Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for realizing trusted identity authentication based on sim card loading pki

A technology of identity authentication and identity certificate, applied in the field of communication, can solve the problems of numerous electronic authentication terminal carriers

Active Publication Date: 2020-12-25
SHENZHEN ANXIN CERTIFICATION SYST CO LTD
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the embodiment of the present application provides a method, device, computer-readable storage medium, and terminal equipment for trusted identity authentication based on loading PKI with a SIM card, so as to solve the problem of numerous electronic authentication terminal carriers in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing trusted identity authentication based on sim card loading pki
  • Method for realizing trusted identity authentication based on sim card loading pki
  • Method for realizing trusted identity authentication based on sim card loading pki

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In the following description, specific details such as specific system structures and technologies are presented for the purpose of illustration rather than limitation, so as to thoroughly understand the embodiments of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments without these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.

[0026] It should be understood that when used in this specification and the appended claims, the term "comprising" indicates the presence of described features, integers, steps, operations, elements and / or components, but does not exclude one or more other features. , whole, step, operation, element, component and / or the presence or addition of a collection thereof.

[0027] It shou...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This application is applicable to the field of communication technology, and provides a method for implementing trusted identity authentication based on SIM card loading PKI, including: receiving the first request information of the user, and verifying the identity of the user according to the first request information; If the user's identity verification is passed, then generate a trusted identity certificate based on CTID, set up the corresponding relationship between the trusted identity certificate based on CTID and the user's SIM card; send the first association request to the SIM card; receive the The public key of the trusted identity certificate returned by the SIM card, using the public key of the trusted identity certificate to make a trusted identity certificate, storing the trusted identity certificate, and loading the trusted identity certificate to the SIM stuck. The method above effectively solves the problem of inconvenient portability and use by users due to the large number of electronic authentication terminal carriers in the prior art.

Description

technical field [0001] The present application relates to the field of communication technology, and in particular to a method, device, computer-readable storage medium and terminal equipment for implementing trusted identity authentication based on SIM card loading PKI. Background technique [0002] With the development of mobile communication and Internet technology, there are more and more applications for electronic authentication services in various industries such as banking, securities, commerce, trade, office, education, and e-government. Most of the existing electronic authentication terminal carriers are client certificate USB key (a high-level security tool for online banking authentication business), such as U-shield. [0003] At present, electronic authentication service providers cannot communicate with each other. When handling online business of different banks, different USB-shields need to be used for electronic authentication. This requires users to apply ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32H04W12/06H04W12/069
CPCH04L9/3247H04L9/3263H04L63/0823H04L63/0853H04W12/06H04L2463/102
Inventor 黄学文蔡丹高峰张子昱
Owner SHENZHEN ANXIN CERTIFICATION SYST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products