Identification authentication method and system
An identity authentication and authentication request technology, applied in the field of information security, can solve the problems of limited storage space, cumbersome authentication process, time delay, etc., and achieve the effect of simplifying the identity authentication process, saving storage space overhead, and improving response speed
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0060] Example one
[0061] Taking the terminal to perform identity authentication on the portable storage device and the portable storage device is a mobile storage card (hereinafter referred to as a card) as an example, referring to FIG. 3, the identity authentication process in this embodiment mainly includes the following steps:
[0062] Step 301: The card sends an authentication request to the terminal, requesting the terminal to perform identity authentication on the card. The request information carried in the authentication request includes the card certificate.
[0063] Step 302: After receiving the authentication request sent by the card, the terminal sends a verification request to the CA. The request information carried in the verification request includes the card certificate.
[0064] Step 303: After receiving the verification request sent by the terminal, the CA verifies the validity of the card certificate carried in the verification request, and returns the verifi...
Example Embodiment
[0072] Example two
[0073] Taking the portable storage device to perform identity authentication on the terminal and the portable storage device is a mobile storage card (hereinafter referred to as a card) as an example, referring to FIG. 4, the identity authentication process in this embodiment mainly includes the following steps:
[0074] Step 401: The terminal sends an authentication request to the card, requesting the card to perform identity authentication on the terminal. The request information carried in the authentication request includes the terminal certificate.
[0075] Step 402: After receiving the authentication request sent by the terminal, the card sends a verification request to the CA through the terminal. The request information carried in the verification request includes the terminal certificate.
[0076] Step 403: After receiving the verification request sent by the card, the CA verifies the validity of the terminal certificate carried in the verification re...
Example Embodiment
[0093] Example three
[0094] Taking the mutual identity authentication between the portable storage device and the terminal, and the portable storage device being a mobile storage card (hereinafter referred to as a card) as an example, as shown in FIG. 5, the identity authentication process in this embodiment mainly includes the following two parts:
[0095] Steps 501 to 504: the process in which the terminal authenticates the card;
[0096] Step 505 to step 508: the process in which the card authenticates the terminal.
[0097] It should be noted that step 501 to step 504 and step 505 to step 508 are two different processes, and there is no strict sequence in time. The specific processing process of step 501 to step 504 is consistent with step 301 to step 304 in the first embodiment; the specific processing process of step 505 to step 508 is the same as that of step 401 to step 404 in the second embodiment, and will not be one by one here. Go into details.
[0098] When both par...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap