificate includes a digitally signed public key of the issuing authority. The method also includes sending a digital certificate to the recipient such that the digital certificate is associated with a digital license generated by the issuing authority and shares the validating authority public key with one or more parties adapted to obtain the digital certificate from the digital certificate. The license holder receives the digital license and associated certificate.
实施例还提供与验证机构相关联的验证机构计算机,所述验证机构包括一个或多个处理器和耦合到所述一个或多个处理器的存储器。存储器存储指令,所述指令在由所述一个或多个处理器执行时使所述一个或多个处理器:认证发行机构,从发行机构接收发行机构公钥;使用验证机构私钥对发行机构公钥进行数字签名;生成与发行机构相关联的数字证书;将数字证书发送到接收方,以使数字证书与发行机构生成的数字许可相关联;以及与一方或多方共享验证机构公钥,所述一方或多方适于从数字许可的持有人接收数字许可和相关联证书。根据各种实施例,数字证书包括经数字签名的发行机构公钥。Embodiments also provide a verification authority computer associated with the verification authority, the verification authority including one or more processors and a memory coupled to the one or more processors. The memory stores instructions that, when executed by the one or more processors, cause the one or more processors to: certify an issuer, receive an issuer public key from the issuer; verify the issuer using a verification authority private key digitally sign with the public key; generate a digital certificate associated with the issuing authority; send the digital certificate to the recipient so that the digital certificate is associated with the digital license generated by the issuing authority; and share the verifying authority public key with one or more parties, so The party or parties described above are adapted to receive the digital license and associated certificate from the holder of the digital license. According to various embodiments, the digital certificate includes a digitally signed issuing authority public key.
实施例还提供了由与依赖方相关联的依赖方计算机执行的方法。所述方法包括从验证机构接收验证机构公钥,以及从用户装置接收由发行机构发行的数字许可。数字许可包括验证机构使用验证机构私钥签名的数字证书。验证机构私钥与验证机构公钥配对。所述方法还包括使用验证机构公钥验证证书。证书包括发行机构公钥。所述方法还包括使用发行机构公钥验证数字许可中包含的信息。Embodiments also provide methods performed by a relying party computer associated with the relying party. The method includes receiving a certification authority public key from a certification authority and receiving a digital license issued by an issuing authority from a user device. A digital license consists of a digital certificate signed by a validating authority using the validating authority's private key. The certification authority private key is paired with the certification authority public key. The method also includes validating the certificate using the certification authority public key. The certificate includes the issuing authority's public key. The method also includes verifying the information contained in the digital license using the issuing authority's public key.
在具体实施方式和附图中可以找到关于实施例的另外细节。Additional details regarding embodiments can be found in the detailed description and drawings.
附图说明Description of the drawings
图1示出根据各种实施例的用于发行和验证数字许可的图。Figure 1 shows a diagram for issuance and verification of digital licenses in accordance with various embodiments.
图2示出根据各种实施例的用于发行和验证数字许可的另一图。Figure 2 shows another diagram for issuance and verification of digital licenses in accordance with various embodiments.
图3示出依赖方、可信第三方(例如,验证机构)、发行机构和数字许可之间的信任链。Figure 3 illustrates the chain of trust between the relying party, the trusted third party (eg, the verification authority), the issuing authority, and the digital license.
图4A示出根据各种实施例的验证机构私钥基础设施(PKI)模型。Figure 4A illustrates a Certification Authority Private Key Infrastructure (PKI) model in accordance with various embodiments.
图4B示出根据各种实施例的主列表模型。Figure 4B illustrates a master list model in accordance with various embodiments.
图5示出根据各种实施例的数字许可的示例性用例。Figure 5 illustrates an exemplary use case for digital licensing in accordance with various embodiments.
图6示出根据各种实施例的步骤的流程图。Figure 6 shows a flowchart of steps according to various embodiments.
具体实施方式Detailed ways
在下文描述中将描述各种实施例。出于解释的目的,阐述特定配置和细节以便提供对实施例的透彻理解。然而,所属领域的技术人员还应清楚,可在没有特定细节的情况下实践实施例。此外,可以省略或简化众所周知的特征以免混淆所描述的实施例。Various embodiments are described in the description below. For purposes of explanation, specific configurations and details are set forth in order to provide a thorough understanding of the embodiments. However, it will be understood by those skilled in the art that the embodiments may be practiced without the specific details. Additionally, well-known features may be omitted or simplified so as not to obscure the described embodiments.
在论述实施例之前,可以进一步详细地描述一些术语。Before discussing the embodiments, some terminology may be described in further detail.
“密钥”可包括用于密码算法中以将输入数据变换成另一表示的一条信息。密码算法可以是将原始数据变换成替代表示的加密算法,或将加密信息变换回到原始数据的解密算法。密码算法的示例可包括三重数据加密标准(TDES)、数据加密标准(DES)、高级加密标准(AES)等。A "key" may include a piece of information used in a cryptographic algorithm to transform input data into another representation. A cryptographic algorithm can be an encryption algorithm that transforms original data into an alternative representation, or a decryption algorithm that transforms encrypted information back into the original data. Examples of cryptographic algorithms may include Triple Data Encryption Standard (TDES), Data Encryption Standard (DES), Advanced Encryption Standard (AES), etc.
“公钥”可包括可开放并且公开地共享的密码密钥。公钥可以被设计成共享的且可以被配置成使得以公钥加密的任何信息仅可以使用与所述公钥相关联的私钥(即,公钥/私钥对)来解密。A "public key" may include a cryptographic key that is open and publicly shareable. Public keys may be designed to be shared and may be configured such that any information encrypted with the public key can only be decrypted using the private key associated with the public key (ie, a public/private key pair).
“私钥”可以包括可以受保护且安全的任何密码密钥。私钥可被安全地存储在实体处,并且可用于解密已利用与所述私钥相关联的公钥/私钥对的相关联公钥加密的任何信息。A "private key" can include any cryptographic key that can be protected and secure. The private key may be securely stored at the entity and may be used to decrypt any information that has been encrypted with the associated public key of the public/private key pair associated with the private key.
“公钥/私钥对”可以指代由实体生成的一对关联的密码密钥。公钥可用于公用功能,例如加密要发送到实体的消息,或用于对应该由实体作出的数字签名进行验证。另一方面,私钥可用于私用功能,例如解密接收到的消息或应用数字签名。在一些实施例中,公钥可以由被称为验证机构(CA)的主体进行授权,验证机构将公钥存储在数据库中并将其分配给请求它的任何其它实体。私钥可通常保持在安全存储介质中,并且通常将仅为所述实体所知。公钥和私钥可以是任何适当格式,包括基于Rivest-Shamir-Adleman(RSA)或椭圆曲线密码学(ECC)的格式。A "public/private key pair" may refer to an associated pair of cryptographic keys generated by an entity. Public keys can be used for public functions, such as encrypting messages to be sent to an entity, or for verifying digital signatures that should be made by the entity. Private keys, on the other hand, can be used for private functions, such as decrypting received messages or applying digital signatures. In some embodiments, a public key may be authorized by a subject called a Certification Authority (CA), which stores the public key in a database and distributes it to any other entity that requests it. The private key may typically be maintained in a secure storage medium and will typically be known only to the entity in question. The public and private keys may be in any suitable format, including those based on Rivest-Shamir-Adleman (RSA) or Elliptic Curve Cryptometry (ECC).
“数字签名”可以包括消息的任何电子签名。数字签名可以是数字数据值、字母数字数据值或任何其它类型的数据。在一些实施例中,数字签名可以是使用密码算法从消息(或数据包)和私钥生成的唯一数据值。在一些实施例中,可以使用使用公钥的验证算法来验证签名。数字签名可以用来展示发行与数字签名相关联的凭证(例如,数字许可)的机构的真实性。A "digital signature" may include any electronic signature of a message. A digital signature can be a numeric data value, an alphanumeric data value, or any other type of data. In some embodiments, a digital signature may be a unique data value generated from a message (or data packet) and a private key using a cryptographic algorithm. In some embodiments, a verification algorithm using a public key may be used to verify the signature. Digital signatures can be used to demonstrate the authenticity of the authority that issued the credential (eg, digital license) associated with the digital signature.
术语“验证”及其派生词可以指利用信息来确定潜在的主体在一组给定的情况下是否有效的过程。验证可包括任何信息比较以确保某些数据或信息是正确的、有效的、准确的、合法的和/或信誉良好的。The term "verification" and its derivatives can refer to the process of using information to determine whether a potential subject is valid under a given set of circumstances. Verification may include any comparison of information to ensure that certain data or information is correct, valid, accurate, legal and/or reputable.
“证书”或“数字证书”可包括电子文件和/或数据文件。在某些情况下,证书或数字证书可以是装置证书。在一些实施例中,数字证书可使用数字签名来将公钥与同身份相关联的数据绑定。数字证书可用于证明公钥的所有权。证书可包括一个或多个数据字段,例如身份的合法姓名、证书的序列号、证书的起始有效日期和终止有效日期、证书相关许可等。证书可包含指示证书有效的第一个日期的“起始有效”日期,以及指示证书有效的最后日期的“终止有效”日期。证书还可以包含证书中包括数据字段的数据的散列。证书可由验证机构签名。例如,验证机构可就发行机构提供的数字许可提供数字证书。数字证书可以帮助认证发行机构。A "certificate" or "digital certificate" may include electronic files and/or data files. In some cases, the certificate or digital certificate may be a device certificate. In some embodiments, a digital certificate may use a digital signature to bind a public key with data associated with the identity. Digital certificates can be used to prove ownership of a public key. A certificate may include one or more data fields, such as the identity's legal name, the certificate's serial number, the certificate's start and end validity dates, certificate-related permissions, etc. A certificate may contain a "valid from" date indicating the first date the certificate is valid, and an "valid from" date indicating the last date the certificate is valid. The certificate may also contain a hash of the data included in the certificate's data fields. Certificates can be signed by a verification authority. For example, a validating authority may provide a digital certificate for a digital license provided by the issuing authority. Digital certificates help authenticate the issuing organization.
“验证机构”可包括发行数字证书的实体。验证机构可使用验证机构证书来证明其身份,验证机构证书包括验证机构的公钥。验证机构证书可用另一验证机构的私钥进行签名,或可用同一验证机构的私钥进行签名。后者被称为自签名证书。验证机构可维护由验证机构发行的所有证书的数据库。验证机构可维护被撤销证书的列表。验证机构可由实体操作,所述实体例如处理网络实体、发行方、收单方、中央银行等。A "certifying authority" may include an entity that issues a digital certificate. A certification authority can prove its identity using a certification authority certificate, which includes the certification authority's public key. A certification authority certificate can be signed with the private key of another certification authority, or with the private key of the same certification authority. The latter is called a self-signed certificate. A certification authority may maintain a database of all certificates issued by the certification authority. A certification authority may maintain a list of revoked certificates. A verification authority may be operated by an entity such as a processing network entity, issuer, acquirer, central bank, etc.
“发行机构”可包括向用户发行凭证的实体,通常使用发行实体计算机发行凭证。发行实体可以是政府机构、医疗服务提供者、文件存储库、访问管理员等。发行实体也可以以存储在用户装置(例如蜂窝电话、智能卡、平板计算机或膝上型计算机)上的数字许可的形式向用户发行凭证。An "Issuing Authority" may include an entity that issues credentials to users, typically using the issuing entity's computer to issue credentials. Issuing entities can be government agencies, healthcare providers, document repositories, access administrators, etc. The issuing entity may also issue the credential to the user in the form of a digital license stored on the user's device (eg, cell phone, smart card, tablet, or laptop).
“用户”可包括个人或计算装置。在一些实施例中,用户可以与一个或多个个人账户和/或用户装置(例如,移动装置)相关联。"User" may include a person or a computing device. In some embodiments, a user may be associated with one or more personal accounts and/or user devices (eg, mobile devices).
