Identification authentication method and system

An identity authentication and authentication request technology, applied in the field of information security, can solve the problems of limited storage space, cumbersome authentication process, time delay, etc., and achieve the effect of simplifying the identity authentication process, saving storage space overhead, and improving response speed

Inactive Publication Date: 2008-03-05
POTEVIO INFORMATION TECH
View PDF1 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] First of all, the validity verification of the certificate is based on the CRL stored in the portable storage device and terminal at that time, but neither the portable storage device nor the terminal can guarantee that the CRL stored in it is updated in real time, if the CRL at that time is not the latest , then the verified certificate validity result is inaccurate, so that the communication security between the portable storage device and the terminal cannot be reliably guaranteed
[0009] Secondly, during the authentication process, multiple and frequent information interactions are required between the portable storage device and the terminal, such as: interactively sending CRL issuance time information,

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identification authentication method and system
  • Identification authentication method and system
  • Identification authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0060] Example one

[0061] Taking the terminal to perform identity authentication on the portable storage device and the portable storage device is a mobile storage card (hereinafter referred to as a card) as an example, referring to FIG. 3, the identity authentication process in this embodiment mainly includes the following steps:

[0062] Step 301: The card sends an authentication request to the terminal, requesting the terminal to perform identity authentication on the card. The request information carried in the authentication request includes the card certificate.

[0063] Step 302: After receiving the authentication request sent by the card, the terminal sends a verification request to the CA. The request information carried in the verification request includes the card certificate.

[0064] Step 303: After receiving the verification request sent by the terminal, the CA verifies the validity of the card certificate carried in the verification request, and returns the verifi...

Example Embodiment

[0072] Example two

[0073] Taking the portable storage device to perform identity authentication on the terminal and the portable storage device is a mobile storage card (hereinafter referred to as a card) as an example, referring to FIG. 4, the identity authentication process in this embodiment mainly includes the following steps:

[0074] Step 401: The terminal sends an authentication request to the card, requesting the card to perform identity authentication on the terminal. The request information carried in the authentication request includes the terminal certificate.

[0075] Step 402: After receiving the authentication request sent by the terminal, the card sends a verification request to the CA through the terminal. The request information carried in the verification request includes the terminal certificate.

[0076] Step 403: After receiving the verification request sent by the card, the CA verifies the validity of the terminal certificate carried in the verification re...

Example Embodiment

[0093] Example three

[0094] Taking the mutual identity authentication between the portable storage device and the terminal, and the portable storage device being a mobile storage card (hereinafter referred to as a card) as an example, as shown in FIG. 5, the identity authentication process in this embodiment mainly includes the following two parts:

[0095] Steps 501 to 504: the process in which the terminal authenticates the card;

[0096] Step 505 to step 508: the process in which the card authenticates the terminal.

[0097] It should be noted that step 501 to step 504 and step 505 to step 508 are two different processes, and there is no strict sequence in time. The specific processing process of step 501 to step 504 is consistent with step 301 to step 304 in the first embodiment; the specific processing process of step 505 to step 508 is the same as that of step 401 to step 404 in the second embodiment, and will not be one by one here. Go into details.

[0098] When both par...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The method includes following steps: (1) after receiving authentication request carried by certificate of second party and sent from the second party, first party in portable type storage devices and terminals sends certificate of second party to center of authentication (CA) for digit certificate; (2) after receiving certificate of second party from the first party, CA authenticates whether the certificate of second party is valid, and sends the authenticated result (AR) to the first party; (3) after receiving AR from CA, the first party determines whether authentication for the second party is passed based on the received AR. The system includes portable storage devices, terminals, and CA for digit certificate. Being able to guarantee communications security between portable storage devices and terminals, the invention simplifies flow for authenticating ID, and saves storage space spending of portable storage devices.

Description

technical field [0001] The invention relates to information security technology, in particular to an identity authentication method and system. Background technique [0002] The public key infrastructure (Public Key Infrastructure, PKI) system is a set of hardware, software, personnel and application programs based on public cryptographic algorithms. It uses certificates to manage public keys and is certified by digital certificates from third-party trusted institutions. The Center (Certificate Authority, CA) binds the user's public key and other identification information (such as name, ID number, etc.) of the user to verify the identity of the user on the Internet. Passwords are organically combined to realize automatic key management and ensure data confidentiality and integrity. Among them, CA is a trusted third party independent of all users and is the core of the entire PKI system. It is responsible for issuing digital certificates (hereinafter referred to as certific...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/08H04L29/06
Inventor 刘道斌任雪峰
Owner POTEVIO INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products