Identity authentication method, device and system

A technology of identity authentication and authentication request, applied in the field of communication, can solve problems such as leakage of user security information, low security of one-way authentication, hidden dangers of access security, etc., and achieve the effect of improving security

Active Publication Date: 2017-01-11
ZTE CORP
View PDF8 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the inventor found during the research process that if the one-way authentication method is used, once the data of the control center is leaked, the user's security information will also be leaked immediately, which poses a security risk for the device's access to the control center
[0006] It can be seen that there is a problem of low security in the one-way authentication method of identity authentication, and no effective solution has been proposed for this problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method, device and system
  • Identity authentication method, device and system
  • Identity authentication method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] Hereinafter, the present invention will be described in detail with reference to the drawings and examples. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.

[0030] Additional features and advantages of the invention will be set forth in the description which follows, and in part will be apparent from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention may be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.

[0031]In order to enable those skilled in the art to better understand the solutions of the present invention, the following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the drawings in the embodiments of the prese...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an identity authentication method, device and system. The method comprises the following steps: a control center obtains an authentication request, wherein the authentication request is encrypted by a user private key of a user, an equipment private key of equipment sending the authentication request and a control center public key of the control center; the control center decrypts the authentication request by using a control center private key of the control center to obtain a decrypted authentication request, a user identifier of the user and an equipment identifier of the equipment; the control center selects an equipment public key of the equipment and a user public key of the user according to the equipment identifier and the user identifier to decrypt the decrypted authentication request to obtain a first authentication parameter; and the control center judges whether the authentication request is legitimate according to the first authentication parameter. By adopting the identity authentication method, device and system provided by the invention, the problem of low security of the single authentication mode of identity authentication is solved, and the security of the identity authentication is improved.

Description

technical field [0001] The present invention relates to the communication field, in particular to an identity authentication method, device and system. Background technique [0002] Smart home is based on the residence as a platform, using integrated wiring technology, network communication technology, security technology, automatic control technology, audio and video technology, etc. to integrate home life-related facilities to build an efficient management system for residential facilities and family schedules. It can improve home safety, convenience and comfort, and realize an environment-friendly and energy-saving living environment. [0003] It can be seen that smart home is a networked and intelligent home control system that integrates automation control system, computer network system and network communication technology. It allows users to manage home devices more conveniently, for example, through touch screen, Wireless remote control, telephone, Internet or voice...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32G05B19/418H04L29/06
CPCH04L9/32Y02P90/02
Inventor 李伟华赖静
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products