Subscriber and subscriber terminal equipment correlation authentication method and system

A technology for user terminal equipment and terminal equipment, which is applied in the direction of user identity/authority verification, transmission system, electrical components, etc. Safe and reliable effect

Active Publication Date: 2014-03-26
北京天诚安信科技有限公司
View PDF2 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The resulting security risks have also led users to put forward higher security requirements for the mobile application environment: how to effectively identify and authenticate users and terminal devices, ensure the application security of mobile data, and improve the user's terminal security experience. It has become an urgent problem to be solved for the healthy development of the Internet
[0003] The existing means of improving network security have the following problems: traditional device digital authentication can only authenticate the device alone, and the legal identity of the device is identified by issuing the device digital certificate
However, when a user owns multiple terminal devices such as PCs, laptops, smartphones, and tablets, separate authentication devices cannot be associated with user identities, and authentication needs to be performed one by one, which is very inconvenient
In addition, in the existing equipment authorization management, the authorization information is stored in the authorization management system database. In this way, the tamper-proof and safe and reliable associated authentication cannot be guaranteed.
That is: in the existing method, it is impossible to authenticate the user identity and the terminal device at the same time; a user has multiple terminal devices, the complexity of repeated authentication is high, and the user experience is poor; independent authentication of multiple devices cannot establish an authentication association with the subject identity. The authentication results are separated; using the common authorization method, only the authorization attribute value is saved in the database, and the authorization relationship cannot be tamper-proof

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Subscriber and subscriber terminal equipment correlation authentication method and system
  • Subscriber and subscriber terminal equipment correlation authentication method and system
  • Subscriber and subscriber terminal equipment correlation authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0029] In describing the present invention, it should be understood that the terms "longitudinal", "transverse", "upper", "lower", "front", "rear", "left", "right", "vertical", The orientation or positional relationship indicated by "horizontal", "top", "bottom", "inner", "outer", etc. are based on the orientation or positional relationship shown in the drawings, and are only for the convenience of describing the present invention and simplifying the description, rather than Nothing indicating or implying that a referenced device or elem...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a subscriber and subscriber terminal equipment correlation authentication method and system. The method comprises that subscriber identities are verified according to subscriber digital certificates obtained from CA; terminal equipment dynamic authorization codes are generated for subscribers after the subscriber identity verification is passed; authorization code verification is performed on subscriber terminal equipment requiring to be correlated and authenticated to be credible through the terminal equipment dynamic authorization codes; terminal equipment sends digital certificate application information to the terminal equipment for applying for terminal equipment digital certificates after the terminal equipment dynamic authorization code verification is passed and terminal equipment digital certificates are signed for the terminal equipment according to the application information. According to the method and the system subscriber main identities and a plurality of pieces of terminal equipment are correlated and authenticated for the subscriber credible terminal equipment, so that the reliability and the safety of subscriber identity and terminal equipment identity authentication are improved, and correlation authentication can be performed on the subscriber identities and the terminal equipment simultaneously.

Description

technical field [0001] The present invention relates to the technical field of digital authentication, in particular to an associated authentication method and system for a user and a user terminal device. Background technique [0002] With the rapid development of the mobile Internet, more and more users need to access network applications through a variety of terminal devices, such as traditional PC terminal devices, or emerging mobile smart terminal devices. In recent years, In recent years, smartphones and tablets designed for individual consumers have been continuously used by enterprises to carry key business and core applications. The resulting security risks have also led users to put forward higher security requirements for the mobile application environment: how to effectively identify and authenticate users and terminal devices, ensure the application security of mobile data, and improve the user's terminal security experience. It has become an urgent problem for...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 张海松陈悦
Owner 北京天诚安信科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products