Method, device and system for identity authentication

A technology of identity authentication and authentication request, applied in the field of identity authentication, can solve the problem of low security of identity authentication and achieve the effect of improving security

Active Publication Date: 2021-07-30
QUANTUMCTEK GUANGDONG CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, SSL VPN technology implements identity authentication between the server and the device based on an asymmetric encryption algorithm. With the improvement of computer computing power, the asymmetric encryption algorithm can be cracked, resulting in low security of identity authentication between the server and the device.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system for identity authentication
  • Method, device and system for identity authentication
  • Method, device and system for identity authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0087] In order to provide an implementation plan for improving the security of identity authentication, the embodiment of the present invention provides a method, device and system for identity authentication. The preferred embodiments of the present invention will be described below in conjunction with the accompanying drawings. It should be understood that the The preferred embodiments are only used to illustrate and explain the present invention, not to limit the present invention. And in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.

[0088] The technologies adopted in the embodiments of the present invention are explained first.

[0089] A virtual private network (Virtual Private Network, VPN) network device may be a VPN client or a VPN enterprise server in an Internet networking.

[0090] Quantum devices include two types of devices:

[0091] One is a quantum key storage device,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method, device and system for identity authentication. A quantum authentication server receives a first authentication request sent by a VPN network device, uses a first quantum key to encrypt to obtain a first ciphertext, and returns an authentication response to the VPN network device. The VPN network device uses the first quantum key to decrypt the first ciphertext in the authentication response, obtains the first check code, and generates the second check code. When the first check code and the second check code are the same, the quantum The identity authentication of the authentication server is passed. The VPN network device uses the second quantum key to encrypt to obtain the second ciphertext, and sends the second authentication request to the quantum authentication server. The quantum authentication server decrypts the second ciphertext in the second authentication request, obtains the third check code, and generates the fourth check code. When the third check code is the same as the fourth check code, the identity of the VPN network device Certification passed. In the above identity authentication process, a quantum key is used for encryption, which improves the security of identity authentication.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to an identity authentication method, device and system. Background technique [0002] With the development of Internet technology and communication technology, the network transmission of business data can be realized through the Internet, and the timeliness of business response can be improved. In order to prevent data from being intercepted or tampered with by illegal devices when data is transmitted on the Internet, the server needs to authenticate the device requesting communication, and the device also needs to authenticate the server. [0003] At present, SSL VPN (Secure Sockets Layer, Virtual Private Network, Secure Sockets Layer Virtual Private Network) technology is used to construct a secure data transmission network. However, SSL VPN technology implements identity authentication between the server and the device based on an asymmetric encryption algorithm...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0852H04L63/0869H04L63/0876
Inventor 陈洁容高锐嘉
Owner QUANTUMCTEK GUANGDONG CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products