Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Mobile phone off-line authentication method

An offline authentication and mobile phone technology, applied in wireless communication, electrical components, transmission systems, etc., can solve the problems of reducing the operating efficiency of CA certification centers, high construction costs of CA certification centers, and increasing equipment investment

Active Publication Date: 2015-07-01
胡祥义
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, at home and abroad, based on identity authentication between mobile phones, the security framework of PKI technology is adopted. PKI technology completes the online identity authentication of user mobile phones by establishing a CA certification center, and cannot realize offline authentication between user mobile phones. CA certification center The construction cost is relatively high, and the PKI technology adopts the public key system, and the operation speed is relatively slow. In addition, if the user certificates stored in the certificate database of the CA certification center are stored in plain text, they are vulnerable to hackers, and the security is low. If the certificate is stored in ciphertext, it will further reduce the operating efficiency of the CA certification center, causing the CA certification center to double the investment in equipment. In short, the existing technology products for mutual identity authentication between mobile phones of users cannot meet the needs of the market

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile phone off-line authentication method
  • Mobile phone off-line authentication method
  • Mobile phone off-line authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0113] The following describes the implementation steps of identity authentication and file encryption transmission between users in an offline environment with the accompanying drawings:

[0114] figure 1 : Explain the process of identity authentication between user A1 and user A2 in an offline environment. Suppose: User A1 is the first user in the "Circle of Friends" of user A2. First, the encryption system of user A1's mobile phone is in user A1. In the mobile phone SD card chip, a set of random numbers S is generated, and the digest algorithm is used to summarize the mobile phone card number B1 and random number S of user A1 to generate "summary" information, namely: verification code L1, which is composed of matrix G and matrix G The elements of the "key seed" three-dimensional matrix T1 are mapped, the elements mapped to the matrix T1 are taken out and the signature key LK1 is synthesized, and the verification code L1 is encrypted with the signature key LK1 to obtain the ci...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a mobile phone off-line authentication method. A SD card is inserted in the mobile phone of the user, symmetric cryptographic algorithm is adopted for establishing encryption system and combined symmetric key generation algorithm is adopted for real time generating symmetric key, change is generated at every time for real time updating and effectively managing the key; in each user mobile phone, key seed corresponding to friend circle user is beforehand encrypted into the ciphertext and stored for ensuring storage safety of key seed of the friend circle user, and user identity information center is established on network, the key seeds of all users are encrypted into the ciphertext and stored in the user identity information center for ensuring the storage safety of key seeds of all users, and the safety downloading of the key seeds of friend circle users of mobile phone end is also ensured, thus the off-line authentication between the mobile phone and the user can be realized.

Description

Technical field: [0001] The invention relates to the field of wireless network communication security. Background technique: [0002] At present, the security architecture based on mobile phone identity authentication at home and abroad is based on PKI technology. PKI technology is to establish a CA certification center to complete the online identity authentication of the user’s mobile phone. Offline authentication between the user’s mobile phone cannot be achieved. The CA certification center The construction cost of PKI is relatively high. The PKI technology uses a public key system, and the operation speed is relatively slow. In addition, if the user certificate stored in the CA certification center certificate database is stored in plain text, it is vulnerable to hacker attacks and has low security. The storage of certificates in ciphertext will further reduce the operating efficiency of the CA certification center, resulting in a doubled increase in equipment investment by ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04W12/06H04W12/041H04W12/30H04W12/40
Inventor 胡祥义
Owner 胡祥义
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products