Identity authentication method and electronic equipment

A technology for identity authentication and authentication data, applied in the field of video conferencing, can solve the problem of low efficiency of identity authentication, and achieve the effect of improving efficiency, ensuring security and ensuring efficiency

Active Publication Date: 2019-08-30
SUZHOU KEDA TECH
View PDF7 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the embodiment of the present invention provides an identity authenticatio

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and electronic equipment
  • Identity authentication method and electronic equipment
  • Identity authentication method and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without making creative efforts belong to the protection scope of the present invention.

[0052] The application scenario of the identity authentication method and the key exchange method described in the embodiment of the present invention may be: in a video conference, a video conference is performed between the server and the client, wherein the number of clients can be set according to the actual situation, hereinafter referred to as multi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of video conferences, and particularly discloses an identity authentication method and electronic equipment, and the method comprises the steps: generatinga temporary key pair, wherein the temporary key pair comprises a temporary public key and a temporary private key; sending the temporary public key to the security hardware; receiving temporary public key authentication data returned by the security hardware based on the temporary public key, wherein the temporary public key authentication data is obtained by signing a temporary public key by using a hardware private key by the security hardware; signing the identity authentication data sent by the client based on the temporary private key to obtain a signature message, and adding the temporary public key authentication data into the signature message; and sending the signature message to the client, so that the client performs identity authentication on the server. In the security hardware, only the hardware private key needs to be adopted to sign the temporary public key for one time, and the other signatures of the identity authentication data sent by all the clients can be completed in the server; and the processing performance of the server is used for signing, so that the identity authentication efficiency is greatly improved.

Description

technical field [0001] The invention relates to the technical field of video conferencing, in particular to an identity authentication method and electronic equipment. Background technique [0002] In an asymmetric cryptosystem, the public key can be made public, while the private key must be kept secret. In order to safely store the private key, generally the private key should be saved in a security chip, USB key or password card. Once the private key is imported into these secure hardware, it can no longer be read, and only the internal private key can be used to perform certain operations, such as signing or decrypting. [0003] When the security hardware is used in combination with the video conferencing platform server, since video conferencing usually may have hundreds or thousands of terminal devices logging in concurrently, this requires the security hardware to implement identity authentication for hundreds or thousands of terminal devices, or Decrypt the data se...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/08H04L29/06
CPCH04L9/3247H04L9/0825H04L63/045
Inventor 顾志松王彦杰顾振华
Owner SUZHOU KEDA TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products