Unlock instant, AI-driven research and patent intelligence for your innovation.

Service authentication method and system by using cipher system based on identity as fundation

An authentication system and business technology, applied in user identity/authority verification, transmission system, electrical components, etc., can solve the problem that the business authentication method depends on the underlying network infrastructure, and achieve the effect of improving authentication security and preventing man-in-the-middle attacks

Active Publication Date: 2009-04-01
ALCATEL LUCENT SHANGHAI BELL CO LTD
View PDF0 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The purpose of the present invention is to provide a service authentication method in a communication network, aiming to solve the problem in the prior art that the service authentication method depends on the underlying network infrastructure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Service authentication method and system by using cipher system based on identity as fundation
  • Service authentication method and system by using cipher system based on identity as fundation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are only used to explain the present invention in an illustrative manner, and are not intended to limit the present invention.

[0021] In the present invention, the user and the SP (service provider) directly perform service authentication on the basis of IBC (Identity Based Cryptography, an identity-based cryptographic system). The IBC correlation algorithm used in the embodiment of the present invention is based on ECC (Elliptic CurveCryptography, Elliptic Curve Cryptography) and BDH (Bilinear Diffie-Hellman) problems, which can be specifically found in the definition of the International Organization for Standardization ISO in the following references:

[0022] 1. ISO / IEC 1488...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for service authentication in communication network and a system thereof. The method comprises the following steps: a service signatory entity and a service provision entity respectively register the identities to a cryptogram management center; the cryptogram management center generates an open security parameter by an identity-based cryptogram system, and a private key corresponding to the identity; the service signatory entity makes signature by the identity-based cryptogram system by the private key of the service signatory entity; and the service provision entity authenticates the signature by the identity-based cryptogram system by the identity of the service signatory entity. The method further comprises a authentication process of the service signatory entity to the service provision entity, wherein, the process corresponds to the authentication process of the service provision entity to the service signatory entity without a particular order. Due to the method and the system, service authentication which is independent of lower network infrastructure is directly carried out between the service signatory entity and the service provision entity.

Description

technical field [0001] The present invention relates to a service authentication method and system in a communication network. Specifically, it relates to a service authentication method and system based on an identity-based cryptographic system in a communication network. Background technique [0002] With the development of many communication services, operators, service providers and users all need a reliable authentication mechanism to ensure legal service use. At present, the authentication methods used by many applications for different access users (including mobile communication network users, fixed communication network users, etc.) all depend on the underlying network infrastructure. Moreover, the protocol processes in these authentication methods have poor compatibility. The authentication mechanisms, protocols, and algorithms of different authentication methods are different, and there is no way to communicate with each other. [0003] For example, in mobile co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L29/06
Inventor 胡志远骆志刚万志坤
Owner ALCATEL LUCENT SHANGHAI BELL CO LTD