Unlock instant, AI-driven research and patent intelligence for your innovation.

Identity authentication method based on public key certificate and system thereof

A technology of identity authentication and public key certificate, applied in the transmission system, digital transmission system, security device, etc., can solve the problem of inability to confirm the identity of the access point device, illegal terminal access, and failure to satisfy the legality identification of the terminal to the access network demand and other issues

Active Publication Date: 2011-09-21
CHINA IWNCOMM
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This mode can only realize the legitimacy authentication of the terminal identity by the network, but it cannot meet the legitimacy authentication requirements of the terminal for accessing the network, and cannot realize two-way authentication between the terminal and the network
The terminal cannot confirm the identity of the access point device. Even if the security loopholes are compensated by adding security patches and other measures in the later stage of this security architecture, it cannot completely solve security problems such as man-in-the-middle attacks and terminal access to illegal networks.
This type of security access technology protocol has been used until now, which has caused serious obstacles to the development of the industry

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method based on public key certificate and system thereof
  • Identity authentication method based on public key certificate and system thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0090] see figure 1 , the requester REQ and the authentication access controller AAC obtain the public key certificate issued by the authentication server AS in advance to represent their own identities, where the public key certificate adopts the X.509 certificate format. When the requester REQ needs to access the network, it executes an identity authentication method provided by the present invention to realize safe access control. The method includes:

[0091] 1) Authentication activation: the authentication access controller AAC sends an authentication activation packet to the requester REQ to activate the requester REQ to perform the certificate authentication process. The main contents of the identification activation group include:

[0092] SNonce

ID AS-AAC

Cert AAC

para ECDH

TIE AAC

SIG AAC

[0093] in:

[0094] SNonce field: Indicates the authentication identifier. If it is the first identity authentication, this field...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an identity authentication method based on a public key certificate and a system thereof; the authentication method comprises the following steps: 1) an authentication access controller (AAC) sends an authentication activation packet to a requester (REQ); 2) after receiving the authentication activation packet, the REQ sends an access authentication request packet to the AAC; 3) after receiving the access authentication request packet, the AAC sends a certificate authentication request packet to an authentication server (AS); 4) after receiving the certificate authentication request packet, the AS sends a certificate authentication response packet to the AAC; 5) after receiving the certificate authentication response packet, the AAC sends an access authentication response packet to the REQ; and 6) after receiving the access authentication response packet, the REQ sends an access authentication confirmation packet to the AAC.

Description

technical field [0001] The present invention relates to an identity authentication method and system based on public key certificates, in particular to a TePA (Tri-element Peer Authentication) mechanism based on triple-element peer authentication when a user accesses the network in a wired local area network LAN (Local Area Network) Identification method and system thereof. Background technique [0002] Ternary peer-to-peer authentication TePA technology is a technical idea and framework method for peer-to-peer authentication between users and networks proposed for the first time in my country. This technology defines a three-element entity authentication architecture. Based on the idea of ​​peer-to-peer authentication, user Two-way peer-to-peer authentication with the network. [0003] In the wired LAN, IEEE implements the security of the link layer by enhancing the security of IEEE802.3. The typical security access architecture protocol IEEE 802.1x is adopted. The basic me...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L2209/80H04L9/3263H04L9/3294H04L63/0823H04W12/069
Inventor 铁满霞曹军葛莉李琴
Owner CHINA IWNCOMM