Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity authentication method and system

An identity authentication and certificate technology, applied in the field of identity authentication methods and systems, can solve problems such as user security risks, vulnerability to man-in-the-middle attacks, key information theft, etc., and achieve the effect of avoiding security risks, preventing man-in-the-middle attacks, and ensuring secure transmission.

Active Publication Date: 2017-02-22
SHENZHEN TRANSSION HLDG CO LTD
View PDF4 Cites 42 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, smart terminal devices such as smartphones are widely popularized. When users use these smart terminal devices to communicate, the communication content is easily monitored and stolen by malicious software.
However, the existing encrypted communication methods usually use software encryption algorithm or hardware encryption algorithm, and the key information is directly included in the interactive message during the process of establishing a call between the calling party and the called party. This method is easy to cause the key information to be Stealing, making the call process of both parties vulnerable to Man-in-the-Middle Attack (MITM), resulting in encrypted call content being cracked, tampered with and sniffed, bringing security risks to users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and system
  • Identity authentication method and system
  • Identity authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] see figure 1 , figure 1 It is a schematic flow chart of an identity authentication method provided in Embodiment 1 of the present invention. The execution subject of this embodiment includes a terminal and a server, where the terminal may be a smart phone or other smart terminal. figure 1 The shown identity authentication method may include the following steps:

[0038] S101. The terminal randomly generates a signature key pair including a signature public key and a signature private key.

[0039] Specifically, the signature key pair randomly generated by the terminal is used for performing a digital signature and verifying the digital signature.

[0040] S102. The terminal uses the signature public key to apply for a digital certificate and an encryption key pair from the server, where the encryption key pair includes an encryption public key and an encryption private key.

[0041] Specifically, the server includes a certificate authority (Certificate Authority, CA)...

Embodiment 2

[0058] see figure 2 , figure 2 It is a schematic flow chart of an identity authentication method provided in Embodiment 2 of the present invention. The execution subject of this embodiment includes a terminal and a server, wherein the terminal may be a smart phone or other smart terminal. figure 2 The shown identity authentication method may include the following steps:

[0059] S201. The terminal randomly generates a signature key pair including a signature public key and a signature private key.

[0060] Specifically, the signature key pair randomly generated by the terminal is used for performing a digital signature and verifying the digital signature.

[0061] S202. The terminal sends a digital certificate application request including the signature public key to the server.

[0062] Specifically, the server includes a CA function, which can implement functions such as issuing certificates, authenticating certificates, and managing issued certificates. The terminal ...

Embodiment 3

[0102] see Figure 4 , Figure 4 It is a schematic block diagram of an identity authentication system provided by Embodiment 3 of the present invention. For ease of description, only parts related to the embodiments of the present invention are shown. Figure 4 The example identity authentication system 300 may be the execution subject of the identity authentication method provided in the first embodiment. Figure 4 The example identity authentication system 300 mainly includes a terminal 31 and a server 32, and the details are as follows:

[0103] Terminal 31 includes:

[0104] A key generating unit 311, configured to randomly generate a signature key pair comprising a signature public key and a signature private key;

[0105] A certificate application unit 312, configured to use the signature public key generated by the key generation unit 311 to apply to the server for a digital certificate and an encryption key pair, wherein the encryption key pair includes an encrypti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses an identity authentication method and system, and the method comprises the steps that a terminal randomly generates a signature secret key pair comprising a signature public key and a signature secret key; the terminal uses the signature public key to apply for a digital certificate and an encryption secret key pair from a server; the terminal carries out the signature of a first interaction message in a process of building communication with opposite terminal equipment through the signature secret key, and enables the first interaction message after signature to be transmitted to the opposite terminal equipment; the terminal carries out the signature of the digital certificate of the terminal equipment through the server if the terminal receives a second interaction message sent by the opposite terminal equipment; and the terminal confirms the valid identity of the opposite terminal equipment if the signature verification is passed. According to the embodiment of the invention, the method can carry out the verification of the validity of the identities of two communication sides of intelligent terminals through the valid generation and transmission of the digital certificate and the combination with the server to complete the signature and signature verification processes, and guarantees the safe transmission of communication contents.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to an identity authentication method and system. Background technique [0002] At present, smart terminal devices such as smart phones are widely popularized. When users use these smart terminal devices to communicate, the communication content is easily monitored and stolen by malicious software. However, the existing encrypted communication methods usually use software encryption algorithm or hardware encryption algorithm, and the key information is directly included in the interactive message during the process of establishing a call between the calling party and the called party. This method is easy to cause the key information to be Stealing makes the call process of both parties vulnerable to Man-in-the-Middle Attack (MITM), resulting in encrypted call content being cracked, tampered with and sniffed, bringing security risks to users. Contents of the invention [000...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0428H04L63/0823
Inventor 刘岩
Owner SHENZHEN TRANSSION HLDG CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products