Supercharge Your Innovation With Domain-Expert AI Agents!

Identity authentication method, system thereof, authentication subject and authenticated subject

A technology of the subject to be authenticated and the subject of authentication, applied in the field of identity authentication, it can solve problems such as hidden dangers of security, hidden dangers of global Internet security, and system complexity, and achieve the effect of improving security, ensuring trustworthiness, and reducing complexity.

Active Publication Date: 2012-08-08
CHENGDU CYBERKEY TECH
View PDF2 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this authentication method also has disadvantages, that is, the addition of a third party in the authentication process makes the trust and authentication between the authentication subject and the authenticated subject change into trust for the third party, and the addition of the third party not only brings great benefits to the system Complexity, but also security risks
For example, it was recently disclosed that the third-party Verisign server in the public key infrastructure (PKI) has been hacked, so the security of the global Internet has hidden dangers, because the roots of all digital certificates that asymmetric authentication relies on are in Verisign's server

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method, system thereof, authentication subject and authenticated subject
  • Identity authentication method, system thereof, authentication subject and authenticated subject
  • Identity authentication method, system thereof, authentication subject and authenticated subject

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0042] figure 1 A schematic diagram of the identity authentication system provided by the embodiment of the present invention, such as figure 1 As shown, the system may include: an authenticating subject 100 , an authenticated subject 110 and an asymmetric information registration subject 120 .

[0043] The authenticating subject 100 may be a service provider's server, and the authenticated subject 110 may be an authentication terminal used by a user, such as a handheld electronic authenticator. The authentication terminal can collect user characteristics, and the user characteristics may include but not limited to: password, Passwords, biometrics, etc., where biometrics such as fingerprints, facial features, etc. In order to ensure security, us...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides an identity authentication method, a system thereof, an authentication subject and an authenticated subject. A symmetric key SK, a public key PubK and information df (PI) based on a user characteristic are appointed between the authentication subject and the authenticated subject in advance, and a private key PrivK corresponding to the PubK is generated on the authenticated subject. The method comprises the following steps: S1, the certification subject generates transaction control data T, and sends the T to be certified subject; S2, the authenticated subject adopts a preset authentication function to carry out calculation on the SK, T and df (PI) to obtain W, uses the PrivK to encrypt the W to obtain V, and sends the V to the authentication subject; S3, the authentication subject uses the PubK to decrypt the V to obtain W', and uses the preset authentication function to carry out calculation on the SK, T and df (PI) to obtain the W; S4, the authentication subject authenticates whether the W obtained in the step S3 is consistent with the W' or not, if so, identity authentication is passed, otherwise the identity authentication is failed. According to the method, the system, the authentication subject and the authenticated subject, while raising the security, a trusty degree of transaction is ensured.

Description

【Technical field】 [0001] The invention relates to the technical field of computer security, in particular to an identity authentication method, system, authentication subject and authenticated subject. 【Background technique】 [0002] The identity authentication process is that the authenticating subject authenticates the authenticated subject to confirm the identity, ownership and ownership rights, etc., where the authenticating subject is usually a service provider, and the authenticated subject is usually a user. At the most basic level, it is the process in which the authentication subject confirms the information submitted by the authenticated subject. In principle, the authentication subject and the authenticated subject need to establish shared information, and through the identification of the shared information to achieve authentication, this shared information is the basis for establishing trust and authentication. [0003] There are mainly two existing identity au...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L29/06
Inventor 熊楚渝陈雨霖
Owner CHENGDU CYBERKEY TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More