“用户装置”可以是由用户操作的装置。用户装置的示例可以包括移动电话、智能手机、卡、个人数字助理(PDA)、膝上型计算机、台式计算机、服务器计算机、车辆(例如汽车)、精简客户端装置、平板式PC,等等。此外,用户装置可以是任何类型的可穿戴技术装置,例如手表、耳机、眼镜等。用户装置可包括能够处理用户输入的一个或多个处理器。用户装置还可包括用于接收用户输入的一个或多个输入传感器。如本领域中已知的,存在能够检测用户输入的多种输入传感器,例如加速度计、相机、麦克风等。由输入传感器获得的用户输入可以来自多种数据输入类型,包括但不限于音频数据、视觉数据或生物特征数据。用户装置可以包括用户可以操作的任何电子装置,所述电子装置还可以提供与网络的远程通信能力。远程通信能力的示例包括使用移动电话(无线)网络、无线数据网络(例如,3G、4G或类似网络)、Wi-Fi、Wi-Max,或者可以提供对网络(例如互联网或专用网络)的访问的任何其它通信介质。A "user device" may be a device operated by a user. Examples of user devices may include mobile phones, smartphones, cards, personal digital assistants (PDAs), laptop computers, desktop computers, server computers, vehicles (eg, automobiles), thin client devices, tablet PCs, and the like. Additionally, the user device may be any type of wearable technology device, such as a watch, headphones, glasses, etc. The user device may include one or more processors capable of processing user input. The user device may also include one or more input sensors for receiving user input. As is known in the art, there are a variety of input sensors capable of detecting user input, such as accelerometers, cameras, microphones, etc. User input obtained by input sensors can come from a variety of data input types, including but not limited to audio data, visual data, or biometric data. User devices may include any electronic device operable by a user that may also provide remote communication capabilities with a network. Examples of remote communication capabilities include the use of mobile phone (wireless) networks, wireless data networks (e.g., 3G, 4G, or similar networks), Wi-Fi, Wi-Max, or may provide access to a network (e.g., the Internet or a private network) any other communication medium.
“服务器计算机”通常是功能强大的计算机或计算机集群。例如,服务器计算机可以是大型主机、小型计算机集群或充当单元的一组服务器。在一个示例中,服务器计算机可以是与网络服务器耦合的数据库服务器。服务器计算机可以耦合到数据库,并且可以包括用于服务于来自一个或多个客户端计算机的请求的任何硬件、软件、其它逻辑或前述各项的组合。服务器计算机可以包括一个或多个计算设备,且可使用各种计算结构、布置和编译中的任一种来服务来自一个或多个客户端计算机的请求。A "server computer" is usually a powerful computer or cluster of computers. For example, a server computer may be a mainframe, a cluster of small computers, or a group of servers acting as a unit. In one example, the server computer may be a database server coupled to a network server. A server computer may be coupled to the database and may include any hardware, software, other logic, or combination of the foregoing for servicing requests from one or more client computers. A server computer may include one or more computing devices, and may use any of a variety of computing structures, arrangements, and compilations to service requests from one or more client computers.
“处理器”可包括任何合适的一个或多个数据计算装置。处理器可以包括一起工作以实现期望的功能的一个或多个微处理器。处理器可以包括CPU,所述CPU包括足以执行程序组件的至少一个高速数据处理器,所述程序组件用于执行用户和/或系统产生的请求。CPU可以是微处理器,诸如AMD的Athlon、Duron和/或Opteron;IBM和/或摩托罗拉(Motorola)的PowerPC;IBM和索尼(Sony)的Cell处理器;英特尔(Intel)的Celeron、Itanium、Pentium、Xeon和/或XScale;和/或类似处理器。A "processor" may include any suitable data computing device or devices. A processor may include one or more microprocessors that work together to achieve desired functionality. The processor may include a CPU including at least one high-speed data processor sufficient to execute program components for executing user and/or system generated requests. The CPU may be a microprocessor, such as AMD's Athlon, Duron and/or Opteron; IBM and/or Motorola's PowerPC; IBM and Sony's Cell processor; Intel's Celeron, Itanium, Pentium , Xeon and/or XScale; and/or similar processors.
“存储器”可以是可存储电子数据的任何合适的一个或多个装置。合适的存储器可以包括非瞬态计算机可读介质,其存储可以由处理器执行以实施期望方法的指令。存储器的示例可以包括一个或多个存储器芯片、磁盘驱动器等。此类存储器可使用任何合适的电气、光学和/或磁性操作模式来操作。"Memory" may be any suitable device or devices that can store electronic data. Suitable memory may include non-transitory computer-readable media storing instructions executable by a processor to perform the desired method. Examples of memory may include one or more memory chips, disk drives, and the like. Such memory may operate using any suitable electrical, optical and/or magnetic operating modes.
“机器可读代码”可以包括可以通过电子装置读取以供计算机解释和操控的任何图像或符号。机器可读代码的一些示例包括条形码、快速响应(QR)码、军用规格UID码和任何其它合适的代码。"Machine-readable code" may include any image or symbol that can be read by an electronic device for interpretation and manipulation by a computer. Some examples of machine-readable codes include barcodes, quick response (QR) codes, military-spec UID codes, and any other suitable code.
“通信信道”可包括可经由其提供消息的介质。通信信道可以包括物理传输介质(例如,线、接触接口等)、空中通信介质(例如,使用电磁信号等)、逻辑介质(例如,应用程序编程接口(API)等)和/或其组合。A "communication channel" may include a medium over which messages may be provided. Communication channels may include physical transmission media (eg, wires, contact interfaces, etc.), over-the-air communication media (eg, using electromagnetic signals, etc.), logical media (eg, application programming interfaces (APIs), etc.), and/or combinations thereof.
“交易”可以是两方或更多方之间的任何交互或交换。例如,交易可包括第一实体从第二实体请求资源。在此示例中,当向第一实体提供资源或交易被拒绝时,交易完成。A "transaction" can be any interaction or exchange between two or more parties. For example, a transaction may include a first entity requesting resources from a second entity. In this example, the transaction is completed when the resource is provided to the first entity or the transaction is rejected.
“交互”可包括涉及多于一个参与者的对等动作或影响。“交互”可以包括各方、各装置和/或各实体之间的通信、联系或交换。示例交互包括两方之间的交易和两个装置之间的数据交换。在一些实施例中,交互可以包括用户请求访问安全数据、安全网页、安全位置等。"Interaction" may include reciprocal actions or effects involving more than one participant. "Interaction" may include communication, contact or exchange between parties, devices and/or entities. Example interactions include transactions between two parties and data exchange between two devices. In some embodiments, the interaction may include the user requesting access to secure data, secure web pages, secure locations, etc.
“访问装置”可以是提供对远程系统的访问的任何合适的装置。访问装置还可以用于与协调计算机、通信网络或任何其它合适的系统通信。访问装置通常可以位于任何合适的位置处,例如位于依赖方所在位置处。访问装置可以采用任何合适形式。访问装置的一些示例包括POS或销售点装置(例如,POS终端)、蜂窝电话、个人数字助理(PDA)、个人计算机(PC)、平板PC、手持式专用读取器、机顶盒、电子现金出纳机(ECR)、自动取款机(ATM)、虚拟现金出纳机(VCR)、信息服务亭(kiosk)、安全系统、访问系统、条形码读取器、QR码读取器等。在一些实施例中,访问装置可包括读取器、处理器和计算机可读介质。访问装置可使用任何合适的接触式或非接触式操作模式,以向用户装置发送或从其接收数据或者与用户装置相关联。例如,访问装置可以具有读卡器,所述读卡器可以包括电触头、射频(RF)天线、光学扫描器、条形码阅读器或磁条阅读器以与用户装置交互。An "access device" may be any suitable device that provides access to a remote system. The access device may also be used to communicate with a coordinating computer, communications network or any other suitable system. The access device may generally be located at any suitable location, such as at the location of the relying party. The access device may take any suitable form. Some examples of access devices include POS or point-of-sale devices (eg, POS terminals), cellular phones, personal digital assistants (PDAs), personal computers (PCs), tablet PCs, handheld specialty readers, set-top boxes, electronic cash registers (ECR), automated teller machine (ATM), virtual cash register (VCR), information service kiosk (kiosk), security system, access system, barcode reader, QR code reader, etc. In some embodiments, an access device may include a reader, a processor, and a computer-readable medium. The access device may use any suitable contact or contactless mode of operation to send or receive data to or associate with the user device. For example, the access device may have a card reader, which may include electrical contacts, a radio frequency (RF) antenna, an optical scanner, a barcode reader, or a magnetic stripe reader to interact with the user device.
“访问请求”可以包括访问资源的请求。资源可以是物理位置(例如,音乐会场地、公寓楼、办公空间)、物理资源(例如,良好)、数字资源(例如,电子文件、电子数据等)或服务。在某些情况下,可以通过发送包括访问请求数据的访问请求消息来提交访问请求。通常,与请求方相关联的装置可以将访问请求消息发送到与负责授予所请求访问的依赖方相关联的装置。An "access request" may include a request to access a resource. A resource may be a physical location (eg, a concert venue, an apartment building, an office space), a physical resource (eg, a building), a digital resource (eg, electronic files, electronic data, etc.), or a service. In some cases, an access request may be submitted by sending an access request message that includes the access request data. Typically, a device associated with the requesting party may send an access request message to a device associated with the relying party responsible for granting the requested access.
“访问凭证”可以包括任何合适的数据,所述数据可用于访问资源或创建可以访问资源的数据。凭证可以是一串数字、字母或任何其它合适的字符,以及可用作确认的任何对象或文件。在其它实施例中,访问数据可以包括可用于访问位置或访问安全数据的数据。此类信息可以是驾驶执照、疫苗接种记录、国家护照、医疗处方、娱乐执照、娱乐许可证、选民登记确认、进入建筑物的身份证件、活动的票证信息、进入建筑物的数据、过境票证信息、密码、生物特征或其它访问安全数据的凭证等。根据各种实施例,访问凭证可以呈在用户装置上配置的数字许可的形式提供。例如,数字许可可以由发行数字许可的发行机构在用户装置上配置。在一些实施例中,数字许可可以由认证发行机构和/或数字许可的认证机构在用户装置上配置。"Access Credentials" may include any suitable data that can be used to access a resource or create data that can access a resource. The credential can be a string of numbers, letters, or any other suitable characters, as well as any object or document that can be used as confirmation. In other embodiments, access data may include data that may be used to access location or access security data. Such information can be driver's licenses, vaccination records, national passports, medical prescriptions, recreational licenses, entertainment permits, voter registration confirmations, identification documents to enter buildings, ticket information for events, data to enter buildings, transit ticket information , passwords, biometrics or other credentials to access secure data. According to various embodiments, access credentials may be provided in the form of a digital license configured on the user's device. For example, a digital license may be configured on a user device by an issuing authority that issues the digital license. In some embodiments, the digital license may be configured on the user device by a certification issuing authority and/or a certifying authority for the digital license.
现在将更详细地描述一些实施例的细节。The details of some embodiments will now be described in greater detail.
实施例使数字证书与在用户装置上配置的数字许可相关联。数字许可由发行机构(IA)生成,并使用发行机构的私钥(IA私钥)进行签名。发行机构可与验证机构共享发行机构的公钥(IA公钥)。然后,包括IA公钥的数字证书可以由验证机构(CA)生成,并且与数字许可相关联。验证机构可包括全球可信机构。Embodiments associate digital certificates with digital licenses configured on the user device. The digital license is generated by the issuing authority (IA) and signed using the issuing authority's private key (IA private key). The issuing organization can share the issuing organization's public key (IA public key) with the verification authority. A digital certificate including the IA public key can then be generated by a Certification Authority (CA) and associated with the digital license. Verifying authorities may include globally trusted authorities.
