Identity authentication method and electronic device

A technology of identity authentication and authentication data, applied in user identity/authority verification, electrical components, digital transmission systems, etc., can solve the problem of low efficiency of identity authentication and achieve the effect of improving efficiency

Active Publication Date: 2022-03-15
SUZHOU KEDA TECH
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the embodiment of the present invention provides an identity authentication method and electronic equipment to solve the problem of low efficiency of identity authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and electronic device
  • Identity authentication method and electronic device
  • Identity authentication method and electronic device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without making creative efforts belong to the protection scope of the present invention.

[0052] The application scenario of the identity authentication method and the key exchange method described in the embodiment of the present invention may be: in a video conference, a video conference is performed between the server and the client, wherein the number of clients can be set according to the actual situation, hereinafter referred to as multi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of video conferencing, and specifically discloses an identity authentication method and electronic equipment, wherein the method includes: generating a temporary key pair; the temporary key pair includes a temporary public key and a temporary private key; and sending the temporary public key to security hardware; Receive the temporary public key authentication data returned by the secure hardware based on the temporary public key; the temporary public key authentication data is obtained by signing the temporary public key with the hardware private key by the secure hardware; sign the identity authentication data sent by the client based on the temporary private key , to get the signed message, and add the temporary public key authentication data to the signed message; send the signed message to the client for the client to authenticate the server. In the secure hardware, it is only necessary to use the hardware private key to sign the temporary public key once, and the rest of the signatures for the identity authentication data sent by each client can be completed in the server; using the processing performance of the server to sign, greatly improving the identity authentication s efficiency.

Description

technical field [0001] The invention relates to the technical field of video conferencing, in particular to an identity authentication method and electronic equipment. Background technique [0002] In an asymmetric cryptosystem, the public key can be made public, while the private key must be kept secret. In order to safely store the private key, generally the private key should be saved in a security chip, USB key or password card. Once the private key is imported into these secure hardware, it can no longer be read, and only the internal private key can be used to perform certain operations, such as signing or decrypting. [0003] When the security hardware is used in combination with the video conferencing platform server, since video conferencing usually may have hundreds or thousands of terminal devices logging in concurrently, this requires the security hardware to implement identity authentication for hundreds or thousands of terminal devices, or Decrypt the data se...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08H04L9/40
CPCH04L9/3247H04L9/0825H04L63/045
Inventor 顾志松王彦杰顾振华
Owner SUZHOU KEDA TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products