Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication method, authentication system and authentication server

A technology of authentication server and authentication method, applied in the fields of authentication method, authentication system and authentication server, and can solve problems such as loss

Active Publication Date: 2012-07-04
ZTE CORP
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If a trusted third party or ASU cheats, it cannot be detected by effective methods, resulting in great losses

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method, authentication system and authentication server
  • Authentication method, authentication system and authentication server
  • Authentication method, authentication system and authentication server

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0119] Example 1: ASU1 needs to verify the validity of the AP sub-certificate and MT sub-certificate generated by ASU3 and ASU5. If the AP sub-certificate or MT sub-certificate provided by ASU3 fails the verification, it is considered that ASU3 has cheated, and then reported to the TC.

example 2

[0120] Example 2: If ASU1 verifies that the AP sub-certificate generated by ASU3 is invalid, and ASU3 verifies that the AP sub-certificate generated by ASU5 is invalid, the TC records that both ASU3 and ASU5 have cheated

[0121] Step 406: ASU1, ASU3, and ASU5 merge sub-certificates, and after comparing with the MT certificate and AP certificate in the authentication request message to obtain the verification result, send an authentication request response message to the AP;

[0122] Step 407: After the AP receives the authentication response message sent by ASU1, ASU3, ASU5, it decides whether to allow the MT to access the network according to the certificate verification results of the MT by ASU1, ASU3, and ASU5; If all the certificate verifications of ASU1, ASU3 and ASU5 pass, the MT is allowed to access the network, and the AP sends an access authentication response message to the MT. If the request message passes the certificate verification of the AP, the MT decides to a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authentication method, comprising the following steps: AP randomly selects n1 authentication servers as certificate authentication servers from N backup authentication servers and notifies the selected authentication servers, wherein n1 is more than or equal to t and less than or equal to N, and t is more than 1 and is a threshold value; all certificate authentication servers utilize respective sub cipher key to generate an AP sub-certificate and an MT sub-certificate for public key information signature of AP and MT; all the certificate authentication servers are interacted with other certificate authentication servers to generate the AP sub-certificate and the MT sub-certificate and verify the effectiveness of the AP and MT sub-certificates; when the effectivenumber of the AP sub-certificate and the effective number of the MT sub-certificate are averagely more than or equal to the threshold value t, all the certificate authentication servers combine the effective AP sub-certificates into an AP certificate and combine the effective MT sub-certificates into an MT certificate; and the certificate authentication servers verify the legality of the AP and MT certificates. The authentication method, the authentication system and the authentication server can improve the security of the certificate authentication.

Description

technical field [0001] The invention relates to network communication security technology, in particular to an authentication method, an authentication system and an authentication server. Background technique [0002] WAPI (WLAN Authentication and Privacy Infrastructure) is a security protocol applied to WLAN. It is an innovative technology standard proposed by China, which solves the loopholes and hidden dangers in the current wireless LAN security mechanism. . [0003] The WAPI security mechanism consists of two parts: WAI (WLAN AuthenticationInfrastructure, wireless local area network authentication infrastructure) and WPI (WLAN PrivacyInfrastructure, wireless local area network security infrastructure). WAI is used to identify user identities to ensure that legal users access legal networks; WPI is used to encrypt transmitted data to ensure the confidentiality of communications. WAI uses public key cryptosystem and digital certificate to complete the mutual authentica...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04L9/32H04W12/069
CPCH04L9/321H04L9/3263
Inventor 周伟
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products