A mobile phone offline authentication method

An offline authentication and mobile phone technology, applied in wireless communication, transmission systems, electrical components, etc., can solve the problems of high construction cost, slow operation speed, and vulnerability to hacker attacks of CA authentication center

Active Publication Date: 2019-10-11
胡祥义
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, at home and abroad, based on identity authentication between mobile phones, the security framework of PKI technology is adopted. PKI technology completes the online identity authentication of user mobile phones by establishing a CA certification center, and cannot realize offline authentication between user mobile phones. CA certification center The construction cost is relatively high, and the PKI technology adopts the public key system, and the operation speed is relatively slow. In addition, if the user certificates stored in the certificate database of the CA certification center are stored in plain text, they are vulnerable to hackers, and the security is low. If the certificate is stored in ciphertext, it will further reduce the operating efficiency of the CA certification center, causing the CA certification center to double the investment in equipment. In short, the existing technology products for mutual identity authentication between mobile phones of users cannot meet the needs of the market

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A mobile phone offline authentication method
  • A mobile phone offline authentication method
  • A mobile phone offline authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0113] The following describes the implementation steps of identity authentication and encrypted file transmission between users in an offline environment with reference to the accompanying drawings:

[0114] figure 1 : Indicates the process of identity authentication between user A1 and user A2 in an offline environment. Suppose: user A1 is the first user in user A2's "friend circle". In the SD card chip of the mobile phone, a set of random numbers S is generated, and the digest algorithm is called to digest the mobile phone card number B1 and the random number S of user A1 to generate "summary" information, namely: verification code L1, matrix G composed of L1, and matrix G The elements of the "key seed" three-dimensional matrix T1 are mapped, the elements mapped to the matrix T1 are taken out and the signature key LK1 is synthesized, and the verification code L1 is encrypted with the signature key LK1 to obtain the ciphertext of the verification code L1 ——Signature code L...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A mobile phone offline authentication method is to insert an SD card into the user's mobile phone, use a symmetric cryptographic algorithm to establish an encryption system, and use a combined symmetric key generation algorithm to generate a symmetric key in real time, one change at a time, to realize key security. Real-time update and effective management. In each user's mobile phone, the "key seed" corresponding to the "circle of friends" user is encrypted into ciphertext storage in advance, which ensures the storage security of the "key seed" of the "circle of friends" user. At the same time, By establishing a user identity information center on the network, the "key seed" of all users is encrypted into ciphertext and stored in the user identity information center to ensure the storage security of the "key seed" of all users, and to ensure the "key seed" of the mobile phone terminal The download of the "Seed Key" of the "Moments" user is safe, thereby realizing offline authentication between mobile phone users.

Description

Technical field: [0001] The invention relates to the field of wireless network communication security. Background technique: [0002] At present, at home and abroad, based on identity authentication between mobile phones, the security framework of PKI technology is adopted. PKI technology completes the online identity authentication of user mobile phones by establishing a CA certification center, and cannot realize offline authentication between user mobile phones. CA certification center The construction cost is relatively high, and the PKI technology adopts the public key system, and the operation speed is relatively slow. In addition, if the user certificates stored in the certificate database of the CA certification center are stored in plain text, they are vulnerable to hackers, and the security is low. If the certificate is stored in ciphertext, it will further reduce the operating efficiency of the CA certification center, causing the CA certification center to double...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04W12/06H04W12/041H04W12/30H04W12/40
Inventor 胡祥义
Owner 胡祥义
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products