作为与依赖方交互的一部分,用户可以将数字许可呈现给依赖方。例如,用户可能希望获得对由依赖方管理的需要特定凭证集合(例如,票证、疫苗接种记录、护照、身份证)的位置(例如,音乐会场地、外国、安全建筑物)的访问。在其它实施例中,用户可以呈现数字许可作为授权证明(例如,驾驶执照、捕鱼许可)。依赖方可以从验证机构接收验证机构的公钥(CA公钥)。在接收到与数字证书相关联的数字许可后,依赖方可使用CA公钥解密数字证书,以获得其中包含的信息。例如,发行机构公钥(IA公钥)可以嵌入数字证书中。依赖方可检取IA公钥,使用IA公钥解密数字许可,并获得数字许可中的信息。依赖方可以相信从数字许可检取到的信息的真实性和准确性,因为依赖方信任验证机构。由验证机构发行的数字证书反过来又可以为发行机构的身份提供担保。因此,依赖方可以相信从数字许可检取的信息的真实性和准确性。As part of the interaction with the relying party, the user may present a digital license to the relying party. For example, a user may wish to gain access to a location (e.g., concert venue, foreign country, secure building) managed by a relying party that requires a specific set of credentials (e.g., tickets, vaccination records, passport, identification card). In other embodiments, the user may present a digital license as proof of authorization (eg, driver's license, fishing license). The relying party may receive the certification authority's public key (CA public key) from the certification authority. After receiving the digital license associated with the digital certificate, the relying party can use the CA public key to decrypt the digital certificate to obtain the information contained therein. For example, the issuing authority public key (IA public key) can be embedded in the digital certificate. The relying party can retrieve the IA public key, use the IA public key to decrypt the digital license, and obtain the information in the digital license. The relying party can trust the authenticity and accuracy of the information retrieved from the digital license because the relying party trusts the verification authority. Digital certificates issued by a verification authority in turn vouch for the identity of the issuing authority. Therefore, the relying party can trust the authenticity and accuracy of the information retrieved from the digital license.
图1示出根据各种实施例的用于发行和验证数字许可的图。根据各种实施例,数字许可可包括驾驶执照、疫苗接种护照、普通护照、医疗处方、娱乐执照、娱乐许可证、选民登记确认、进入建筑物的身份证件等中的一个或多个。Figure 1 shows a diagram for issuance and verification of digital licenses in accordance with various embodiments. According to various embodiments, digital permissions may include one or more of a driver's license, vaccination passport, regular passport, medical prescription, recreational license, entertainment permit, voter registration confirmation, identification document to enter a building, etc.
根据各种实施例,可以由发行机构(例如,发行实体)100将数字许可105作为数字许可发行给用户。数字许可105可以使用发行机构的私钥(IA公私钥对的IA公钥)进行签名。在一些实施例中,数字许可105可以由发行机构100在用户装置104上配置。发行机构100可以与验证机构102共享发行机构的公钥(IA公私钥对的IA公钥)。According to various embodiments, digital license 105 may be issued to a user as a digital license by an issuing authority (eg, issuing entity) 100 . The digital license 105 may be signed using the issuing authority's private key (the IA public key of the IA public and private key pair). In some embodiments, the digital license 105 may be configured by the issuing authority 100 on the user device 104 . The issuing authority 100 may share the issuing authority's public key (the IA public key of the IA public and private key pair) with the verification authority 102 .
验证机构102可以认证发行机构100。在一些实施例中,验证机构102可以从发行机构100接收认证发行机构100的请求。作为认证发行机构100的一部分,验证机构102可以接着与发行机构100交互以收集和验证关于发行机构100的信息。例如,验证机构102可以从发行机构100接收与发行机构100的身份相关联的信息。作为认证发行机构100的一部分,验证机构102可以验证与发行机构的身份相关联的信息。在标识(并验证)发行机构的身份后,验证机构102可以基于发行机构100的身份确定一组认证步骤。根据各种实施例,验证机构102可以执行第一组认证步骤以用于认证第一发行机构100,并且可以执行不同于第一组认证步骤的第二组认证步骤以认证第二发行机构。例如,向用户发行驾驶执照的州机动车辆部(DMV)可以与同发行疫苗接种记录的医疗服务提供者的一组认证步骤不同的一组认证步骤相关联。这组认证步骤可以基于发行机构100的身份或由发行机构100发行的证书的类型。验证机构102可以基于与发行机构100相关联的一组认证步骤认证发行机构100。The verification authority 102 may certify the issuing authority 100. In some embodiments, the verification authority 102 may receive a request from the issuing authority 100 to certify the issuing authority 100 . As part of certification issuer 100 , verification authority 102 may then interact with issuer 100 to collect and verify information about issuer 100 . For example, the verification authority 102 may receive information from the issuing authority 100 that is associated with the identity of the issuing authority 100 . As part of the certification issuer 100, the verification authority 102 can verify information associated with the identity of the issuing authority. After identifying (and verifying) the identity of the issuing authority, verification authority 102 may determine a set of authentication steps based on the identity of issuing authority 100. According to various embodiments, the verification authority 102 may perform a first set of authentication steps for authenticating the first issuing authority 100 and may perform a second set of authentication steps that is different from the first set of authentication steps for authenticating the second issuing authority. For example, a state Department of Motor Vehicles (DMV) that issues driver's licenses to users may be associated with a different set of authentication steps than a medical provider that issues vaccination records. This set of authentication steps may be based on the identity of the issuing authority 100 or the type of certificate issued by the issuing authority 100 . The verification authority 102 may authenticate the issuing authority 100 based on a set of authentication steps associated with the issuing authority 100 .
在认证发行机构100之后,验证机构102可以生成与发行机构100发行的数字许可105相关联的数字证书115。根据各种实施例,验证机构102可以在接收到发行数字证书的请求之前或之后认证发行机构100。After authenticating the issuing authority 100, the verification authority 102 may generate a digital certificate 115 associated with the digital license 105 issued by the issuing authority 100. According to various embodiments, the verification authority 102 may certify the issuing authority 100 before or after receiving a request to issue a digital certificate.
根据各种实施例,验证机构102可以生成具有CA公钥110和对应CA私钥111的CA公私钥对。验证机构102可以将CA公私钥对存储在存储装置处。验证机构102可以使用CA公私钥对的CA私钥111对IA公钥分量进行数字签名(例如,包括附加数据、散列),从而生成包括用CA私钥111签名的IA公钥的数字证书115。在一些实施例中,验证机构102可以将数字证书115返回到发行机构100,以便发行机构100使数字证书115与由发行机构100发行的数字许可105相关联。在其它实施例中,验证机构102可以使数字证书115与用户装置104上的数字许可105相关联。According to various embodiments, the verification authority 102 may generate a CA public-private key pair having a CA public key 110 and a corresponding CA private key 111 . The verification authority 102 may store the CA public and private key pair at the storage device. The verification authority 102 may digitally sign (e.g., include additional data, hashes) the IA public key component using the CA private key 111 of the CA public and private key pair, thereby generating a digital certificate 115 including the IA public key signed with the CA private key 111 . In some embodiments, the verification authority 102 may return the digital certificate 115 to the issuing authority 100 so that the issuing authority 100 associates the digital certificate 115 with the digital license 105 issued by the issuing authority 100 . In other embodiments, the verification authority 102 may associate the digital certificate 115 with the digital license 105 on the user device 104 .
验证机构102可以将CA公私钥对的CA公钥110与可能需要验证由发行机构100发行的数字证书的一个或多个依赖方共享。依赖方(例如,验证者)108可能能够使用CA公私钥对的CA公钥110来验证或认证发行机构100和/或数字许可105。也就是说,依赖方可以基于验证机构102的身份来验证或认证发行机构100和/或数字许可105的内容。例如,向用户(例如,数字许可的持有人)发行的数字许可105可以包括标识卡。雇主、航空公司经营者或体育场入口处的保安人员等依赖方可以确认数字标识卡的有效性,如本文所述。因此,实施例能够以安全且可靠的方式实现物理许可的数字化。此外,实施例防止使用和传播欺诈性许可。The verification authority 102 may share the CA public key 110 of the CA public and private key pair with one or more relying parties that may need to verify the digital certificate issued by the issuing authority 100 . The relying party (eg, verifier) 108 may be able to verify or certify the issuing authority 100 and/or the digital license 105 using the CA public key 110 of the CA public-private key pair. That is, the relying party may verify or certify the content of the issuing authority 100 and/or the digital license 105 based on the identity of the verification authority 102 . For example, a digital license 105 issued to a user (eg, the holder of the digital license) may include an identification card. Relying parties such as employers, airline operators, or security personnel at stadium entrances can confirm the validity of the digital ID card, as described in this article. Thus, embodiments enable digitization of physical licenses in a safe and reliable manner. Additionally, embodiments prevent the use and dissemination of fraudulent licenses.
根据各种实施例,两个单独的实体(例如,依赖方和发行机构)可以彼此验证。例如,在美国,驾驶执照由州机动车辆部(DMV)发行。虽然美国的每个州可能承认彼此的DMV,但外国的实体可能不会承认某个州DMV甚至州本身。当一个人从例如美国怀俄明州DMV获得驾驶执照时,日本的依赖方没有任何手段确认所述信息,甚至没有任何手段将美国怀俄明州DMV视为可靠的来源。实施例提供一种公钥基础设施(PKI)模型,其中验证机构从发行机构接收数据,验证发行机构和接收到的数据是合法的。全球可信的验证机构承保发行机构提供的信息。验证机构充当可信的中间人,所述中间人能够转移信任或信任链,从而能够安全地验证信息是否从合法实体(例如,发行机构)处收到或由合法实体(例如,依赖方)查询。According to various embodiments, two separate entities (eg, relying party and issuing authority) can authenticate each other. For example, in the United States, driver's licenses are issued by state Departments of Motor Vehicles (DMV). While each state in the United States may recognize each other's DMV, a foreign entity may not recognize a state DMV or even the state itself. When a person obtains a driver's license from, for example, the Wyoming DMV in the United States, the relying party in Japan has no means of confirming said information or even treating the Wyoming DMV of the United States as a reliable source. Embodiments provide a public key infrastructure (PKI) model in which a verification authority receives data from an issuing authority and verifies that the issuing authority and the received data are legitimate. Trusted verification agencies around the world underwrite the information provided by the issuer. A verification authority acts as a trusted intermediary capable of transferring trust or a chain of trust, thereby securely verifying whether information was received from or queried by a legitimate entity (e.g., an issuing authority).
根据各种实施例,验证机构102在生成任何数字证书之前执行对发行机构100(例如,医疗服务提供者、提供驾驶执照、国家护照的政府部门等)的审查。审查发行机构100的要求可以取决于由发行机构100提供的许可的类型或取决于发行机构100的身份(例如,类型)。例如,验证由政府部门提供身份信息的实体作为发行机构可能与验证由医疗服务提供者(例如,医院、医生办公室、药房)提供医疗信息的实体有一套不同的要求。According to various embodiments, the verification authority 102 performs a review of the issuing authority 100 (eg, a healthcare provider, a government agency that provides a driver's license, a national passport, etc.) before generating any digital certificate. The requirement to review an issuer 100 may depend on the type of permission provided by the issuer 100 or on the identity (eg, type) of the issuer 100 . For example, an entity that verifies identity information provided by a government agency as the issuing authority may have a different set of requirements than an entity that verifies medical information provided by a healthcare provider (e.g., hospital, doctor's office, pharmacy).
