Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity authentication method, user equipment and server

A technology of identity authentication and user equipment, applied in the field of authentication, can solve problems such as security risks, achieve the effect of improving security, improving authentication security, and avoiding risks

Active Publication Date: 2017-09-22
GUOMIN RENZHENG TECH BEIJING CO LTD
View PDF7 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] An object of the present invention is to provide a kind of identity authentication method, and user equipment and server based on this method in order to solve the existing FIDO authentication standard, the security risk problem that the user exists when registering

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method, user equipment and server
  • Identity authentication method, user equipment and server
  • Identity authentication method, user equipment and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0075] In order to enable those skilled in the art to better understand the solution of the present invention, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0076] A kind of identity authentication method provided by the present invention, the basic idea is based on the existing FIDO standard system architecture, introduces the equipment authentication server (or equipment authentication center), the specific architecture is as follows: Figure 10 shown. Before and during the user's registration, the final user authentication key is obtained based on the interaction between the device authentication server, the user device (ie, the identity authentication client), and the identity authentication server, which is used to authenticate the identity of the end user.

[0077] It should be understood that, in the existing FIDO authentication standard, taking the UAF architecture as an example...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity authentication method, which is applied to a user equipment side, and comprises the steps of: sending an equipment authentication public key and an equipment unique identifier to an equipment authentication server for storage by the equipment authentication server; using an equipment authentication private key to sign a server authentication public key, and sending signature data and the equipment unique identifier to the equipment authentication server, so that the equipment authentication server retrieves the equipment authentication public key by means of the equipment unique identifier, performs signature authentication on the signature data, and returns a result to an identity authentication server for storage when the signature authentication passes; and using a service authentication private key for signing a user authentication public key, sending signature data to the identity authentication server so that the identity authentication server performs signature authentication by using the service authentication public key, and saving the user authentication public key when the signature authentication passes. The identity authentication method solves the security risk problem existing in registration of a user in the existing FIDO authentication standard. The invention further provides corresponding user equipment and servers.

Description

technical field [0001] The invention relates to authentication technology, in particular to an identity authentication method, user equipment and server. Background technique [0002] The FIDO online rapid identity authentication standard (hereinafter referred to as the FIDO standard) is an open standard protocol proposed by the FIDO Alliance, which aims to provide an online identity authentication with high security, cross-platform compatibility, excellent user experience and user privacy protection Technology Architecture. The FIDO standard completes user authentication by integrating biometrics and asymmetric encryption, trying to end the trouble that users have to memorize and use a large number of complex passwords for many years. [0003] However, FIDO's system architecture still has some security risks. In the FIDO UAF architecture, the user authentication key is generated by the authenticator embedded in the client device, the user private key is stored in the auth...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3234H04L9/3247H04L63/0853H04L63/0876
Inventor 李俊
Owner GUOMIN RENZHENG TECH BEIJING CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products