Method for implementing authentication by entity authentication centre
An authentication center and authentication method technology, which is applied in user identity/authority verification and key distribution, can solve problems such as inconvenient billing, inability to adapt to business development, and inability to obtain derived keys
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0108] Embodiment 1, the service communication between the SS and the SP is realized by sending a service request message from the SS to the SP, Figure 4 It is a flow chart of Embodiment 1 of realizing service communication between SS and SP of the present invention, specifically including the following steps:
[0109] Step 400: the SS sends a service request message to the SP, and the service request message carries the temporary identity of the SS and the UID corresponding to the service applied by the SS.
[0110] In this step, assuming that the security level field storing the security level required by the SS is set in the temporary identity, the SS can search for the security level requirements corresponding to the requested service through the service security level list stored by itself, and find the security level that meets the security level. The temporary identity associated with the shared key Ks.
[0111] If the security level field is not set in the temporary ...
Embodiment 2
[0126] Embodiment 2, the service communication between SS and SP is realized by sending an authentication request message to EAC through SS, Figure 5 It is a flow chart of Embodiment 2 of implementing business communication between SS and SP in the present invention, specifically including the following steps:
[0127] Step 500: When the SS sends an authentication request message to the EAC, the authentication request message also carries the PID of the SS and the UID corresponding to the applied service.
[0128] The authentication request message may also carry authentication capability information of the service entity, that is, supported authentication modes.
[0129] Step 501: After receiving the authentication request message, the EAC queries the preset service security level list to obtain the security level corresponding to the received UID. If the temporary identity of the SP can be obtained through the information stored in association with the security level, it me...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 