Identification authentication method and system

A technology for identity authentication and identity information, applied in the field of information security, can solve the problem of low security of identity authentication methods and achieve the effect of improving security

Inactive Publication Date: 2009-07-22
POTEVIO INFORMATION TECH
View PDF0 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] In the existing identity authentication method, since the terminal sends the PIN entered by the user to the portable storage device in clear text for identity authentication, the PIN sent by the terminal is easily stolen or intercepted by the illegal user, and the illegal user may also gain access to the device. Portable storage device permissions, so the security of existing authentication methods is not high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identification authentication method and system
  • Identification authentication method and system
  • Identification authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the accompanying drawings and examples.

[0053] figure 2 A structural diagram of an identity authentication system provided by the present invention, such as figure 2 As shown, the identity authentication system includes: a terminal 201 and a portable storage device 202 .

[0054] The terminal 201 includes at least: a security processing module 2011 and a second interface unit 2015; the portable storage device 202 includes at least: a security processing module loading unit 2021, an identity authentication module 2022, and a first interface unit 2027.

[0055] The security processing module loading unit 2021 loads the security processing module 2011 to the terminal 201 through the first interface unit 2027 and the second interface unit 2015. The security processing module 2011 carries the sam...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity authentication method. Firstly, a portable storage device loads a session key generation mechanism identical to itself and a decrypting mechanism corresponding to an own encrypting mechanism onto a terminal; then, the portable storage device uses an own session key to encrypt a self-produced session ticket; the terminal generates the session key according to the session key generation mechanism identical to the portable storage device, ensures that the own session key decrypts the encrypted session ticket from the portable storage device and returns the session ticket obtained after the decryption to the portable storage device; subsequently, the portable storage device can compare the received session ticket with the session ticket produced by itself, so as to realize the identity authentication. At the same time, the invention also discloses an identity authentication system. The method and the system can improve the safety of the identity authentication between the terminal and the portable storage device.

Description

technical field [0001] The invention relates to the field of information security, in particular to an identity authentication method and system. Background technique [0002] When a terminal (such as a PC, mobile phone, etc.) accesses a portable storage device (such as a smart card, a memory card, etc.), the portable storage device needs to perform identity authentication on the accessed terminal, figure 1 It is a flowchart of an identity authentication method in the prior art. like figure 1 As shown, the method for identity authentication in the prior art includes the following steps: [0003] Step 101, when a terminal detects a portable storage device, it powers on the portable storage device, and the portable storage device sends an identity authentication request to a terminal requesting access. [0004] Step 102: After receiving the identity authentication request sent by the portable storage device, the terminal prompts the user to input a personal identification n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F12/14
Inventor 刘道斌
Owner POTEVIO INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products