验证机构102生成CA私-公钥对。虽然验证机构102对CA私钥111保密以对发行机构的公钥(例如,IA公钥)进行签名,但验证机构102将CA公钥110提供给需要访问和/或使用数字许可105上的信息的依赖方108。通过验证数字许可105上的信息的过程,依赖方108能够将IA公钥信任为合法发行的公钥,并且因此依赖方108能够验证从数字许可105检取的一条信息是由合法来源提供的。The verification authority 102 generates a CA private-public key pair. While the verification authority 102 keeps the CA private key 111 secret for signing the issuing authority's public key (eg, the IA public key), the verification authority 102 provides the CA public key 110 to anyone who needs to access and/or use the information on the digital license 105 Relying Party 108. Through the process of verifying the information on the digital license 105, the relying party 108 is able to trust the IA public key as a legitimately issued public key, and therefore the relying party 108 is able to verify that a piece of information retrieved from the digital license 105 was provided by a legitimate source.
根据各种实施例,发行机构100可请求验证机构102为发行机构发行数字证书115。验证机构102可以使用一个或多个认证和验证过程验证发行机构100。示例性认证和验证过程可以包括需要由验证机构102和/或发行机构100执行的一组步骤,并且可取决于发行机构100的类型或身份,或由发行机构100发行的数字许可的类型。According to various embodiments, the issuing authority 100 may request the verification authority 102 to issue a digital certificate 115 for the issuing authority. Verification authority 102 may verify issuing authority 100 using one or more authentication and verification processes. The exemplary authentication and verification process may include a set of steps that need to be performed by the verification authority 102 and/or the issuing authority 100 , and may depend on the type or identity of the issuing authority 100 , or the type of digital license issued by the issuing authority 100 .
发行机构100接着可向用户发行数字许可105。在发放数字许可105之前,发行机构100可以验证用户的身份。发行机构100可以生成IA公私钥对,并将IA公钥提供给验证机构102。发行机构100可以用IA私钥对数字许可105进行签名,并在用户装置104上(例如,在用户装置的电子钱包上)配置有签名的数字许可105。The issuing authority 100 may then issue the digital license 105 to the user. Before issuing the digital license 105, the issuing authority 100 can verify the user's identity. The issuing authority 100 may generate an IA public and private key pair and provide the IA public key to the verification authority 102. The issuing authority 100 may sign the digital license 105 with the IA private key and configure the signed digital license 105 on the user device 104 (eg, on an electronic wallet of the user device).
验证机构102使用验证机构自己的私钥(例如,CA私钥111)对IA公钥进行签名,从而生成数字证书115,验证发行机构100是合法来源。验证机构102可以将数字证书115提供给发行机构100,所述发行机构可以在用户装置104的数字钱包上将数字证书115配置为与数字许可105相关联。当呈现给验证者/依赖方108时,依赖方108可以使用CA公钥110来验证用CA私钥111签名的数字证书115。然后,依赖方108可以从数字证书115中检取IA公钥。依赖方108可以相信,基于使用CA私钥111签名的IA公钥,IA公钥可信(例如,验证机构102是全球可信实体,或验证机构102是依赖方108可信的实体)。然后,依赖方108可以从数字许可105中检取信息,并相信发行信息的发行机构100是合法的。The verification authority 102 uses the verification authority's own private key (for example, the CA private key 111) to sign the IA public key, thereby generating a digital certificate 115 to verify that the issuing authority 100 is a legitimate source. The verification authority 102 may provide the digital certificate 115 to the issuing authority 100 , which may configure the digital certificate 115 on the digital wallet of the user device 104 to be associated with the digital license 105 . When presented to the verifier/relying party 108, the relying party 108 can use the CA public key 110 to verify the digital certificate 115 signed with the CA private key 111. The relying party 108 can then retrieve the IA public key from the digital certificate 115 . The relying party 108 can trust that the IA public key is trusted based on the IA public key signed using the CA private key 111 (eg, the verification authority 102 is a globally trusted entity, or the verification authority 102 is an entity that the relying party 108 trusts). The relying party 108 can then retrieve the information from the digital license 105 and trust that the issuing authority 100 that issued the information is legitimate.
图1还示出用于生成和验证数字许可的一系列步骤。在步骤1,验证机构102验证一个或多个发行机构100的合法性,并与各发行机构100建立可信关系。验证机构102可以生成CA公私钥对,并且使用CA私钥111对来自可信发行机构100的数字证书请求进行签名。根据各种实施例,发行机构100可包括以下中的一个或多个:医疗服务提供者;发行例如驾驶执照、护照、国民身份证等标识形式的政府实体;发行例如公共交通票、机票或入场票(例如,音乐会入场票或建筑物入场证)的机构。发行机构100可以与验证机构102共享IA公钥,并且执行验证机构102所需的认证步骤以向验证机构102认证自身。Figure 1 also shows a series of steps for generating and verifying a digital license. In step 1, the verification agency 102 verifies the legitimacy of one or more issuing agencies 100 and establishes a trustworthy relationship with each issuing agency 100. The verification authority 102 may generate a CA public and private key pair and use the CA private key 111 to sign digital certificate requests from the trusted issuing authority 100 . According to various embodiments, the issuing authority 100 may include one or more of the following: a medical service provider; a government entity that issues forms of identification such as driver's licenses, passports, national identity cards, etc.; issues such as public transportation tickets, airline tickets, or entry tickets. The organization of event tickets (for example, concert tickets or building passes). The issuing authority 100 may share the IA public key with the verification authority 102 and perform the authentication steps required by the verification authority 102 to authenticate itself to the verification authority 102 .
在步骤2,发行机构100可以生成用IA私钥签名的数字许可105。根据各种实施例,发行机构100可以在用户装置104(例如,用户移动装置)的电子钱包上配置数字许可105。数字许可105可以远程提供,并且可以由发行机构100根据需要(例如,在到期时、在信息被更改或更新时等)更新。用户可能能够请求修改与数字许可105相关联的信息,以添加或删除临时或永久性信息,例如残疾状态、临时地址等。根据各种实施例,用户装置104与发行机构100之间的通信可以使用新的通信标准(例如,ISO/IE CTS 23220-3)。In step 2, the issuing authority 100 may generate a digital license 105 signed with the IA private key. According to various embodiments, the issuing authority 100 may configure the digital license 105 on the electronic wallet of the user device 104 (eg, the user's mobile device). Digital licenses 105 may be provided remotely and may be renewed by the issuing authority 100 as needed (eg, upon expiration, when information is changed or updated, etc.). Users may be able to request modifications to the information associated with the digital license 105 to add or remove temporary or permanent information, such as disability status, temporary address, etc. According to various embodiments, communications between user device 104 and issuing authority 100 may use new communications standards (eg, ISO/IE CTS 23220-3).
在步骤3,验证机构102可以用CA私钥111对IA公钥进行数字签名,从而为发行机构100生成数字证书115。例如,数字证书115可以证明发行机构100的合法性或真实性。在一些实施例中,验证机构102可以直接在用户装置104上更新数字许可105以与数字证书115相关联,所述数字证书使用CA私钥111进行数字签名(例如,“锁定”),从而建立发行机构100的合法性。数字证书115可以包括用CA私钥111数字签名的IA公钥。例如,验证机构102可以从用户装置104接收验证在用户装置104上配置的数字许可105的请求。验证机构102可以将数字证书115发送到用户装置104以链接到用户装置104上的数字许可105。In step 3, the verification authority 102 may digitally sign the IA public key with the CA private key 111 to generate a digital certificate 115 for the issuing authority 100. For example, digital certificate 115 may prove the legitimacy or authenticity of issuing authority 100 . In some embodiments, the verification authority 102 may directly update the digital license 105 on the user device 104 to be associated with the digital certificate 115 that is digitally signed (eg, "locked") using the CA private key 111 , thereby establishing Legality of the issuing agency 100. Digital certificate 115 may include an IA public key digitally signed with CA private key 111 . For example, the verification authority 102 may receive a request from the user device 104 to verify a digital license 105 configured on the user device 104 . The verification authority 102 may send the digital certificate 115 to the user device 104 to link to the digital license 105 on the user device 104 .
在其它实施例中,验证机构102可以将数字证书115返回到发行机构100,以便发行机构100将数字证书115与数字许可105链接。发行机构100可以在生成数字许可105之前或期间接收数字证书115。发行机构100可以使数字证书115与数字许可105相关联(例如,链接)。In other embodiments, the verification authority 102 may return the digital certificate 115 to the issuing authority 100 so that the issuing authority 100 links the digital certificate 115 with the digital license 105 . Issuing authority 100 may receive digital certificate 115 before or during generation of digital license 105 . Issuing authority 100 may associate (eg, link) digital certificate 115 with digital license 105 .
在步骤4,验证机构102可以将CA公钥110提供给一个或多个依赖方108,所述一个或多个依赖方适于从用户(例如,数字许可的持有人)接收数字许可105和相关联数字证书115。一个或多个依赖方108可以与全球所有可信的发行机构互操作。验证机构102可以支持依赖实体的离线和在线数字认证。例如,验证机构102可以将CA公钥110发送至依赖方108,并且依赖方108可以将CA公钥110存储在安全位置处。替代地,验证机构102可以将CA公钥110存储在依赖方108可访问的存储装置(例如,云存储装置)中。验证机构102可以通知依赖方108如何从云或远程存储装置检取CA公钥110。例如,验证机构102可以将对存储装置的访问凭证发送到依赖方108。在一些实施例中,验证机构102可以在依赖方108的请求下将CA公钥110提供给依赖方108。At step 4, the verification authority 102 may provide the CA public key 110 to one or more relying parties 108 adapted to receive the digital license 105 from the user (e.g., the holder of the digital license) and Associated digital certificate 115. One or more relying parties 108 may interoperate with all trusted issuers worldwide. The verification authority 102 may support offline and online digital authentication of dependent entities. For example, the verification authority 102 may send the CA public key 110 to the relying party 108, and the relying party 108 may store the CA public key 110 in a secure location. Alternatively, the verification authority 102 may store the CA public key 110 in a storage device accessible to the relying party 108 (eg, a cloud storage device). The verification authority 102 may notify the relying party 108 how to retrieve the CA public key 110 from the cloud or remote storage. For example, the verification authority 102 may send access credentials to the storage device to the relying party 108 . In some embodiments, the verification authority 102 may provide the CA public key 110 to the relying party 108 at the request of the relying party 108 .
根据各种实施例,验证机构102的参与可以减少伪造ID欺诈,并减少对需要专门和本地化知识的人工检查的依赖。验证机构102可以确保发行数字许可105的发行机构100的合法性。According to various embodiments, the involvement of the verification authority 102 may reduce counterfeit ID fraud and reduce reliance on manual inspections that require specialized and localized knowledge. The verification authority 102 can ensure the legitimacy of the issuing authority 100 that issued the digital license 105 .
在步骤5,用户向依赖方108呈现与数字证书115相关联的数字许可105。依赖方108可以检取CA公钥110以检取和/或验证IA公钥的真实性。然后,依赖方108可以使用IA公钥来检取数字许可105中包含的信息。根据各种实施例,用户可以经由任何合适的手段将数字许可105提供给依赖方108,包括但不限于经由蓝牙、NFC、Wi-Fi或使用机器可读码(例如,QR码)的通信。依赖方108可以使用安装在终端上的专用移动应用程序或专用终端(例如,访问装置)从用户/用户装置接收和验证数据。用户装置104与依赖方终端之间的数据传送可以是离线数据传送。At step 5, the user presents the digital license 105 associated with the digital certificate 115 to the relying party 108. The relying party 108 may retrieve the CA public key 110 to retrieve and/or verify the authenticity of the IA public key. The relying party 108 can then retrieve the information contained in the digital license 105 using the IA public key. According to various embodiments, the user may provide the digital license 105 to the relying party 108 via any suitable means, including but not limited to communication via Bluetooth, NFC, Wi-Fi, or using a machine-readable code (eg, a QR code). The relying party 108 may receive and verify data from the user/user device using a dedicated mobile application installed on the terminal or a dedicated terminal (eg, access device). The data transfer between the user device 104 and the relying party terminal may be an offline data transfer.
