Identity authentication method, device and system

A technology of identity authentication and equipment, applied in the field of communication, can solve problems such as compatibility problems, and achieve the effect of avoiding compatibility problems

Active Publication Date: 2018-06-01
HUAWEI TECH CO LTD
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the large number of terminal devices in the Internet of Things, the expansion of the TLS protocol supported by the peer devices and network devices may cause compatibility issues in the identity authentication process between devices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method, device and system
  • Identity authentication method, device and system
  • Identity authentication method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] see figure 1 , is a schematic structural diagram of an embodiment of the communication system of the present application.

[0053] Such as figure 1 Said, the communication system may include a first device 101 , a second device 102 , and a key generation center 103 .

[0054] Wherein, encrypted data transmission may be performed between the first device 101 and the second device 102 . The cryptographic algorithm protocol, authentication and key agreement process required for encrypted data transmission between the first device 101 and the second device 102 can all be completed by using the TLS protocol.

[0055]The TLS protocol is composed of two layers: TLS record protocol (TLS Record) and TLS handshake protocol (TLS Handshake). The handshake protocol is the core part of TLS. It completes functions such as cryptographic algorithm protocol, authentication, and session key generation between the client and server, and is the prerequisite for secure data transmission b...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity authentication method, a device and a system. The method comprises the steps that a first device obtains a first main public key and a first private key from a keygeneration center; the first device sends a client hello message, wherein the client hello message carries cipher suites of pre-shared key cipher suites (PSK) modes; the first device obtains a secondidentity from a server key exchange message; the first device generates a pre-shared key of the selected PSK mode through utilization of the second identity, the first private key and the first main public key; and the first device finishes identity authentication with a second device through utilization of the pre-shared key. Through adoption of the method, the device and the system provided by the embodiment of the invention, the identity can be transmitted through utilization of information in a TLS (Transport Layer Security) protocol, so the TLS protocol does not need to be expanded, and the compatibility problem resulting from expanding the TLS protocol can be avoided.

Description

technical field [0001] The present application relates to the field of communications, in particular to an identity authentication method, device and system. Background technique [0002] The non-interactive key agreement technology is a technology used by two communicating parties to generate a pre-shared key. Different from the traditional key agreement, the non-interactive key agreement can realize that the two communicating parties can use their own key information and the other party's public information to generate the same pre-shared key without exchanging information. Identity-based non-interactive key agreement is a special key agreement. This technology is a key agreement protocol based on identity-based ciphers. The public information of both communication parties is their own identity, such as email address, IP address and domain name etc. [0003] In the IoT scenario, whether it is the communication between terminal devices or the communication between termina...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/06H04L63/0876H04L63/166H04L63/0823H04L63/062H04L69/00H04L63/061H04W12/0433H04W12/041H04W12/069H04W12/0431H04L9/40
Inventor 时杰杨艳江王贵林
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products