Identity authentication method, device, equipment and system and readable storage medium

A technology of identity authentication and equipment, applied in the direction of user identity/authority verification, transmission system, digital transmission system, etc., can solve problems such as information security threats

Active Publication Date: 2019-11-01
GUANGDONG UNIV OF TECH
View PDF4 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the key in traditional cryptography is generally stored in a non-volatile memory, and an attacker can easily steal the key through an attack during storage, which seriously threatens information security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method, device, equipment and system and readable storage medium
  • Identity authentication method, device, equipment and system and readable storage medium
  • Identity authentication method, device, equipment and system and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0056] Please refer to figure 1 , figure 1 It is a flow chart of an identity authentication method in Embodiment 1 of the present invention, which can be used for a target client, and includes the following steps:

[0057] S101. When the preset identity authentication trigger condition is met, use the PUF module in the encryption chip to obtain unique non-replicable chip information.

[0058] Wherein, the target client may be a terminal device with an encryption chip such as a computer or a smart phone. The encryption chip may be a national secret chip.

[0059] Wherein, the preset identity authentication trigger condition may be when it is determined that the current user needs to perform identity authentication, such as logging in to a certain web page or a certain device. Specifically, the PUF module may be a module including a physically unclonable function circuit, and the module is made by utilizing the deviation of process parameters in the chip manufacturing process...

Embodiment 2

[0073] Please refer to figure 2 , figure 2 It is a flowchart of an identity authentication method in Embodiment 2 of the present invention, the method includes the following steps

[0074] S201. Send the registration information to the target server, so that the target server generates a verification key including a signature verification public key, an encryption public key, and a decryption private key, and receives the encryption public key returned by the server.

[0075] When the user registers in the target server through the target client, the target client sends the registration information to the target server. Wherein, the registration information is the same as the chip information and the preset user identity information. After receiving the registration information, the target server performs a hash operation on the registration information, and uses a public key generation algorithm to calculate a string of a set length obtained by the hash operation to obtai...

Embodiment 3

[0089] The technical solution provided by the present invention will be described in detail below by taking a specific application scenario of identity authentication between a client and a server as an example.

[0090] Please refer to image 3 , the process of user registration on the server through the client is as follows:

[0091]The client sends the user name, user password and client chip identity information (client chip ID1 shown in the figure) entered by the user to the server. Among them, the client chip ID1 is a unique non-replicable information generated by the PUF module in the national secret chip in the client. The server reverses the received user name, user password, and client chip ID1 bit by bit, and obtains the reversed information corresponding to the user name, user password, and client chip ID1, such as NM1, PS1, and ID2 in the illustration. After negation, connect NM1, PS1 and ID2 end to end in turn to obtain a character string MY1. Then perform SM3...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity authentication method, which comprises the following steps: when a preset identity authentication triggering condition is reached, obtaining unique chip informationwhich cannot be copied by using a PUF module in a cryptographic chip; performing hash calculation on the chip information and preset user identity information to obtain a signature private key; signing a preset signature object by using the signature private key to obtain an initial signature; encrypting the preset signature object and the initial signature through a pre-obtained encryption public key to obtain a target signature object and a target signature; sending the authentication request to a target server; receiving success authentication information. Because the chip information is unique and cannot be copied, the security of the signature key can be enhanced, the security of the identity authentication process is ensured, and the security of information, property and the like ofa legal user is further protected. The invention further discloses an identity authentication device, equipment, a system and a readable storage medium, which have corresponding technical effects.

Description

technical field [0001] The present invention relates to the technical field of safety assurance, in particular to an identity authentication method, device, equipment, system and readable storage medium. Background technique [0002] With the development of Internet and network information technology, information security has become an inescapable problem. Identity authentication technology is the key to protecting the information security of both communication parties in the field of information security. Identity authentication technology can identify and verify the legitimacy and authenticity of user identities in network information systems. Communication, access to system resources and other operations can effectively protect information security. [0003] However, the key in traditional cryptography is generally stored in a non-volatile memory, and an attacker can easily steal the key through an attack during storage, which seriously threatens information security. F...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3247H04L9/3278H04L63/08H04L63/083
Inventor 王丽雪熊晓明
Owner GUANGDONG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products