System and method for authenticating credible identities on basis of safety chips

An identity authentication and security chip technology, applied in the field of information security, can solve problems such as user security risks and achieve the effect of ensuring security

Inactive Publication Date: 2015-04-29
成都卫士通信息产业股份有限公司
View PDF4 Cites 58 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Common identity authentication is often platform-independent. Users can perform identity authentication on any termina

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for authenticating credible identities on basis of safety chips

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0033] In order to make the objectives, technical solutions and advantages of the present invention clearer, the following further describes the present invention in detail with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, but not to limit the present invention.

[0034] Any feature disclosed in this specification (including any appended claims, abstract and drawings), unless specifically stated, can be replaced by other equivalent or alternative features with similar purposes. That is, unless otherwise stated, each feature is just one example of a series of equivalent or similar features.

[0035] Such as figure 1 As shown, a system for trusted identity authentication based on a security chip includes three functional entities: a trusted authentication server loaded with a security chip, a trusted terminal, and a trusted third party; the trusted third pa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a system and a method for authenticating credible identities on the basis of safety chips. The method includes allowing a credible authentication server and a credible terminal to apply for platform certificates from the same credible third party; allowing the credible authentication server to add the credible terminal into registered terminal lists of the credible authentication server after the platform certificates are successfully applied, storing the corresponding certificate of the credible terminal and allowing the credible authentication server to add new users into registered user lists; allowing the users on the credible terminal to access the corresponding server after the credibility of platforms is authenticated and the identities of the users are authenticated. The credibility of the platforms is bidirectionally authenticated by the credible authentication server and the credible terminal. The identities of the users are authenticated so that the authenticity of the identities of the users can be verified. The platform certificates comprise platform identity certificates and platform encryption certificates. The system and the method have the advantages that the credibility of the platforms is authenticated by the aid of the safety chips, so that the authenticity of the identities of the authentication server and the terminal and the safety of the platforms can be mutually confirmed by the authentication server and the terminal, and the safety of user identity authentication procedures can be guaranteed.

Description

technical field [0001] The present invention relates to a system and method for trusted identity authentication based on a security chip, in particular to a system and method for trusted identity authentication based on a security chip suitable for the field of information security. Background technique [0002] With the continuous development of computer technology and the continuous change of related application requirements, the problems of computer security and information security are becoming more and more prominent. Common identity authentication is often platform-independent, and users can perform identity authentication on any terminal. Since the security of the terminal is not verified, this brings security risks to users operating on the terminal. The continuous progress of trusted computing technology and security chip technology has put forward new ideas for solving information security problems. [0003] Trusted computing is a new technology for information sy...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/083H04L9/0833H04L63/0823
Inventor 刘强
Owner 成都卫士通信息产业股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products