Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Mobile terminal identity authentication method and system based on wpki and time stamp

An identity authentication, mobile terminal technology, applied in user identity/authority verification, transmission systems, electrical components, etc., can solve the security threat of RSA algorithm, and achieve the effect of effective identity verification, defense against attacks, and data security.

Active Publication Date: 2018-11-13
AEROSPACE INFORMATION
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

On the server side that provides data, since the external interface basically adopts the HTTP (HypertextTransfer Protocol, Hypertext Transfer Protocol) protocol, the use of encryption and signature is less, and there is a great super hidden danger
In the financial field, for the core external interface, the ultimate security of the application server is to use the 1024-bit RSA algorithm. The RSA algorithm is currently also subject to great security threats.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile terminal identity authentication method and system based on wpki and time stamp
  • Mobile terminal identity authentication method and system based on wpki and time stamp
  • Mobile terminal identity authentication method and system based on wpki and time stamp

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0052] In the embodiment of the present invention, the user terminal obtains the time stamp from the time stamp mechanism system, and uses WPKI to establish a secure data channel with the application server. The application server receives the time stamp sent by the user terminal through the secure data channel, and the application server verifies the time stamp through the time stamp mechanism system; in the verification of the time stamp After passing, the secure data channel is used for data transmission between the application server and the user terminal.

[0053] This embodiment provides a schematic diagram of the implementation principle of a mobile terminal identity authentication method based on WPKI and timestamp. figure 1 As shown, the specific processing flow is as follows figure 2 As shown, including the following processing steps:

[0054] Step S210. The time stamp is authorized by the National Time Service Center and issued by the authoritative and trusted TSA (Time...

Embodiment 2

[0079] This embodiment provides a mobile terminal identity authentication system based on WPKI and timestamp. Its specific structure is as follows image 3 As shown, it includes: user terminal, application server, time stamp mechanism system and OCSP server.

[0080] The user terminal is used to obtain the time stamp from the time stamp institution system, and establish a secure data channel with the application server using the wireless public key infrastructure WPKI;

[0081] The application server is configured to receive the time stamp sent by the user terminal through the secure data channel, and the application server verifies the time stamp through the time stamp mechanism system; After the verification of the timestamp is passed, the secure data channel is used for data transmission with the user terminal;

[0082] The time stamp mechanism system is used to send a time stamp to the user terminal and verify the time stamp sent by the application server.

[0083] Specifically, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides an identity authentication method and an identity authentication system for a mobile terminal based on a WPKI and a timestamp. The method mainly comprises the steps that a user terminal acquires the timestamp from a timestamp mechanism system and establishes a safety data channel with an application server by adopting the WPKI; the application server receives the timestamp sent by the user terminal through the safety data channel and authenticates the timestamp through the timestamp mechanism system; after authentication of the timestamp is passed, data are transmitted between the application server and the user terminal by utilizing the safety data channel. According to the embodiment of the invention, a mobile intelligent terminal communicates with the application server by adopting a WPKI technology, and the safety of the whole link is guaranteed by adopting an SSL communication protocol based on an ECC algorithm; by using the timestamp service of a trusted third party, various attacks to a group key exchange protocol can be resisted, so that the effective identity authentication of the mobile terminal is achieved, and the data safety of wireless services of the mobile terminal is guaranteed.

Description

Technical field [0001] The present invention relates to the technical field of media communication, in particular to a mobile terminal identity authentication method and system based on WPKI (Wireless Public Key Infrastructure, wireless public key infrastructure) and time stamp. Background technique [0002] There are three main types of mobile smart terminals today, namely Google’s android phone, Apple’s iphone and Microsoft’s Windows Phone. Among them, the operating system of Android smart phones is based on the Linux kernel, which is a mobile operating system announced by Google. It was developed by Google in the early stage and later by the Open Handheld Device Alliance. The platform consists of an operating system, middleware, user interface and application software. It is the first truly open and complete mobile software for mobile terminals. [0003] WPKI is a set of key and certificate management platform systems that follow established standards that introduce PKI (Public...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 耿方林文辉郭向国林凉杜悦琨
Owner AEROSPACE INFORMATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products