Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Multipart identification authentication method and system base on equipment

An identity authentication and legal identity technology, applied in the field of device-based multi-party identity authentication methods and systems, can solve the problems of fixed authentication process, low identity authentication security, and high authentication consumption

Active Publication Date: 2009-04-15
CHINA MOBILE GRP BEIJING
View PDF1 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to solve the problems of low security, high authentication consumption and fixed authentication process among the application center, terminal and user in the prior art, the present invention provides a device-based multi-party identity authentication method and system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multipart identification authentication method and system base on equipment
  • Multipart identification authentication method and system base on equipment
  • Multipart identification authentication method and system base on equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0023] Such as figure 2 As shown, the authentication server of the authentication center issues a unique electronic certificate to the terminal device in a secure manner, and the terminal device solidifies the electronic certificate in the terminal device to ensure that it cannot be tampered with. The authentication center provides a security key to the terminal device through a secure channel, and the terminal device stores the key in a local hardware environment. The algorithm of encryption and decryption is implemented by hardware to prevent tampering and theft. According to the records of the authentication policy module of the authentication center, if the terminal device needs to authenticate the user equipment or the application server of the application center, the authentication center will pass the electronic certificate and the corresponding encryption key of the user equipment and the application center through a secure method. Send it directly to the terminal de...

Embodiment 2

[0034] Such as Figure 4 As shown, the process of user equipment authentication terminal equipment includes the following two schemes:

[0035] 1) When the user equipment performs the operation of authenticating the terminal equipment, the user equipment assumes that the terminal equipment is untrustworthy, transmits the identity information of the terminal equipment locally stored in the user equipment to the terminal equipment, and uses the terminal equipment key stored locally in the user equipment for encryption ;The terminal device receives the encrypted terminal device information transmitted by the user device, decrypts it using the terminal device key stored locally, obtains the electronic certificate of the terminal device uploaded by the user device, compares it with the identity information stored locally, and returns to the user device the The locally stored terminal device key encrypts the confirmation message, and the user equipment uses the locally stored termin...

Embodiment 3

[0039] Such as Figure 5 As shown, the authentication of the terminal to the application center includes two schemes:

[0040] 1) After the terminal is powered on and started, it sends the application center identity authentication information locally stored in the terminal to the application center, and encrypts it with the application center key stored locally in the terminal; the application center receives the encrypted application center identity information transmitted by the terminal, and uses the local The stored application center key is decrypted, the application center electronic certificate uploaded by the terminal is obtained, and compared with the identity information stored locally, the terminal sends an authentication result notification to the authentication center according to the comparison result, and uses the locally stored identity information The terminal encryption key encrypts the message. The terminal judges that the identity of the application cente...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for authenticating multi-party identification and a system thereof. The system comprises an authentication server and at least two authentication devices, wherein, the authentication server transmits identification authenticating data containing digital certificates of all authentication devices participating authentication to two authentication devices at least; the authentication devices store the received identification authentication data. The authentication device comprises an authentication initiating party device and an authentication treating party device, wherein, the authentication initiating party device transmits information of an authentication request containing a digital certificate of the authentication initiating party device to the authentication treating party device; and the authentication treating party device carries out consistency comparison between the digital certificate of the authentication initiating party device stored in the device self and the received digital certificate in the information of the authentication request, if yes, identification legal message is transmitted to the authentication server; if not, identification illegal message is transmitted to the authentication server. The method solves the problem of identification authentication among a server, a terminal and a user.

Description

technical field [0001] The present invention relates to the identity authentication technology, in particular to the identity authentication technology among terminal equipment, user end and server, specifically a device-based multi-party identity authentication method and system. Background technique [0002] With the rapid development of communication technology and IT technology, on the one hand, the intelligence and computing power of communication / application terminals are getting higher and higher, and terminal-based network attacks and security incidents of counterfeiting identities are becoming more frequent, and the frequency and intensity of attacks are also increasing. On the other hand, the geographical restrictions of the enterprise network are gradually weakened, the network scale is getting larger and larger, and the demand for individual management in the network is becoming more and more prominent. [0003] A large number of traditional industrial customers ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L29/06
Inventor 朱暐李黎阳林铮王崇锐赵鹏范冰
Owner CHINA MOBILE GRP BEIJING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products