Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

System and method for authenticating credible identities on basis of safety chips

An identity authentication and security chip technology, applied in the field of information security, can solve problems such as user security risks and achieve the effect of ensuring security

Inactive Publication Date: 2015-04-29
成都卫士通信息产业股份有限公司
View PDF4 Cites 58 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Common identity authentication is often platform-independent. Users can perform identity authentication on any terminal. Since the security of the terminal is not verified, this brings security risks to users who operate on the terminal.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for authenticating credible identities on basis of safety chips

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0034] Any feature disclosed in this specification (including any appended claims, abstract and drawings), unless specifically stated otherwise, can be replaced by alternative features which are equivalent or serve a similar purpose. That is, unless expressly stated otherwise, each feature is one example only of a series of equivalent or similar features.

[0035] Such as figure 1 As shown, a system for trusted identity authentication based on a security chip includes three functional entities: a trusted authentication server loaded with a security chip, a trusted terminal, and a trusted third par...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a system and a method for authenticating credible identities on the basis of safety chips. The method includes allowing a credible authentication server and a credible terminal to apply for platform certificates from the same credible third party; allowing the credible authentication server to add the credible terminal into registered terminal lists of the credible authentication server after the platform certificates are successfully applied, storing the corresponding certificate of the credible terminal and allowing the credible authentication server to add new users into registered user lists; allowing the users on the credible terminal to access the corresponding server after the credibility of platforms is authenticated and the identities of the users are authenticated. The credibility of the platforms is bidirectionally authenticated by the credible authentication server and the credible terminal. The identities of the users are authenticated so that the authenticity of the identities of the users can be verified. The platform certificates comprise platform identity certificates and platform encryption certificates. The system and the method have the advantages that the credibility of the platforms is authenticated by the aid of the safety chips, so that the authenticity of the identities of the authentication server and the terminal and the safety of the platforms can be mutually confirmed by the authentication server and the terminal, and the safety of user identity authentication procedures can be guaranteed.

Description

technical field [0001] The present invention relates to a system and method for trusted identity authentication based on a security chip, in particular to a system and method for trusted identity authentication based on a security chip suitable for the field of information security. Background technique [0002] With the continuous development of computer technology and the continuous change of related application requirements, the problems of computer security and information security are becoming more and more prominent. Common identity authentication is often platform-independent, and users can perform identity authentication on any terminal. Since the security of the terminal is not verified, this brings security risks to users operating on the terminal. The continuous progress of trusted computing technology and security chip technology has put forward new ideas for solving information security problems. [0003] Trusted computing is a new technology for information sy...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/083H04L9/0833H04L63/0823
Inventor 刘强
Owner 成都卫士通信息产业股份有限公司
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More