Entity bidirectional identification method

A physical and legal technology, applied in the direction of public key for secure communication, user identity/authority verification, digital transmission system, etc., to achieve the effect of facilitating application implementation and simplifying operating conditions

Active Publication Date: 2008-07-16
CHINA IWNCOMM
View PDF0 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This guarantee requirement cannot be met in many current application environments. For example, communication networks usually use entity authentication mechanisms to implement user access control functions. Before the authentication mechanism is successfully completed, users are prohibited from accessing the network. Access to the certificate authority to obtain the validity of the public key of the peer entity - the network access point

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Entity bidirectional identification method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] Referring to Fig. 2, the method of the present invention involves three entities, two authentication entities A and B, and a trusted third party TP (Trusted third Party), which is a trusted third party for the authentication entities A and B. The system that realizes peer-to-peer authentication between two entities A and B through a trusted third party TP is called a TePA (Tri-element Peer Authentication) system. valid X Indicates the certificate Cert X Validity; PublicKey X is the public key of entity X (X stands for A or B); ID X Is the identity of entity X, by the certificate Cert X or the entity's discriminator X means; Pub X Indicates the verification result of entity X, which is determined by the certificate Cert X and its validityValid X Consists of or consists of entity X and its public key PublicKey XComposition, Token is the token field, defined as follows:

[0041] TokenAB=sS A (R A ‖ID A ‖Text1)

[0042] TokenTB=R A ‖R B ‖Pub A ‖Pub B ‖sS TP...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a reality bi-directional identification method, including following steps that: (1) a reality(A) sends a message(1) to a reality(B); (2) the reality(B) sends a message(2) to a credible third party(TP) after receiving the message(1); (3) the credible third party(TP) checks the legality of the reality(A) and the reality(B) after receiving the message(2); (4) the credible third party(TP) sends back a message(3) to the reality(B) after checking the legality of the reality(A) and the reality(B); (5) the reality(B) verifies the message(3) after receiving the message(3); (6) the reality(B) sends a message(4) to the reality(A) after the reality(B) verifies the message(3); (7) the reality(A) verifies the message(4) after receiving the message(4); as a result, the identification is completed; compared with the conventional identification mechanism, the invention has the advantages of defining an on-line retrieval and identification mechanism of a public key, realizing the centralized management of the mechanism, simplifying the operating condition of the protocol and facilitating the application and implement of the public key.

Description

technical field [0001] The invention relates to an entity two-way authentication method. Background technique [0002] Entity authentication methods using asymmetric cryptography can be divided into two types, namely one-way authentication and two-way authentication. The uniqueness or timeliness of authentication is identified by time-varying parameters, which are often used as time-varying parameters, such as time stamps, sequence numbers, and random numbers. If the time stamp or sequence number is used as the time-varying parameter, one-way authentication only needs to use one message transmission, and two-way authentication needs to use two message transmissions; if random numbers are used as the time-varying parameter, then one-way authentication needs to use two messages Passing, two-way authentication needs to adopt three message passing or four message passing (that is, parallel authentication of two message passing). [0003] Regardless of the above-mentioned authe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30H04L9/32H04L29/06G06F21/31G06F21/33
CPCH04L9/321H04L9/3247
Inventor 铁满霞曹军黄振海赖晓龙
Owner CHINA IWNCOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products