Authentication management method and related equipment

A technology for authentication management and information management, applied in the fields of terminal equipment and authentication management systems, authentication management methods, and empowered servers, it can solve problems such as malicious deductions, evasion of tolls, and irregular key media management, and achieve enhanced Authentication strength, effect of improving security

Active Publication Date: 2019-11-01
WATCHDATA SYST
View PDF11 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004]However, the existing key management mechanism of the security authentication module cannot deal with illegal authentication occasions after being stolen
Moreover, the non-networked key management of many public utility applications across the country, including public transport, is in a dangerous situation of "with technology, without management, with application, without supervision", and there are no corresponding management regulations to clarify the responsibilities, division of labor, and obligations of each unit , rights, and key usage management norms and business processes, further causing loopholes in the current key management
For example: the key medium management represented by the point-of-

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication management method and related equipment
  • Authentication management method and related equipment
  • Authentication management method and related equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0059] Such as figure 1 as shown, figure 1 The system architecture diagram involved in the authentication management method provided by the embodiment of the present invention. The system architecture includes an authorization server 101 , a terminal device 102 and a service center system 103 , and the authorization server 101 can communicate with the terminal device 102 and the service center system 103 respectively. In other embodiments, the terminal device 102 can also communicate with the service center system 103 .

[0060] The service center system 103 can be used to authenticate the authorization server, allocate authorization times for the authorization server 101, and identify and manage the authorization server 101 and other equipment.

[0061] The authorization server 101 can be used to authorize and manage the authentication of the terminal device 102 and the authentication module on the terminal device 102, for example, manage the usage times of the authenticati...

Embodiment 2

[0071] Such as figure 2 as shown, figure 2 It is a schematic flowchart of an authentication management method provided by an embodiment of the present invention.

[0072] refer to figure 1 Examples shown, and figure 2 , the authentication management method of the embodiment of the present invention, comprises the following steps:

[0073] Step 201: The authorization server acquires the first serial number sent by the terminal device.

[0074] Wherein, the first serial number is identification information of the authentication module on the terminal device. For details about the authorization server, terminal devices and authentication modules, please refer to figure 1 A detailed description of the illustrated embodiment.

[0075] The terminal device sends the first serial number to the authorization server, so that the authorization server can obtain the first serial number.

[0076] For example, after detecting that a certain authentication module is powered off and...

example 1

[0130] Such as Figure 4 As shown, in this example, the specific process is as follows:

[0131] Step 401: The authorization server shakes hands with the service center system. For the specific handshake process, please refer to image 3 The specific description of the embodiment of the handshake between the authorization server and the service center system shown. After the handshake is successful, the session key is temporarily stored in the security authentication device, such as the work key and the message authentication code (Message Authentication Code, MAC) key, etc. In the subsequent process, the data transmission between the terminal equipment installed with the authentication module and the center is encrypted and protected by the working key, and the process will not be described in detail.

[0132] Step 402: The authorization server initiates an instruction to acquire a random number of the security authentication device.

[0133] Step 403: The authorization se...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an authentication management method, an empowerment server, a terminal device and an authentication management system, and belongs to the field of data processing. The methodcomprises: an empowerment server obtaining a first serial number sent by a terminal device, and the first serial number being identification information of an authentication module on the terminal device; the empowerment server judging whether an authentication key corresponding to the first serial number exists in a pre-stored management information file or not, wherein the management informationfile comprises a corresponding relationship between the serial number and the authentication key; if an authentication key corresponding to the first serial number exists in the management information file, deducting the authorization frequency in the management information file by the authorization server, and generating an authentication ciphertext by using the authentication key; and the empowerment server sending the authentication ciphertext to the terminal device, so that the terminal device executes a preset operation after successfully verifying the authentication ciphertext through the authentication module. By adopting the method provided by the invention, the security of authentication management can be improved.

Description

technical field [0001] The invention belongs to the field of data processing, and in particular relates to an authentication management method, an authorization server, terminal equipment and an authentication management system. Background technique [0002] At present, most security authentication modules are used in offline mode, and the authentication process of these security authentication modules involves key management. [0003] The security protection of the security authentication module set on the terminal device in offline mode is currently only realized through the internal key management mechanism of the security authentication module, for example, through the control of the number of wrong key attempts, or through the mechanism of physical anti-disassembly to prevent The security authentication module was forcibly removed. [0004] However, the existing key management mechanism of the security authentication module cannot deal with illegal authentication occas...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/08H04L63/06H04L63/0823H04L63/0428H04L9/3263
Inventor 孙婉丽
Owner WATCHDATA SYST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products