Method for implementing trusted identity authentication by loading PKI based on SIM card

A technology of identity authentication and identity credential, which is applied in the field of communication, can solve the problem of many electronic authentication terminal carriers, and achieve the effect of avoiding many carriers

Active Publication Date: 2019-02-19
SHENZHEN ANXIN CERTIFICATION SYST CO LTD
View PDF10 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the embodiment of the present application provides a method, device, computer-readable storage medium, and terminal equipment for trusted identity authentication based on loading PKI with a SIM card, so as to solve the problem of numerous electronic authentication terminal carriers in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for implementing trusted identity authentication by loading PKI based on SIM card
  • Method for implementing trusted identity authentication by loading PKI based on SIM card
  • Method for implementing trusted identity authentication by loading PKI based on SIM card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In the following description, specific details such as specific system structures and technologies are presented for the purpose of illustration rather than limitation, so as to thoroughly understand the embodiments of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments without these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.

[0026] It should be understood that when used in this specification and the appended claims, the term "comprising" indicates the presence of described features, integers, steps, operations, elements and / or components, but does not exclude one or more other features. , whole, step, operation, element, component and / or the presence or addition of a collection thereof.

[0027] It shou...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention is applicable to the technical field of communication, and provides a method for implementing trusted identity authentication by loading PKI based on an SIM card. The method comprises the following steps: receiving first request information of a user, and auditing the identity of the user according to the first request information; if the identity of the user is approved, generatinga CTID-based trusted identity certificate, establishing a corresponding relationship between the CTID-based trusted identity certificate and the SIM card of the user; sending a first association request to the SIM card; receiving a public key of the trusted identity certificate returned by the SIM card, creating a trusted identity certificate by using the public key of the trusted identity certificate, storing the trusted identity certificate, and loading the trusted identity certificate in the SIM card. By adoption of the method, the problem that electronic authentication terminal carriers are numerous, resulting in carrying inconvenience and use inconvenience of the user in the prior art is solved effectively.

Description

technical field [0001] The present application relates to the field of communication technology, and in particular to a method, device, computer-readable storage medium and terminal equipment for implementing trusted identity authentication based on SIM card loading PKI. Background technique [0002] With the development of mobile communication and Internet technology, there are more and more applications for electronic authentication services in various industries such as banking, securities, commerce, trade, office, education, and e-government. Most of the existing electronic authentication terminal carriers are client certificate USB key (a high-level security tool for online banking authentication business), such as U-shield. [0003] At present, electronic authentication service providers cannot communicate with each other. When handling online business of different banks, different USB-shields need to be used for electronic authentication. This requires users to apply ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04W12/06H04W12/069
CPCH04L9/3247H04L9/3263H04L63/0823H04L63/0853H04W12/06H04L2463/102
Inventor 黄学文蔡丹高峰张子昱
Owner SHENZHEN ANXIN CERTIFICATION SYST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products