Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication method, device and system based on untrusted environment

An authentication method and a technology of an authentication device, which are applied in the field of cryptography and can solve problems such as the difficulty of the PKI system.

Active Publication Date: 2019-10-22
上海铂英飞信息技术有限公司
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The main purpose of this application is to provide an authentication method, device and system based on an untrusted environment to solve the problem of difficulty in building a PKI system for small and micro users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method, device and system based on untrusted environment
  • Authentication method, device and system based on untrusted environment
  • Authentication method, device and system based on untrusted environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] In order to enable those skilled in the art to better understand the solution of the present application, the technical solution in the embodiment of the application will be clearly and completely described below in conjunction with the accompanying drawings in the embodiment of the application. Obviously, the described embodiment is only It is an embodiment of a part of the application, but not all of the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of this application.

[0056]It should be noted that the terms "first" and "second" in the description and claims of the present application and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It should be understood that the data so used may be interchanged under appropriate circumstances for ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authentication method, device and system based on an untrusted environment. The method comprises: an intelligent contract interface acquiring certificate application data submitted by any participant authentication party; the intelligent contract interface issuing the certificate application data to each participant authentication party, so that each participant authentication party signs the certificate application data based on a private key; receiving a signature of each participant authentication party for the certificate application data, and generating a groupsignature according to the signature of each participant authentication party for the certificate application data; authenticating the legality of the group signature according to the group public keycorresponding to the group signature; and if the authentication is passed, generating a digital certificate for the participant authenticator submitting the certificate application data. According tothe invention, the problem of high difficulty in constructing the PKI system by small and micro users is solved.

Description

technical field [0001] The present application relates to the technical field of cryptography, in particular, to an authentication method, device and system based on an untrusted environment. Background technique [0002] The existing public key infrastructure (Public Key Infrastructure, PKI) system of the certificate system is based on an authoritative third-party certification body. The industry standard certificate format supports better, and the cost of custom certificate format is higher, which is suitable for industry and enterprise customers. For small and micro users, it is difficult to build their own PKI system, and there is also a lack of endorsement from trusted institutions. Contents of the invention [0003] The main purpose of this application is to provide an authentication method, device and system based on an untrusted environment, so as to solve the problem of difficulty in building a PKI system for small and micro users. [0004] In order to achieve t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
CPCH04L9/3255H04L9/3268
Inventor 龚海刚章庆
Owner 上海铂英飞信息技术有限公司