根据各种实施例,用户可以选择数字许可105上的所有信息或信息子集以提供给依赖方108。例如,所提供的信息可符合ISO 18013-5标准。依赖方计算机可能已经(例如,通过用户装置104上的标识符)检测到数字许可105与验证机构102发行的数字证书115相关联。然后,依赖方108可以检取CA公钥110并解密数字证书115以获得IA公钥,然后解密数字许可105以获得其中包含的信息。如果一系列解密和/或验证成功,则依赖方108现在可以相信发行机构100是合法的,因为它与可信验证机构102相关联。在某些情况下,依赖方计算机还可以联系验证机构102以确定数字证书115的详细信息是否仍然有效。依赖方108可以依赖单个可信实体(例如,验证机构102)来可靠地认证来自全球所有参与司法管辖区的ID。According to various embodiments, the user may select all information or a subset of the information on the digital license 105 to provide to the relying party 108 . For example, the information provided may comply with the ISO 18013-5 standard. The relying party computer may have detected (eg, through an identifier on the user device 104 ) that the digital license 105 is associated with the digital certificate 115 issued by the verification authority 102 . The relying party 108 can then retrieve the CA public key 110 and decrypt the digital certificate 115 to obtain the IA public key, and then decrypt the digital license 105 to obtain the information contained therein. If the series of decryptions and/or verifications are successful, the relying party 108 can now trust that the issuing authority 100 is legitimate because it is associated with the trusted verification authority 102 . In some cases, the relying party computer may also contact the verification authority 102 to determine whether the details of the digital certificate 115 are still valid. Relying parties 108 may rely on a single trusted entity (eg, verification authority 102) to reliably authenticate IDs from all participating jurisdictions around the world.
如上所述,验证机构102使用验证机构102的公私钥基础设施验证发行机构100的真实性。根据各种实施例,验证机构102不认证将数字许可105呈现给依赖方108的用户。正是发行机构100在向用户发行数字许可105之前对用户进行认证。验证机构102认证发行机构100。As described above, the verification authority 102 verifies the authenticity of the issuing authority 100 using the verification authority's 102 public and private key infrastructure. According to various embodiments, the verification authority 102 does not authenticate the user who presented the digital license 105 to the relying party 108 . It is the issuing authority 100 that authenticates the user before issuing the digital license 105 to the user. The verification authority 102 certifies the issuing authority 100 .
根据各种实施例,验证机构102可以在用户装置104上提供移动应用程序(例如,软件应用程序、“应用程序”)。数字许可105和数字证书115可以在移动应用程序上而不是在电子钱包上配置。替代地,如上所述,数字许可105和数字证书115可以在用户装置104的电子钱包上配置。然而,在一些实施例中,数字许可105可以在电子钱包上配置,并且数字证书115可以在用户装置104上的验证机构应用程序上配置。According to various embodiments, the verification authority 102 may provide a mobile application (eg, a software application, an "app") on the user device 104. Digital licenses 105 and digital certificates 115 can be configured on the mobile application rather than on the e-wallet. Alternatively, as described above, the digital license 105 and digital certificate 115 may be configured on the electronic wallet of the user device 104. However, in some embodiments, the digital license 105 may be configured on the electronic wallet and the digital certificate 115 may be configured on the verification authority application on the user device 104 .
图2示出根据各种实施例的用于发行和验证数字许可的另一图。发行机构202可以由验证机构206审查(例如,认证、验证)。根据示例性实施例,数字许可可以是移动驾驶执照(mDL)。因此,图2可以说明生成和/或验证由用户和/或mDL提供给依赖方216的用户的mDL数据的方法。使用由mDL和依赖方216持有的先前配置的数据(例如,IA证书、mDL证书、CA公钥)以便执行用户个人数据的离线验证。本领域的普通技术人员将理解,mDL的使用仅用于说明性目的,并且不应被解释为限制性的。图2中所示的流程200可以应用于其它数字许可,包括但不限于疫苗接种护照、普通护照、医疗处方、娱乐执照、娱乐许可证、选民登记确认、进入建筑物的身份证件。Figure 2 shows another diagram for issuance and verification of digital licenses in accordance with various embodiments. Issuing authority 202 may be audited (eg, certified, verified) by verification authority 206 . According to an exemplary embodiment, the digital license may be a mobile driving license (mDL). Accordingly, FIG. 2 may illustrate a method of generating and/or validating the user's mDL data provided by the user and/or the mDL to the relying party 216 . Use previously configured data held by the mDL and relying party 216 (eg, IA certificate, mDL certificate, CA public key) in order to perform offline verification of the user's personal data. One of ordinary skill in the art will understand that the use of mDL is for illustrative purposes only and should not be construed as limiting. The process 200 shown in Figure 2 can be applied to other digital permissions, including but not limited to vaccination passports, ordinary passports, medical prescriptions, entertainment licenses, entertainment licenses, voter registration confirmations, and identification documents to enter buildings.
在步骤1,所审查的发行机构202可以生成IA公私钥对。在步骤2,发行机构202可以将证书请求204发送到验证机构206,请求验证机构206为由发行机构202发行的数字许可生成证书(例如,数字证书)。证书请求204可以包括IA公钥。在步骤3,验证机构206可以审查从发行机构202接收到的证书请求204,确认发行机构是经过审查/认证的,并且使用CA私钥对所提供的信息(例如,IA公钥)进行数字签名,从而生成数字证书208。例如,可以使用椭圆曲线密码术来生成CA公私钥对。验证机构206可以将CA公私钥对(或至少CA私钥)存储在由验证机构206管理的安全数据库中。验证机构206将CA公钥的副本提供给依赖方216。例如,验证机构206可以在依赖方216的计算机上配置CA公钥,以便依赖方216安全地存储CA公钥。替代地,验证机构206可以将CA公钥存储在可由依赖方216访问的云存储装置处。In step 1, the issuing authority 202 under review may generate an IA public and private key pair. At step 2, the issuing authority 202 may send a certificate request 204 to the verification authority 206, requesting the verification authority 206 to generate a certificate (eg, a digital certificate) for the digital license issued by the issuing authority 202. Certificate request 204 may include the IA public key. At step 3, the verification authority 206 may review the certificate request 204 received from the issuing authority 202, confirm that the issuing authority is vetted/certified, and digitally sign the provided information (e.g., IA public key) using the CA private key , thereby generating a digital certificate 208. For example, elliptic curve cryptography can be used to generate a CA public and private key pair. The verification authority 206 may store the CA public and private key pairs (or at least the CA private keys) in a secure database managed by the verification authority 206 . The verification authority 206 provides a copy of the CA's public key to the relying party 216 . For example, the verification authority 206 may configure the CA public key on the relying party 216's computer so that the relying party 216 securely stores the CA public key. Alternatively, the verification authority 206 may store the CA public key at a cloud storage device accessible by the relying party 216 .
验证机构206可以将数字证书208返回给发行机构202。在步骤4,发行机构202从验证机构206接收数字证书208。在步骤5,发行机构202生成数字许可210(或检取先前生成的数字许可),用数字证书208使数字许可210个性化。例如,发行机构202使从验证机构206接收的数字证书208与由发行机构202生成的数字许可210相关联。发行机构202接着在用户装置212上配置数字许可210与数字证书208。根据各种实施例,用户装置可以是移动电话或智能装置(例如,智能卡、智能手机等)。在步骤6,用户经由用户装置212将数字许可210和数字证书208呈现给依赖方216的终端。依赖方216检取CA公钥以解密数字证书208并检取IA公钥,从而认证发行机构202。然后,依赖方216可以使用IA公钥检取数字许可210中的数据。因此,依赖方216可以相信由发行机构202发行的数字许可210的真实性。Verifying authority 206 may return digital certificate 208 to issuing authority 202. At step 4, issuing authority 202 receives digital certificate 208 from verification authority 206. In step 5, the issuing authority 202 generates a digital license 210 (or retrieves a previously generated digital license) and personalizes the digital license 210 with a digital certificate 208. For example, the issuing authority 202 associates the digital certificate 208 received from the verification authority 206 with the digital license 210 generated by the issuing authority 202 . Issuing authority 202 then configures digital license 210 and digital certificate 208 on user device 212. According to various embodiments, the user device may be a mobile phone or a smart device (eg, smart card, smartphone, etc.). At step 6, the user presents the digital license 210 and the digital certificate 208 to the relying party's 216 terminal via the user device 212. The relying party 216 retrieves the CA public key to decrypt the digital certificate 208 and retrieve the IA public key, thereby authenticating the issuing authority 202 . The relying party 216 can then retrieve the data in the digital license 210 using the IA public key. Therefore, the relying party 216 can trust the authenticity of the digital license 210 issued by the issuing authority 202.
例如,依赖方216可以是在向用户提供商品或服务之前需要检查用户的年龄的商家。当用户将用户装置呈现给依赖方的终端时,移动驾驶执照将数字证书(由验证机构206生成,且包括经数字签名的IA公钥)发送至依赖方计算机。数字证书可以具有任何合适的格式,例如X.509格式,所述格式尤其包括证书版本号、序列号、发行方名称、有效期、属主公钥信息和签名。For example, relying party 216 may be a merchant that needs to check a user's age before providing goods or services to the user. When the user presents the user device to the relying party's terminal, the mobile driver's license sends a digital certificate (generated by the verification authority 206 and including the digitally signed IA public key) to the relying party computer. The digital certificate may have any suitable format, such as the X.509 format, which includes, inter alia, the certificate version number, serial number, issuer name, validity period, owner public key information and signature.
依赖方计算机可以(例如,通过卡上的标识符)检测移动驾驶执照与验证机构206相关联,并检取CA公钥。依赖方计算机可以使用CA公钥来验证IA公钥已由CA私钥签名。然后,依赖方计算机从数字证书中提取IA公钥,并且可以验证数字许可已使用IA的私钥签名。如果验证成功,则依赖方计算机现在可以相信发行机构202是合法的,因为它已经由可信验证机构206认证。在某些情况下,依赖方计算机还可以联系验证机构206以确定数字证书的详细信息是否仍然有效。The relying party computer can detect (eg, via an identifier on the card) that the mobile driver's license is associated with the verification authority 206 and retrieve the CA public key. The relying party computer can use the CA public key to verify that the IA public key was signed by the CA private key. The relying party computer then extracts the IA public key from the digital certificate and can verify that the digital license was signed with the IA's private key. If the verification is successful, the relying party computer can now trust that the issuing authority 202 is legitimate because it has been certified by the trusted verification authority 206 . In some cases, the relying party computer may also contact the verification authority 206 to determine whether the details of the digital certificate are still valid.
在一些实施例中,用户装置或用户装置上的应用程序可以使用mDL数据(例如,姓名、到期日期、IA签名信息),其可以通过行业标准手段(例如,ISO 18013-5),例如通过用户凭证私钥来加密,以在交易需要的情况下创建动态签名(例如,使用mDL私钥)并将签名发送至依赖方。动态签名是仅对单个认证有效的签名,以保护用户免受数据克隆的影响。In some embodiments, the user device or an application on the user device may use mDL data (e.g., name, expiration date, IA signature information), which may be through industry standard means (e.g., ISO 18013-5), such as through The user credentials are encrypted with the private key to create a dynamic signature if required for the transaction (for example, using the mDL private key) and send the signature to the relying party. Dynamic signatures are signatures that are only valid for a single certificate to protect users from data cloning.
