A trusted access method for mobile devices based on digital certificates

A technology of digital certificates and access methods, applied in wireless communication, electrical components, safety devices, etc., can solve the problems of inability to inspect fake master stations, and achieve the problems of inability to inspect fake master stations, ensure correctness, and shorten time costs Effect

Active Publication Date: 2016-08-03
CHINA ELECTRIC POWER RES INST +1
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] Aiming at the deficiencies of the prior art, the present invention provides a trusted access method for mobile devices based on digital certificates, which can support the identity authentication of the master station by the device, solve the problem that the fake master station cannot be checked in the traditional protocol, and can Very well meet the needs of identity authentication in such networks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A trusted access method for mobile devices based on digital certificates
  • A trusted access method for mobile devices based on digital certificates
  • A trusted access method for mobile devices based on digital certificates

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0041] The overall process of device access provided by the present invention is as follows: figure 1 As shown, a trusted access method for mobile devices based on digital certificates in the present invention includes two steps of digital certificate issuance and device access to the main station, and the digital certificate issuance is completed before the device is connected to the main station.

[0042] The certificate issuance provided by the present invention is as follows: figure 2 As shown, digital certificate issuance means that the certificate issuing center sends the digital certificate to the device, the master station and the certificate revocation list (CRL). The certificate distribution center refers to the server that generates and distributes all digital certificates in the system. The certificate dist...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a trusted access method of a mobile device based on a digital certificate. The access method includes two steps of issuing a digital certificate and connecting a device to a main station; the issuing of the digital certificate is completed before the device is connected to the main station. This method can support the identity authentication of the master station by the device, solves the problem that the counterfeit master station cannot be checked in the traditional protocol, and can well meet the demand for identity authentication in this type of network.

Description

technical field [0001] The invention relates to the field of device access, in particular to a trusted access method for mobile devices based on digital certificates. Background technique [0002] In recent years, the information industry has developed rapidly, and information security has received more and more attention. Identity authentication is an important information security technology. With the development of identity authentication technology becoming more and more mature, it is widely used in many in the network. However, some information networks with wide coverage, complex structure and high real-time performance, for example, the electricity consumption information collection system put forward new requirements for traditional authentication methods, and the particularity of the network structure determines that the commonly used identity authentication protocols cannot meet the requirements. It requires information security. [0003] Commonly used identity a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04W12/08H04W12/069
Inventor 刘鹰赵兵吕英杰徐英辉翟峰章欣李保丰付义伦孙志强梁晓兵
Owner CHINA ELECTRIC POWER RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products