Certifying method based on identity, method, equipment and system for secure communication
An authentication method and identity technology, applied in the field of network communication, can solve problems such as difficulty in guaranteeing user information security and poor security, and achieve the effect of ensuring business use and user experience, and enhancing security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0037] The embodiment of the present invention provides an identity-based authentication method. The method takes the sending party Alice sending a SIP request message to the receiving party Bob as an example. The IDs of Alice and Bob are respectively Alice@proxyA.com and Bob@proxyB.com, The ID is their respective public keys Kp, and Alice and Bob have applied to their respective private key generation centers (Private KeyGenerator, PKG) to generate private keys Ks, see figure 1 , the authentication process of implementing the SIP authentication scheme based on the identity-based password mechanism includes:
[0038] 101: Alice sends a SIP request message to Bob. In order for Bob to authenticate herself, Alice uses the private key Ks to sign the field indicating Alice's identity and other additional fields in the request message. These fields include at least From, To and Date; The signature is placed in the Identity field, and the signature algorithm Hess used is placed in th...
Embodiment 2
[0048] An embodiment of the present invention provides an identity-based authentication method, which includes:
[0049] The recipient receives the message, and the message carries the signature of the specified field in the message, where the private key used for the signature is generated according to the sender's identity and public key additional parameters;
[0050] The receiver verifies the signature using the sender's identity and public key as additional parameters.
[0051] The sender's public key in the embodiment of the present invention can be selected by the sender itself, and the public key can be composed of the sender's identifier and additional parameters of the public key. When the message is a SIP message, the identifier of the sender can be the AoR (Address of Record, address record) value in the From field in the SIP message, which is determined during registration and is fixed during message delivery Yes, the additional parameter of the public key can be...
Embodiment 3
[0095] Some services have high requirements on the confidentiality of SIP messages, and the contents of the messages can be further encrypted. The embodiment of the present invention provides a secure communication method, see image 3 , the method includes:
[0096] 301: Alice sends a public parameter request message to PPS_B;
[0097] 302: PPS_B returns the public parameters of PPS_B to Alice after receiving the public parameter request message;
[0098] The public parameters of PPS_B are used when encrypting the message. If Alice saves the public parameters of PPS_B, it is not necessary to perform 301 and 302 to obtain its public parameters, that is, 301 and 302 are optional steps. Of course, the public parameters of PPS_B can also be obtained once and used multiple times. In the embodiment of the present invention The description of the public parameters can refer to the second embodiment, which will not be described in detail here;
[0099] 303: Alice sends an encrypt...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 