图3示出图1和2中描述的各方之间的信任链。可使用公钥算法来验证不同方之间的信息。依赖方300(例如,商家、过境终端运营商)信任验证机构302(例如,第三方),并且存储或以其它方式访问将在稍后交易期间检取的CA验证公钥。因此,信任链的验证机构302和依赖方300信任发行机构304(例如,医疗服务提供者、发行标识的政府实体)。根据各种实施例,验证机构302可以审查发行机构304以确保发行机构304是合法的。因为是其发行方,所以发行机构304相信数字许可306,因此,依赖方300能够相信数字许可306。此信任链允许依赖方300相信通过数字许可306提供的数据是合法的。因此,依赖方300可以通过遵循本文关于至少图1和2描述的过程来相信数字许可306,而无需在线连接到发行机构304。Figure 3 shows the chain of trust between the parties described in Figures 1 and 2. Public key algorithms can be used to authenticate messages between different parties. Relying party 300 (eg, merchant, transit terminal operator) trusts verification authority 302 (eg, third party) and stores or otherwise has access to the CA verification public key that will be retrieved later during the transaction. Therefore, the verifying authority 302 and the relying party 300 of the chain of trust trust the issuing authority 304 (eg, healthcare provider, government entity that issued the identity). According to various embodiments, the verification authority 302 may review the issuing authority 304 to ensure that the issuing authority 304 is legitimate. The issuing authority 304 trusts the digital license 306 because it is its issuer, and therefore the relying party 300 can trust the digital license 306 . This chain of trust allows the relying party 300 to trust that the data provided via the digital license 306 is legitimate. Therefore, the relying party 300 can trust the digital license 306 by following the process described herein with respect to at least FIGS. 1 and 2 without requiring an online connection to the issuing authority 304 .
验证机构可以任何合适方式认证发行机构并且为发行机构提供担保。例如,验证机构可以使用如图4A所示的私钥基础设施(PKI)模型。在一些实施例中,验证机构可以使用如图4B所示的主列表模型。The certification authority may certify and vouch for the issuing institution in any appropriate manner. For example, the verification authority may use the private key infrastructure (PKI) model shown in Figure 4A. In some embodiments, the verification authority may use a master list model as shown in Figure 4B.
图4A示出根据各种实施例的验证机构私钥基础设施(PKI)模型400。全球有大量发行机构402、404、406(例如,州DMV;国家、州或地方政府;国家或地方医疗服务提供者等)。如果没有本文所述的实施例提供的益处,依赖方414将必须保持所有合法发行机构402、404、406及其公钥IA1、IA2、IA3的连续最新列表,同时将非法密钥保持在列表之外,这是一项昂贵且困难的任务。使用PKI解决方案,依赖方414将只需要维持与单个全球可信验证机构410而不是所有发行机构的更新连接。Figure 4A illustrates a certification authority private key infrastructure (PKI) model 400 in accordance with various embodiments. There are a large number of issuing agencies 402, 404, 406 around the world (e.g., state DMVs; national, state, or local governments; national or local health care providers, etc.). Without the benefits provided by the embodiments described herein, the relying party 414 would have to maintain a continuously up-to-date list of all legitimate issuers 402, 404, 406 and their public keys IA1, IA2, IA3, while keeping illegal keys on the list. Additionally, this is an expensive and difficult task. Using a PKI solution, the relying party 414 will only need to maintain an updated connection to a single global trusted verification authority 410 rather than all issuing authorities.
全球可信验证机构410具有私公钥对。验证机构与合法的发行机构进行交互,并验证/认证其合法性。然后,验证机构可以接收经过认证的发行机构的IA公钥,并用CA私钥对IA公钥进行签名,从而为发行机构生成数字证书408。验证机构410可以将数字证书408发送至对应发行机构402、404、406,然后所述对应发行机构使数字证书408与由对应发行机构402、404、406生成的数字许可相关联。例如,当日本的汽车租赁代理(作为示例性依赖方414)希望验证美国密苏里州发行的数字驾驶执照的真实性时,汽车租赁代理将使用由验证机构410与汽车租赁代理共享的全球可信CA公钥412验证与数字驾驶执照相关联的数字证书,从而允许汽车租赁代理以加密安全的方式信任发行机构402、404、406。The global trusted verification authority 410 has a private and public key pair. Verification authorities interact with legitimate issuers and verify/certify their legitimacy. The verification authority may then receive the certified issuing authority's IA public key and sign the IA public key with the CA private key, thereby generating a digital certificate 408 for the issuing authority. The verification authority 410 may send the digital certificate 408 to the corresponding issuing authority 402, 404, 406, which then associates the digital certificate 408 with the digital license generated by the corresponding issuing authority 402, 404, 406. For example, when a car rental agent in Japan (as the example relying party 414) wishes to verify the authenticity of a digital driver's license issued by the state of Missouri in the United States, the car rental agent will use a globally trusted CA shared with the car rental agent by the verification authority 410 The public key 412 verifies the digital certificate associated with the digital driver's license, allowing the car rental agent to trust the issuing authority 402, 404, 406 in a cryptographically secure manner.
全球可信验证机构410使用PKI计划验证发行机构402、404、406为合法的,增加了国内和全球范围和信任,并允许依赖方414根据数字许可相信发行机构402、404、406的合法性。在未正确审查发行机构的情况下(例如,欺诈发行机构416),验证机构410可以拒绝对IA公钥签名并生成未认证的发行机构416的数字证书。依赖方414仅必须维持与中央验证机构410而不是数百个发行机构402、404、406的连接。发行机构402、404、406受益于减少欺诈和增加接受其发行的数字许可。与本地化系统相比,用户可在广泛多个地区使用其数字许可。The Global Trusted Verification Authority 410 uses a PKI scheme to verify that the issuing authority 402, 404, 406 is legitimate, increasing domestic and global reach and trust, and allowing relying parties 414 to trust the legitimacy of the issuing authority 402, 404, 406 based on the digital license. In the event that the issuing authority is not properly vetted (eg, fraudulent issuing authority 416), the validating authority 410 may refuse to sign the IA public key and generate a digital certificate for the uncertified issuing authority 416. The relying party 414 must only maintain a connection to a central verification authority 410 rather than hundreds of issuing authorities 402, 404, 406. Issuing institutions 402, 404, 406 benefit from reduced fraud and increased acceptance of digital licenses issued by them. In contrast to localized systems, users can use their digital licenses in a wide variety of regions.
图4B示出根据各种实施例的主列表模型450。在主列表模型450中,所有发行机构452、454、456将其公钥462、464、466存储在主列表460上,所述主列表可存储在远程服务器上(例如,云上)。主列表分发器(例如,验证机构470)接着可以使用主列表分发器私钥对主列表(而不是每个单独的IA公钥462、464、466)进行签名。然后,依赖方480使用主列表分发器公钥检查主列表460是否真实,并从主列表460检取相关IA公钥462、464、466。根据主列表模型,数字证书与数字许可不相关。相反,主列表分发器认证IA公钥的主列表460。主列表模型可适用于发行机构不允许例如验证机构470等第三方修改或验证数字许可的情况。根据各种实施例,全球覆盖可能需要多个主列表分发器。主列表分发器必须实施强有力、一致和可扩展的控制和管治,以验证每个自助签名发行机构的合法性并防止密钥欺骗(例如,防止欺诈发行机构474在主列表460中插入欺诈IA公钥472)。Figure 4B illustrates a master list model 450 in accordance with various embodiments. In the master list model 450, all issuing authorities 452, 454, 456 store their public keys 462, 464, 466 on a master list 460, which may be stored on a remote server (eg, on the cloud). The master list distributor (eg, verification authority 470) may then sign the master list (rather than each individual IA public key 462, 464, 466) using the master list distributor private key. The relying party 480 then checks whether the master list 460 is authentic using the master list distributor public key, and retrieves the relevant IA public keys 462, 464, 466 from the master list 460. According to the master list model, digital certificates are not related to digital licenses. Instead, the master list distributor certifies the master list 460 of IA public keys. The master list model may be applicable where the issuing authority does not allow third parties, such as the verification authority 470, to modify or verify the digital license. According to various embodiments, global coverage may require multiple master list distributors. Master list distributors must implement strong, consistent, and scalable controls and governance to verify the legitimacy of each self-signing issuer and prevent key spoofing (e.g., to prevent fraudulent issuers 474 from inserting fraud into the master list 460 IA public key 472).
图5示出根据各种实施例的数字许可的示例性用例。根据示例性用例,数字许可可以包括由发行机构(例如,本地医疗服务提供者)在用户装置500上配置的移动疫苗接种卡502(例如,数字疫苗接种护照)。本地医疗服务提供者可以验证用户的身份,接种所需的疫苗,并向用户的用户装置500发行移动疫苗接种卡502(mVC)。mVC 502可以包括各种信息,包括但不限于用户标识信息(例如,用户姓名、用户出生日期、用户照片)、疫苗标识信息(例如,制造商、批号、序列号、施用日期、剂量编号、成分)。本地医疗服务提供者可以使用IA私钥对mVC 502进行签名。验证机构可以验证并建立与本地医疗服务供应商的安全通信。验证机构接着可验证本地医疗服务提供者,且可使用CA私钥对本地医疗服务提供者的IA公钥进行签名。验证机构可以生成数字证书,并将数字证书提供到本地医疗服务提供者,以如与mVC 502相关联的那样在用户装置500上配置。替代地,验证机构可以用由验证机构生成的数字证书更新在用户装置500上配置的mVC 502。根据各种实施例,验证机构可以提供数字许可的移动应用程序。在一些实施例中,数字许可(和由验证机构发行的相关联数字证书)可以在用户装置的数字钱包上配置。Figure 5 illustrates an exemplary use case for digital licensing in accordance with various embodiments. According to an exemplary use case, the digital license may include a mobile vaccination card 502 (eg, a digital vaccination passport) configured on the user device 500 by an issuing authority (eg, a local healthcare provider). The local healthcare provider can verify the user's identity, administer the required vaccinations, and issue a mobile vaccination card 502 (mVC) to the user's user device 500. mVC 502 may include a variety of information, including, but not limited to, user identification information (e.g., user name, user date of birth, user photo), vaccine identification information (e.g., manufacturer, lot number, serial number, date of administration, dose number, ingredients ). Local healthcare providers can sign the mVC 502 using the IA private key. Authentication authorities can authenticate and establish secure communications with local healthcare providers. The verification authority can then authenticate the local healthcare provider and can use the CA private key to sign the local healthcare provider's IA public key. The verification authority may generate a digital certificate and provide the digital certificate to the local healthcare provider for configuration on user device 500 as associated with mVC 502 . Alternatively, the verification authority may update the mVC 502 configured on the user device 500 with the digital certificate generated by the verification authority. According to various embodiments, the verification authority may provide a digitally licensed mobile application. In some embodiments, the digital license (and associated digital certificate issued by the verification authority) may be configured on the user's device's digital wallet.
验证机构可与依赖方共享CA公钥。验证机构还可以根据需要向依赖方提供移动验证应用程序。当用户将其mVC呈现给依赖方时,依赖方可以使用CA公钥通过检取IA公钥来认证本地医疗服务提供者,并且接着可以使用IA公钥检取和验证存储在mVC 502上的信息。依赖方可以使用相同的移动验证应用程序来验证多个用户的mVC。The certification authority can share the CA public key with the relying party. Verification authorities may also provide mobile verification applications to relying parties upon request. When a user presents their mVC to the relying party, the relying party can use the CA public key to authenticate the local healthcare provider by retrieving the IA public key, and can then use the IA public key to retrieve and verify the information stored on the mVC 502 . Relying parties can use the same mobile verification application to verify mVC for multiple users.
如图5所示,用户可以选择将与依赖方共享的信息的类型、级别和内容。例如,用户可以选择是与依赖方发布所有数据504还是数据的子集506。用户可以根据依赖方的身份决定共享哪些信息。例如,在海关检查点共享所有数据可能是适当的,但作为进入餐厅的条件仅发布最小数据可能就足够了。依赖方的移动应用程序510可以从用户装置接收信息(例如,通过读取机器可读码512)。As shown in Figure 5, users can select the type, level and content of information that will be shared with relying parties. For example, the user may choose whether to publish all data 504 or a subset of the data 506 with the relying party. Users can decide what information is shared based on the identity of the relying party. For example, sharing all data at a customs checkpoint may be appropriate, but publishing only minimal data as a condition of entry to a restaurant may be sufficient. The relying party's mobile application 510 may receive information from the user device (eg, by reading the machine-readable code 512 ).
