Multipart identification authentication method and system base on equipment
An identity authentication and legal identity technology, applied in the field of device-based multi-party identity authentication methods and systems, can solve the problems of fixed authentication process, low identity authentication security, and high authentication consumption
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0022] Example 1
[0023] Such as figure 2 As shown, the authentication server of the authentication center issues a unique electronic certificate to the terminal device in a secure manner, and the terminal device solidifies the electronic certificate in the terminal device and ensures that it cannot be tampered with. The authentication center provides a security key to the terminal device through a security channel, and the terminal device stores the key in the local hardware environment. The encryption and decryption algorithm is implemented by hardware to prevent tampering and theft. According to the records of the authentication policy module of the authentication center, if the terminal device needs to authenticate the user equipment or the application server of the application center, the authentication center will use the electronic certificate and the corresponding encryption key of the user equipment and the application center through a secure method Directly delivered t...
Example Embodiment
[0033] Example two
[0034] Such as Figure 4 As shown, the process of user equipment authentication terminal equipment includes the following two solutions:
[0035] 1) When the user equipment performs the operation of authenticating the terminal equipment, the user equipment assumes that the terminal equipment is not trustworthy, transmits the identity information of the terminal equipment stored locally in the user equipment to the terminal equipment, and uses the terminal equipment key stored locally in the user equipment for encryption ; The terminal device receives the encrypted terminal device information transmitted by the user device, uses the locally stored terminal device key to decrypt, obtains the terminal device electronic certificate uploaded by the user device, compares it with the locally stored identity information, and returns to the user device using The locally stored terminal device key encryption confirmation message, the user equipment uses the locally stor...
Example Embodiment
[0038] Example three
[0039] Such as Figure 5 As shown, the terminal's authentication to the application center includes two schemes:
[0040] 1) After the terminal is powered on, it sends the application center identity authentication information stored locally on the terminal to the application center, and uses the application center key stored locally in the terminal for encryption; the application center receives the encrypted application center identity information transmitted by the terminal and uses the local The stored application center key is decrypted, the application center electronic certificate uploaded by the terminal is obtained, and it is compared with the locally stored identity information. According to the comparison result, the terminal sends an authentication result notification to the authentication center and adopts the locally stored terminal The terminal encrypts the message with a key. The terminal judges that the identity of the application center is ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap