Identity authentication method based on public key certificate and system thereof
A technology of identity authentication and public key certificate, applied in the transmission system, digital transmission system, security device, etc., can solve the problem of inability to confirm the identity of the access point device, illegal terminal access, and failure to satisfy the legality identification of the terminal to the access network demand and other issues
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0090] see figure 1 , the requester REQ and the authentication access controller AAC obtain the public key certificate issued by the authentication server AS in advance to represent their own identities, where the public key certificate adopts the X.509 certificate format. When the requester REQ needs to access the network, it executes an identity authentication method provided by the present invention to realize safe access control. The method includes:
[0091] 1) Authentication activation: the authentication access controller AAC sends an authentication activation packet to the requester REQ to activate the requester REQ to perform the certificate authentication process. The main contents of the identification activation group include:
[0092] SNonce
ID AS-AAC
Cert AAC
para ECDH
TIE AAC
SIG AAC
[0093] in:
[0094] SNonce field: Indicates the authentication identifier. If it is the first identity authentication, this field...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 