Identity authentication method and system without CA
A technology for identity authentication and authentication results, applied in the field of identity authentication methods and systems without CA, can solve the problems of large communication flow, poor communication stability, and high interaction complexity, and achieve the effect of reducing communication flow and complexity.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0071] In order to make the objectives, technical solutions, and advantages of the present invention clearer, the following further describes the present invention in detail with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are only used to explain the present invention, and do not limit the protection scope of the present invention.
[0072] figure 1 The flow of the identity authentication method without CA (certificate management authority) of the present invention in an embodiment is shown in Figure one In this embodiment, the processing process of a security chip (TPM, Trusted Platform Module) is taken as an example for description. Here, the security chip is a trusted platform module, which is a device that can independently perform key generation, encryption and decryption. The chip is installed in the terminal device.
[0073] Such as figure 1 As shown, in this embodiment, the processing proce...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap