Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identification authentication method and system

An identity authentication and authentication request technology, applied in the field of information security, can solve the problems of limited storage space, cumbersome authentication process, time delay, etc., and achieve the effect of simplifying the identity authentication process, saving storage space overhead, and improving response speed

Inactive Publication Date: 2008-03-05
POTEVIO INFORMATION TECH
View PDF1 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] First of all, the validity verification of the certificate is based on the CRL stored in the portable storage device and terminal at that time, but neither the portable storage device nor the terminal can guarantee that the CRL stored in it is updated in real time, if the CRL at that time is not the latest , then the verified certificate validity result is inaccurate, so that the communication security between the portable storage device and the terminal cannot be reliably guaranteed
[0009] Secondly, during the authentication process, multiple and frequent information interactions are required between the portable storage device and the terminal, such as: interactively sending CRL issuance time information, sending an updated CRL to the other party, sending certificates interactively, and processing various Response after request, etc., the entire authentication process is too cumbersome, which is likely to cause a large delay. At the same time, this also puts forward higher performance requirements for portable storage devices and terminals.
[0010] Again, this method requires maintaining the CRL in the portable storage device, but, for the portable storage device (such as a mobile memory card), its storage space is very limited, and storing a certain scale of CRL in the memory card requires a considerable amount of memory card cost. storage space, thus greatly reducing the effective storage space of the memory card

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identification authentication method and system
  • Identification authentication method and system
  • Identification authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0061] Taking the terminal to authenticate the portable storage device, and the portable storage device is a mobile storage card (hereinafter referred to as the card) as an example, as shown in Figure 3, the identity authentication process in this embodiment mainly includes the following steps:

[0062] Step 301: the card sends an authentication request to the terminal, requesting the terminal to authenticate the card, and the request information carried in the authentication request includes: card certificate.

[0063] Step 302: After receiving the authentication request sent by the card, the terminal sends a verification request to the CA, and the request information carried in the verification request includes: the card certificate.

[0064] Step 303: After receiving the verification request sent by the terminal, the CA verifies the validity of the card certificate carried in the verification request, and returns the verification result to the terminal in a verification resp...

Embodiment 2

[0073] Taking the portable storage device to perform identity authentication on the terminal, and the portable storage device is a mobile memory card (hereinafter referred to as the card) as an example, as shown in Figure 4, the identity authentication process in this embodiment mainly includes the following steps:

[0074] Step 401: The terminal sends an authentication request to the card, requesting the card to authenticate the identity of the terminal, and the request information carried in the authentication request includes: terminal certificate.

[0075] Step 402: After receiving the authentication request from the terminal, the card sends a verification request to the CA through the terminal, and the request information carried in the verification request includes: terminal certificate.

[0076] Step 403: After receiving the verification request sent by the card, the CA verifies the validity of the terminal certificate carried in the verification request, and returns the...

Embodiment 3

[0094] Take the mutual identity authentication between the portable storage device and the terminal, and the portable storage device is a mobile memory card (hereinafter referred to as the card) as an example, as shown in Figure 5, the identity authentication process in this embodiment mainly includes the following two parts:

[0095] Step 501-Step 504: the process of the terminal authenticating the card;

[0096] Step 505-Step 508: the process of the card authenticating the identity of the terminal.

[0097] It should be noted that steps 501 to 504 and steps 505 to 508 are two different processes, and there is no strict sequence relationship in time. The specific processing process of steps 501 to 504 is consistent with steps 301 to 304 in the first embodiment; the specific processing of steps 505 to 508 is consistent with the steps 401 to 404 in the second embodiment, and will not be repeated here. repeat.

[0098] When both parties pass the authentication, then the sessio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The method includes following steps: (1) after receiving authentication request carried by certificate of second party and sent from the second party, first party in portable type storage devices and terminals sends certificate of second party to center of authentication (CA) for digit certificate; (2) after receiving certificate of second party from the first party, CA authenticates whether the certificate of second party is valid, and sends the authenticated result (AR) to the first party; (3) after receiving AR from CA, the first party determines whether authentication for the second party is passed based on the received AR. The system includes portable storage devices, terminals, and CA for digit certificate. Being able to guarantee communications security between portable storage devices and terminals, the invention simplifies flow for authenticating ID, and saves storage space spending of portable storage devices.

Description

technical field [0001] The invention relates to information security technology, in particular to an identity authentication method and system. Background technique [0002] The public key infrastructure (Public Key Infrastructure, PKI) system is a set of hardware, software, personnel and application programs based on public cryptographic algorithms. It uses certificates to manage public keys and is certified by digital certificates from third-party trusted institutions. The Center (Certificate Authority, CA) binds the user's public key and other identification information (such as name, ID number, etc.) of the user to verify the identity of the user on the Internet. Passwords are organically combined to realize automatic key management and ensure data confidentiality and integrity. Among them, CA is a trusted third party independent of all users and is the core of the entire PKI system. It is responsible for issuing digital certificates (hereinafter referred to as certific...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/08H04L29/06
Inventor 刘道斌任雪峰
Owner POTEVIO INFORMATION TECH
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More