An identity verification method and system based on tee digital certificate

A digital certificate and identity information technology, applied in the information field, can solve problems such as low cost, insecure and unstable identity authentication methods

Active Publication Date: 2018-12-14
神州融安数字科技(北京)有限公司
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] In view of this, the technical problem to be solved by this application is that the existing identity authentication methods are insecure, unstable, inconvenient and low in compatibility

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An identity verification method and system based on tee digital certificate
  • An identity verification method and system based on tee digital certificate
  • An identity verification method and system based on tee digital certificate

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0084]An identity verification method based on a TEE digital certificate, comprising a terminal 2 pre-configured digital certificate system 1, a digital certificate signature process and a digital certificate verification process, characterized in that the terminal 2 has a TEE, and the digital certificate signature process , performed on the terminal 2, used to sign the user request using a digital certificate private key, the digital certificate verification process is used to authenticate the identity of the user requesting, and the authentication method includes verifying the legality of the digital certificate and Validity, integrity and correctness of the signature; wherein, the digital certificate signing process is performed under the TEE.

[0085] The user request specifically includes an application request of the client, and the application request needs to be authenticated. The digital certificate system 1 is located in the terminal 2TEE, TEE is the abbreviation of ...

Embodiment 2

[0090] An identity verification method based on a TEE digital certificate, comprising a terminal 2 pre-configured digital certificate system 1, a digital certificate signature process and a digital certificate verification process, characterized in that the terminal 2 has a TEE, and the digital certificate signature process , performed on the terminal 2, used to sign the user request using a digital certificate private key, the digital certificate verification process is used to authenticate the identity of the user requesting, and the authentication method includes verifying the legality of the digital certificate and Validity, integrity and correctness of the signature; wherein, the digital certificate signing process is performed under the TEE.

[0091] like figure 1 As shown in the flow chart of the digital certificate signing process in the embodiment of the present application, the client is an internal application client of the terminal 2, and the internal application c...

Embodiment 3

[0101] An identity verification method based on a TEE digital certificate, comprising a terminal 2 pre-configured digital certificate system 1, a digital certificate signature process and a digital certificate verification process, characterized in that the terminal 2 has TEE and REE, and the digital certificate The signature process is performed on the terminal 2, and is used to generate a digital certificate for the user request, and the digital certificate verification process is used to authenticate the identity of the user requesting, and the authentication method includes the digital certificate; wherein the digital certificate The system 1 is located in the terminal 2TEE, and the digital certificate signing process is performed under the TEE.

[0102] The client is an external application client of the terminal 2, and the digital certificate signing process includes:

[0103] Step ①: The digital certificate system 1 securely stores user identity information, root CA cer...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This application discloses a TEE-based digital certificate identity verification method, including a terminal pre-configured digital certificate system, a digital certificate signing process and a digital certificate verification process, characterized in that the terminal is equipped with a TEE, and the digital certificate signature The process is performed on the terminal, and is used to sign a user request using a digital certificate private key. The digital certificate verification process is used to authenticate the identity of the user requesting. The authentication method includes verifying the legality of the digital certificate and Validity, integrity and correctness of the signature; wherein, the digital certificate signing process is carried out under the TEE; sensitive information such as the user's key, identity information, biometric information and password information pass through the secure storage module under the TEE Storage avoids many problems in the existing technology, such as the signature process is carried out in the REE, and user sensitive information is stored in the REE environment, resulting in privacy leaks and hidden dangers of property theft.

Description

technical field [0001] This application relates to the field of information technology, in particular, to a TEE-based digital certificate identity verification method and system. Background technique [0002] PKI is the abbreviation of Public Key Infrastructure, that is, public key infrastructure. It is a system or platform that provides asymmetric encryption and decryption and digital signature verification services. The purpose is to manage keys and digital certificates. PKI is a standard-compliant technology and specification that uses public key encryption technology to provide a set of security basic platforms for the development of e-commerce and e-government. [0003] In order to improve the identity authentication security of online banking, telephone banking, online securities, telephone securities, online shopping, online games and other network application systems, various industries and enterprises have launched PKI, OTP, Identity authentication systems such as ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
CPCH04L9/3231H04L9/3249H04L9/3263
Inventor 李登峰
Owner 神州融安数字科技(北京)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products