Multipart identification authentication method and system base on equipment

An identity authentication and legal identity technology, applied in the field of device-based multi-party identity authentication methods and systems, can solve the problems of fixed authentication process, low identity authentication security, and high authentication consumption

Active Publication Date: 2009-04-15
CHINA MOBILE GRP BEIJING
View PDF1 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to solve the problems of low security, high authentication consumption and fixed authentication process among the application

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multipart identification authentication method and system base on equipment
  • Multipart identification authentication method and system base on equipment
  • Multipart identification authentication method and system base on equipment

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0022] Example 1

[0023] Such as figure 2 As shown, the authentication server of the authentication center issues a unique electronic certificate to the terminal device in a secure manner, and the terminal device solidifies the electronic certificate in the terminal device and ensures that it cannot be tampered with. The authentication center provides a security key to the terminal device through a security channel, and the terminal device stores the key in the local hardware environment. The encryption and decryption algorithm is implemented by hardware to prevent tampering and theft. According to the records of the authentication policy module of the authentication center, if the terminal device needs to authenticate the user equipment or the application server of the application center, the authentication center will use the electronic certificate and the corresponding encryption key of the user equipment and the application center through a secure method Directly delivered t...

Example Embodiment

[0033] Example two

[0034] Such as Figure 4 As shown, the process of user equipment authentication terminal equipment includes the following two solutions:

[0035] 1) When the user equipment performs the operation of authenticating the terminal equipment, the user equipment assumes that the terminal equipment is not trustworthy, transmits the identity information of the terminal equipment stored locally in the user equipment to the terminal equipment, and uses the terminal equipment key stored locally in the user equipment for encryption ; The terminal device receives the encrypted terminal device information transmitted by the user device, uses the locally stored terminal device key to decrypt, obtains the terminal device electronic certificate uploaded by the user device, compares it with the locally stored identity information, and returns to the user device using The locally stored terminal device key encryption confirmation message, the user equipment uses the locally stor...

Example Embodiment

[0038] Example three

[0039] Such as Figure 5 As shown, the terminal's authentication to the application center includes two schemes:

[0040] 1) After the terminal is powered on, it sends the application center identity authentication information stored locally on the terminal to the application center, and uses the application center key stored locally in the terminal for encryption; the application center receives the encrypted application center identity information transmitted by the terminal and uses the local The stored application center key is decrypted, the application center electronic certificate uploaded by the terminal is obtained, and it is compared with the locally stored identity information. According to the comparison result, the terminal sends an authentication result notification to the authentication center and adopts the locally stored terminal The terminal encrypts the message with a key. The terminal judges that the identity of the application center is ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for authenticating multi-party identification and a system thereof. The system comprises an authentication server and at least two authentication devices, wherein, the authentication server transmits identification authenticating data containing digital certificates of all authentication devices participating authentication to two authentication devices at least; the authentication devices store the received identification authentication data. The authentication device comprises an authentication initiating party device and an authentication treating party device, wherein, the authentication initiating party device transmits information of an authentication request containing a digital certificate of the authentication initiating party device to the authentication treating party device; and the authentication treating party device carries out consistency comparison between the digital certificate of the authentication initiating party device stored in the device self and the received digital certificate in the information of the authentication request, if yes, identification legal message is transmitted to the authentication server; if not, identification illegal message is transmitted to the authentication server. The method solves the problem of identification authentication among a server, a terminal and a user.

Description

technical field [0001] The present invention relates to the identity authentication technology, in particular to the identity authentication technology among terminal equipment, user end and server, specifically a device-based multi-party identity authentication method and system. Background technique [0002] With the rapid development of communication technology and IT technology, on the one hand, the intelligence and computing power of communication / application terminals are getting higher and higher, and terminal-based network attacks and security incidents of counterfeiting identities are becoming more frequent, and the frequency and intensity of attacks are also increasing. On the other hand, the geographical restrictions of the enterprise network are gradually weakened, the network scale is getting larger and larger, and the demand for individual management in the network is becoming more and more prominent. [0003] A large number of traditional industrial customers ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/06
Inventor 朱暐李黎阳林铮王崇锐赵鹏范冰
Owner CHINA MOBILE GRP BEIJING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products