图6示出根据各种实施例的步骤的流程图。在步骤S608,验证机构600可以与依赖方606共享CA公钥。如上文所解释,验证机构600可以将CA公钥直接发送至依赖方606。否则,验证机构600可以将CA公钥存储在可由依赖方606访问的云存储装置处。Figure 6 shows a flowchart of steps according to various embodiments. In step S608, the verification authority 600 may share the CA public key with the relying party 606. As explained above, the verification authority 600 can send the CA public key directly to the relying party 606. Otherwise, the verification authority 600 may store the CA public key at a cloud storage device accessible by the relying party 606.
发行机构可以从验证机构600请求证书。所述请求可以包括IA公钥。作为认证发行机构的一部分,验证机构600可以与发行机构交互以收集和验证关于发行机构的信息。例如,验证机构600可以使用一组认证步骤来认证发行机构。在一些实施例中,验证机构600可以首先标识发行机构的身份。然后,验证机构600可以基于发行机构的身份或发行机构发行的验证的类型来确定一组认证步骤。验证机构600可以基于与发行机构相关联的一组认证步骤认证发行机构。根据各种实施例,可以执行第一组认证步骤以认证第一发行机构(例如,政府实体),并且执行不同于第一组认证步骤的第二组认证步骤以认证第二发行机构(例如,本地医疗服务提供者)。The issuing authority may request a certificate from the certification authority 600. The request may include the IA public key. As part of a certification issuer, the verification authority 600 can interact with the issuer to collect and verify information about the issuer. For example, the verification authority 600 may use a set of certification steps to certify the issuing authority. In some embodiments, the verification authority 600 may first identify the issuing authority. Verification authority 600 may then determine a set of authentication steps based on the identity of the issuing authority or the type of verification issued by the issuing authority. Verification authority 600 may authenticate an issuing authority based on a set of authentication steps associated with the issuing authority. According to various embodiments, a first set of authentication steps may be performed to authenticate a first issuing authority (e.g., a government entity), and a second set of authentication steps, different from the first set of authentication steps, may be performed to authenticate a second issuing authority (e.g., local healthcare provider).
验证机构600可以生成与发行机构相关联的数字证书,并且将数字证书发送到接收方以使数字证书与由发行机构生成的数字许可相关联。接收方可以是发行机构。数字证书包括使用CA私钥进行数字签名的经数字签名的IA公钥。例如,验证机构600可以将经数字签名的IA公钥嵌入数字证书中。The verification authority 600 may generate a digital certificate associated with the issuing authority and send the digital certificate to the recipient to associate the digital certificate with the digital license generated by the issuing authority. The recipient can be the issuing institution. A digital certificate includes a digitally signed IA public key digitally signed using the CA private key. For example, the verification authority 600 may embed the digitally signed IA public key into the digital certificate.
发行机构使数字证书与由发行机构生成的数字许可相关联。发行机构向用户装置604配置(或以其它方式发送)与数字证书相关联的数字许可。The issuing authority associates the digital certificate with the digital license generated by the issuing authority. The issuing authority configures (or otherwise sends) the digital license associated with the digital certificate to the user device 604.
在任选步骤S615,在与第三方(例如,依赖方606)共享数字许可之前,用户装置604(经由存储在用户装置604上的软件应用程序)可以用私钥(例如,数字许可应用程序私钥)对数字许可和数字证书进行签名。也就是说,用户装置604可以生成动态签名。At optional step S615, prior to sharing the digital license with a third party (e.g., relying party 606), user device 604 (via a software application stored on user device 604) may use the private key (e.g., digital license application) to key) to sign digital licenses and digital certificates. That is, user device 604 can generate dynamic signatures.
在步骤S616,用户装置604可以将数字许可与数字证书一起发送到依赖方606。数字许可与验证机构使用CA私钥签名的数字证书相关联(例如,包括所述数字证书),所述CA私钥与CA公钥配对。如上所述,依赖方606可能已经接收到(或以其它方式检取)CA公钥。At step S616, the user device 604 may send the digital license together with the digital certificate to the relying party 606. A digital license is associated with (eg, includes the digital certificate) a digital certificate signed by a verification authority using a CA private key, which is paired with a CA public key. As discussed above, the relying party 606 may have received (or otherwise retrieved) the CA public key.
在步骤S618,依赖方606可以使用CA公钥验证(例如,解密)数字证书,并从解密的数字证书中检取IA公钥。At step S618, the relying party 606 may verify (eg, decrypt) the digital certificate using the CA public key and retrieve the IA public key from the decrypted digital certificate.
在任选步骤S620,依赖方606可以使用数字许可应用程序公钥提取数字许可。At optional step S620, the relying party 606 may extract the digital license using the digital license application public key.
在步骤S622,依赖方606可以使用IA公钥检取和验证数字许可中包含的信息。依赖方可以在验证机构验证发行机构的签名以及数字许可中包含的信息。根据各种实施例,数字许可中所含信息的详细程度可以取决于依赖方606的身份。At step S622, the relying party 606 may retrieve and verify the information contained in the digital license using the IA public key. Relying parties can verify the issuing authority's signature and the information contained in the digital license at the verification authority. According to various embodiments, the level of detail of the information contained in the digital license may depend on the identity of the relying party 606.
如上所述,数字证书和数字许可存储或安装在移动装置上。在一些实施例中,移动装置可以允许用户获得对位置或安全数据的访问。示例性移动装置可以包括可以存在于移动装置的主体内的计算机可读介质。计算机可读介质可以呈存储数据的存储器的形式。在某些情况下,存储器还可以存储例如与数字证书相关联的数字许可的信息。通常,可以使用任何合适的方法,包括使用天线或非接触式元件,由移动装置将这些信息中的任一个发送到另一装置。主体可以采用塑料基板、外壳或其它结构的形式。As mentioned above, digital certificates and digital licenses are stored or installed on the mobile device. In some embodiments, a mobile device may allow a user to gain access to location or security data. An example mobile device may include computer-readable media that may be present within the body of the mobile device. Computer-readable media may be in the form of memory that stores data. In some cases, the memory may also store information such as digital licenses associated with digital certificates. Generally, any of this information may be transmitted from a mobile device to another device using any suitable method, including the use of antennas or contactless elements. The body may take the form of a plastic substrate, housing or other structure.
在一些实施例中,移动装置还可以包括非接触式元件,其通常以半导体芯片(或其它数据存储元件)的形式实现,具有相关联的无线传送(例如,数据发送)元件,诸如天线。非接触式元件可以耦合到移动装置(例如,嵌入所述移动装置中),并且经由蜂窝网络发送的数据或控制指令可以借助于非接触式元件接口(未示出)应用于非接触式元件。非接触式元件可能能够使用短程无线通信能力传送和接收数据。移动装置可以包括用于接收和发送数据的组件。因此,移动装置可能能够经由蜂窝网络(或任何其它合适的无线网络——例如,因特网或其它数据网络)和短程通信而传送和发送数据或控制指令。In some embodiments, the mobile device may also include a contactless element, typically implemented in the form of a semiconductor chip (or other data storage element), with associated wireless transmission (eg, data transmission) elements, such as an antenna. The contactless element may be coupled to (eg, embedded in) the mobile device, and data or control instructions sent via the cellular network may be applied to the contactless element via a contactless element interface (not shown). Contactless elements may be able to transmit and receive data using short-range wireless communication capabilities. Mobile devices may include components for receiving and sending data. Thus, a mobile device may be able to communicate and send data or control instructions via a cellular network (or any other suitable wireless network—eg, the Internet or other data network) and short-range communications.
移动装置还可以包括用于处理移动装置的功能的处理器(例如,微处理器)以及允许消费者看见电话号码以及其它信息和消息的显示器。移动装置还可以包括允许用户将信息输入到装置中的输入元件、允许用户听到语音通信、音乐等的扬声器,允许用户通过移动装置发送其语音的麦克风,以及用于拍照或扫描机器可读代码的摄像头。移动装置还可以包括用于无线数据传送(例如,数据发送)的天线。The mobile device may also include a processor (eg, a microprocessor) for processing the functionality of the mobile device and a display that allows the consumer to see the phone number and other information and messages. The mobile device may also include input elements that allow the user to enter information into the device, speakers that allow the user to hear voice communications, music, etc., a microphone that allows the user to send his or her voice through the mobile device, and for taking photos or scanning machine-readable codes camera. Mobile devices may also include antennas for wireless data transmission (eg, data transmission).
存储器可以呈使用任何合适的数据存储模式的一个或多个存储器装置(例如,RAM、EEPROM、ROM芯片)的形式。在一些实施例中,移动装置中的存储器还可以包括用于存储敏感数据的安全存储区域,所述敏感数据例如与数字证书相关联的数字许可。例如,存储器可以是安全元件的部分或可含有安全元件。Memory may be in the form of one or more memory devices (eg, RAM, EEPROM, ROM chips) using any suitable data storage mode. In some embodiments, memory in the mobile device may also include a secure storage area for storing sensitive data, such as digital licenses associated with digital certificates. For example, the memory may be part of the secure element or may contain the secure element.
根据各种实施例的计算机(例如,验证机构计算机)包括处理器和存储器。网络接口和非瞬态计算机可读介质可耦合到处理器。A computer (eg, a verification authority computer) according to various embodiments includes a processor and memory. A network interface and non-transitory computer-readable media may be coupled to the processor.
处理器可实施为一个或多个集成电路(例如,一个或多个单核或多核微处理器和/或微控制器)。处理器可响应于存储在计算机可读介质中的程序代码或计算机可读代码而执行多种程序。处理器可包括维持多个同时执行的程序或过程的功能。存储器可以存储可由处理器执行的多个应用程序,以及由计算机生成的公/私钥对。A processor may be implemented as one or more integrated circuits (eg, one or more single or multi-core microprocessors and/or microcontrollers). The processor may execute various programs in response to program code or computer-readable code stored in a computer-readable medium. A processor may include functionality to maintain multiple concurrently executing programs or processes. The memory may store multiple application programs executable by the processor, as well as public/private key pairs generated by the computer.
网络接口可被配置成连接到一个或多个通信网络,以允许计算机与其它实体(例如,外部计算机、发行机构计算机、依赖方计算机、用户装置)通信。网络接口的一些示例可包括调制解调器、物理网络接口(诸如以太网卡或其它网络接口卡(NIC))、虚拟网络接口、通信端口、个人计算机存储卡国际协会(PCMCIA)插槽和卡等。由网络接口启用的无线协议可以包括Wi-FiTM。经由网络接口传送的数据可以呈信号的形式,所述信号可以是电信号、电磁信号、光信号,或者能够由外部通信接口接收的任何其它信号(统称为“电子信号”或“电子消息”)。可经由通信路径或信道在网络接口与其它装置之间提供可包括数据或指令的这些电子消息。如上所述,可使用任何合适的通信路径或信道,诸如电线或电缆、光纤、电话线、蜂窝链路、射频(RF)链路、WAN或LAN网络、互联网,或任何其它合适的介质。A network interface may be configured to connect to one or more communications networks to allow the computer to communicate with other entities (eg, external computers, issuing authority computers, relying party computers, user devices). Some examples of network interfaces may include modems, physical network interfaces such as Ethernet cards or other network interface cards (NICs), virtual network interfaces, communication ports, Personal Computer Memory Card International Association (PCMCIA) slots and cards, and the like. Wireless protocols enabled by the network interface may include Wi-Fi ™ . Data transmitted via a network interface may be in the form of signals, which may be electrical signals, electromagnetic signals, optical signals, or any other signals capable of being received by an external communications interface (collectively, "electronic signals" or "electronic messages") . These electronic messages, which may include data or instructions, may be provided between the network interface and other devices via a communication path or channel. As noted above, any suitable communications path or channel may be used, such as wire or cable, fiber optics, telephone lines, cellular links, radio frequency (RF) links, WAN or LAN networks, the Internet, or any other suitable medium.
