Identity authentication system and method based on identifiers

An identity authentication and identification technology, applied in the field of information security, can solve problems such as cumbersome authentication process and poor user experience, achieve reliability and security, prevent adverse consequences, and simplify the authentication process

Active Publication Date: 2014-12-10
SHANGHAI PEOPLENET SECURITY TECH
View PDF6 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] For the above-mentioned identity authentication based on PKI technology, there are problems such as the authentication process is very cumbersome and the user experience is extremely poor.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication system and method based on identifiers
  • Identity authentication system and method based on identifiers

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the present invention will be specifically described below in conjunction with the accompanying drawings and embodiments. The drawings in the following description are only some embodiments of the invention. For those skilled in the art, other drawings can also be obtained based on these drawings without creative effort.

[0041] Such as figure 1 As shown, the present invention provides an identity-based authentication system, including a client, a private key generation server, and at least one terminal device.

[0042] Specifically, the client is used to form a public key that uniquely identifies the user. Usually, the user specifies identification information that uniquely identifies himself, that is, a public key, such as a website, company name, email address, etc.; the client includes but is not limited to a mobile phone , computer, tablet, e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of information security, particularly to security authentication system and method when an intelligent device receives a control command and discloses an identity authentication system based on identifiers. The identity authentication system comprises a client, a private key generation server and at least one terminal device. The client is used for generating a public key to identify a user and controlling digital signatures of the control commands of the terminal devices to generate signing messages; the private key generation server is used for generating a private key and a public parameter. Each terminal device is internally provided with an authentication module based on identifiers and certificating the control command according to the public parameter and the public key. According to the arrangement, IBC (identity-based cryptography) modules are arranged in the terminal devices, allowing the control commands received by the terminal devices to be more reliable and safe; bad effects, caused by the fact that the terminal devices receive the wrong commands, are avoided; once the faults occur to the terminal devices, the causes of the problems can be rapidly found, and effective measures are taken.

Description

technical field [0001] The invention relates to the field of information security, in particular to a security authentication system and method in the process of receiving control instructions by smart devices. Background technique [0002] In recent years, with the rapid development of the computer communication industry, the integration and application of computer, automatic control, and communication technologies have brought profound changes to people's lifestyles. The traditional way of home furnishing has been far from meeting people's needs. The environment emerges as the times require, that is to combine various home appliances into an organic whole, and realize its control and management anytime and anywhere through the existing network communication means. [0003] With the continuous expansion of smart home application fields, the research on smart home remote security communication technology has received more and more attention. At present, the technologies for ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
Inventor 谈剑锋何江华王力赵晶晶
Owner SHANGHAI PEOPLENET SECURITY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products