Supercharge Your Innovation With Domain-Expert AI Agents!

Digital signature authentication method, device and system

A digital signature and identity authentication technology, applied in the field of the Internet of Things, can solve the problems of high requirements for terminal memory and computing performance, high authentication costs, payment, etc., and achieve the effect of making up for the high cost of authentication

Active Publication Date: 2019-05-07
CHINA TELECOM CORP LTD
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Therefore, there is a need to pay the CA when the terminal is authenticated, resulting in high certification costs and high requirements for terminal memory and computing performance, which is not suitable for low-level IoT terminals.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Digital signature authentication method, device and system
  • Digital signature authentication method, device and system
  • Digital signature authentication method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0069] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. The following description of at least one exemplary embodiment is merely illustrative in nature and in no way taken as limiting the invention, its application or uses. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0070] The relative arrangements of components and steps, numerical expressions and numerical values ​​set forth in these embodiments do not limit the scope of the present invention unless specifically stated otherwise.

[0071] At the same time, it should be understood that, for the convenience of d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a digital signature authentication method, device and system. The method comprises the steps that a key management center obtains terminal identity information of terminal equipment; The key management center generates a terminal equipment key according to the terminal identity information of the terminal equipment, and distributes the terminal equipment key to the terminalequipment; And the identity authentication node authenticates the terminal equipment according to the key of the terminal equipment. According to the invention, the terminal identity information is directly used as the public key, so that the defects of high terminal certificate authentication cost, high terminal performance requirement and the like in the prior art can be overcome on the premiseof ensuring the terminal authentication security.

Description

technical field [0001] The present invention relates to the field of the Internet of Things, in particular to a digital signature authentication method, device and system. Background technique [0002] At present, the digital signature authentication method used in the industry adopts the method based on the public key infrastructure PKI. The user needs to apply for a certificate for his public key from one or more certification authorities (CA), and the CA issues a certificate for the user's public key. The user's ownership of the public key. Verifying the public key certificate is actually verifying the CA's signature on the certificate. [0003] Therefore, there is a need to pay the CA when the terminal is authenticated, resulting in high authentication costs and high requirements for terminal memory and computing performance, which is not suitable for IoT terminals with low processing levels. Contents of the invention [0004] In view of the above technical problems,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32
Inventor 孔勇平钟致民陆钢黄泽源沙庆良周丽莎马壮展李丽陈久雨
Owner CHINA TELECOM CORP LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More