计算机可读介质可包括用于存储和/或发送的一个或多个非瞬态介质。合适的介质包括例如随机访问存储器(RAM);只读存储器(ROM);磁性介质,诸如硬盘驱动器;或光学介质,诸如CD(光盘)或DVD(数字多用光盘);快闪存储器等。计算机可读介质可以是此类存储或发送装置的任何组合。可通过任何数目的非易失性存储器(例如,快闪存储器)和易失性存储器(例如,DRAM、SRAM)或任何其它非瞬态存储介质或介质的组合来体现计算机可读介质。Computer-readable media may include one or more non-transitory media for storage and/or transmission. Suitable media include, for example, random access memory (RAM); read only memory (ROM); magnetic media, such as a hard drive; or optical media, such as a CD (Compact Disc) or DVD (Digital Versatile Disc); flash memory, etc. Computer-readable media can be any combination of such storage or transmission devices. Computer-readable media may be embodied by any number of non-volatile memory (eg, flash memory) and volatile memory (eg, DRAM, SRAM), or any other non-transitory storage medium or combination of media.
根据各种实施例,计算机可读介质可以存储指令,所述指令当由处理器执行时使所述处理器:认证发行机构;从发行机构接收发行机构公钥;使用验证机构的私钥对发行机构公钥进行数字签名;生成与发行机构相关联的数字证书,其中所述数字证书包括经数字签名的发行机构公钥;将数字证书发送到接收方,以使所述数字证书与由发行机构生成的数字许可相关联;以及与一方或多方共享验证机构公钥,所述一方或多方适于从数字许可的持有人接收数字许可和相关联数字证书。According to various embodiments, a computer-readable medium may store instructions that, when executed by a processor, cause the processor to: certify an issuing authority; receive an issuing authority public key from the issuing authority; use the certifying authority's private key to authenticate an issuing authority digitally signing with the authority's public key; generating a digital certificate associated with the issuing authority, wherein the digital certificate includes the digitally signed issuing authority's public key; sending the digital certificate to the recipient such that the digital certificate is identical to the one issued by the issuing authority associating the generated digital license; and sharing the certification authority public key with one or more parties adapted to receive the digital license and associated digital certificate from the holder of the digital license.
实施例提供各种优点。根据各种实施例,在移动钱包配置期间也可以使用在用户装置上配置的数字许可。数字许可可用于在用户装置上配置账户期间匹配账户持有人和装置持有人数据,因此限制在用户装置上配置令牌和欺诈信息的可能性。在一些实施例中,数字许可可用于验证账户或贷款应用程序并将其与提交者链接,从而减少使用被盗身份进行欺诈的机会。在其它实施例中,数字许可和商家认证过程允许年龄验证自动化,并且减少非法/非法购买和活动的数量,例如,与购买酒精和烟草;进入酒吧、俱乐部、赌场;车辆租赁等有关的活动。数字许可还可用于航空业,以将装置所有者与其移动装置上的登机文档链接,以及简化传统的ID验证过程并减少旅行中使用欺诈性ID。公证人有责任确保每个签字人的身份,如果未能如此行事,可能会承担民事或刑事责任。数字许可提供了验证文件并将其与其持有人更紧密地联系的机会,从而消除了公证风险并减少了欺诈信息的公证。其它用例包括安全建筑物访问、交通拦截、工作资格验证、处方和药物采购、选民登记、政府计划、娱乐执照和许可证。Embodiments provide various advantages. According to various embodiments, digital permissions configured on the user device may also be used during mobile wallet configuration. Digital permissions can be used to match account holder and device holder data during account provisioning on the user's device, thus limiting the potential for tokens and fraudulent information to be provisioned on the user's device. In some embodiments, digital permissions can be used to authenticate accounts or loan applications and link them to the submitter, thereby reducing the opportunity for fraud using stolen identities. In other embodiments, digital licensing and merchant authentication processes allow age verification to be automated and reduce the number of illicit/illicit purchases and activities, e.g., activities related to purchasing alcohol and tobacco; entering bars, clubs, casinos; vehicle rentals, etc. Digital permissions can also be used in the airline industry to link device owners with boarding documents on their mobile devices, as well as simplify the traditional ID verification process and reduce the use of fraudulent IDs during travel. It is the Notary's responsibility to ensure the identity of each signatory and failure to do so may result in civil or criminal liability. Digital licensing provides the opportunity to authenticate documents and link them more closely to their holders, thereby eliminating notarization risks and reducing the notarization of fraudulent information. Other use cases include secure building access, traffic stops, job eligibility verification, prescription and medication procurement, voter registration, government programs, recreational licenses and permits.
本申请中描述的任何软件组件或函数可实施为使用例如Java、C、C++、C#、Objective-C、Swift的任何合适的计算机语言或例如Perl或Python的脚本语言使用例如常规的或面向对象的技术由处理器执行的软件代码。软件代码可以作为一系列指令或命令存储在计算机可读介质上以供存储和/或发送,合适的介质包括随机存取存储器(RAM)、只读存储器(ROM)、磁性介质(例如硬盘驱动器或软盘),或者光学介质(例如光盘(CD)或数字通用光盘(DVD))、闪存存储器,等等。计算机可读介质可以是此类存储装置或传输装置的任何组合。Any software component or function described in this application may be implemented using any suitable computer language such as Java, C, C++, C#, Objective-C, Swift or a scripting language such as Perl or Python using, for example, conventional or object-oriented Technology Software code executed by a processor. Software code may be stored as a sequence of instructions or commands on a computer-readable medium for storage and/or transmission. Suitable media include random access memory (RAM), read only memory (ROM), magnetic media (such as a hard drive or floppy disk), or optical media (such as a compact disk (CD) or digital versatile disk (DVD)), flash memory, etc. The computer-readable medium can be any combination of such storage devices or transmission devices.
此类程序还可使用适合通过符合各种协议的有线、光学和/或无线网络--包括互联网--传送的载波信号来编码和发送。由此,根据实施例的计算机可读介质可使用通过此类程序编码的数据信号产生。通过程序代码编码的计算机可读介质可与可兼容装置一起封装或与其它装置分开提供(例如通过互联网下载)。任何此类计算机可读介质可驻存在单个计算机产品(例如,硬盘驱动器、CD或整个计算机系统)之上或之内,并且可存在于系统或网络内的不同计算机产品之上或之内。计算机系统可以包括监视器、打印机,或用于向用户提供本文所提及的任何结果的其它合适的显示器。Such programs may also be encoded and sent using carrier signals suitable for transmission over wired, optical and/or wireless networks conforming to various protocols, including the Internet. Thus, computer-readable media according to embodiments may be produced using data signals encoded by such programs. Computer-readable media encoded with program code may be packaged with a compatible device or provided separately from other devices (eg, via download over the Internet). Any such computer-readable medium may reside on or within a single computer product (eg, a hard drive, a CD, or an entire computer system), and may exist on or within different computer products within a system or network. The computer system may include a monitor, printer, or other suitable display for providing the user with any of the results mentioned herein.
以上描述是说明性的且不是限制性的。本领域技术人员在阅读本公开后,会了解实施例的许多变化形式。因此,范围不应参考以上描述来确定,而是应参考待决的权利要求以及其完整范围或等同物来确定。The above description is illustrative and not restrictive. Those skilled in the art will appreciate many variations of the embodiments upon reading this disclosure. The scope, therefore, should be determined not with reference to the above description, but rather with reference to the appended claims, along with their full scope or equivalents.
在不脱离实施例的范围的情况下,来自任何实施例的一个或多个特征可以与任何其它实施例的一个或多个特征组合。One or more features from any embodiment may be combined with one or more features from any other embodiment without departing from the scope of the embodiments.
如本文所用,除非明确指示有相反的意思,否则使用“一个/种”或“所述”旨在表示“至少一个/种”。As used herein, use of "a" or "the" is intended to mean "at least one" unless expressly indicated to the contrary.
Claims (20)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311641996.XA CN117614631A (en) | 2021-07-23 | 2022-01-19 | Method and system for authenticating credentials |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US202163225313P | 2021-07-23 | 2021-07-23 | |
US63/225,313 | 2021-07-23 | ||
PCT/US2021/063703 WO2022133026A1 (en) | 2020-12-18 | 2021-12-16 | Method and system for authentication credential |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202311641996.XA Division CN117614631A (en) | 2021-07-23 | 2022-01-19 | Method and system for authenticating credentials |
Publications (2)
Publication Number | Publication Date |
---|---|
CN116349198A CN116349198A (en) | 2023-06-27 |
CN116349198B true CN116349198B (en) | 2023-12-22 |
Family
ID=86886248
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202180067717.6A Active CN116349198B (en) | 2021-07-23 | 2021-12-16 | Method and system for authenticating credentials |
CN202311641996.XA Pending CN117614631A (en) | 2021-07-23 | 2022-01-19 | Method and system for authenticating credentials |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202311641996.XA Pending CN117614631A (en) | 2021-07-23 | 2022-01-19 | Method and system for authenticating credentials |
Country Status (1)
Country | Link |
---|---|
CN (2) | CN116349198B (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107743067A (en) * | 2017-11-30 | 2018-02-27 | 美的智慧家居科技有限公司 | Awarding method, system, terminal and the storage medium of digital certificate |
CN110247884A (en) * | 2018-11-21 | 2019-09-17 | 浙江大华技术股份有限公司 | A kind of method, apparatus, system and the computer readable storage medium of more new authentication |
-
2021
- 2021-12-16 CN CN202180067717.6A patent/CN116349198B/en active Active
-
2022
- 2022-01-19 CN CN202311641996.XA patent/CN117614631A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107743067A (en) * | 2017-11-30 | 2018-02-27 | 美的智慧家居科技有限公司 | Awarding method, system, terminal and the storage medium of digital certificate |
CN110247884A (en) * | 2018-11-21 | 2019-09-17 | 浙江大华技术股份有限公司 | A kind of method, apparatus, system and the computer readable storage medium of more new authentication |
Also Published As
Publication number | Publication date |
---|---|
CN117614631A (en) | 2024-02-27 |
CN116349198A (en) | 2023-06-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12316784B2 (en) | Method and system for authentication credential | |
US20220286287A1 (en) | System And Method For Generating Trust Tokens | |
US12380441B2 (en) | Federated closed-loop system | |
US20240403878A1 (en) | Validation service for account verification | |
US12219069B1 (en) | Signcrypted biometric electronic signature tokens | |
US9160537B2 (en) | Methods for secure restoration of personal identity credentials into electronic devices | |
KR101863953B1 (en) | System and method for providing electronic signature service | |
EP4182829A1 (en) | Privacy-preserving identity attribute verification using policy tokens | |
US20190005470A1 (en) | Accredited certificate issuance system based on block chain and accredited certificate issuance method based on block chain using same, and accredited certificate authentication system based on block chain and accredited certificate authentication method based on block chain using same | |
JP4470071B2 (en) | Card issuing system, card issuing server, card issuing method and program | |
KR20160043075A (en) | Secure remote payment transaction processing using a secure element | |
GB2549118A (en) | Electronic payment system using identity-based public key cryptography | |
CN114365449A (en) | Preset method and system with message conversion | |
KR101480034B1 (en) | Method for providing financial service using qr security code | |
CN116349198B (en) | Method and system for authenticating credentials | |
US20250278732A1 (en) | Global relying party system for validating digital identity credentials | |
WO2025085220A1 (en) | Electronic identification verification for mobile device | |
WO2025071597A1 (en) | Tokenized interactions using electronic identifier | |
KR20230068569A (en) | Did authentication method using smart card and smart card device | |
EP4302212A1 (en) | Secure online authentication method using mobile id document | |
CN119586075A (en) | Authentication data verification |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |