Method and system for carrying out identity authentication on information acquisition terminal user

A technology for terminal users and information collection, which is applied in the field of information security and can solve problems such as identity authentication of information collection terminal users

Active Publication Date: 2020-03-13
CHINA ELECTRIC POWER RES INST
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The technical solution of the present invention provides a method and system for identity authentication of information collection terminal users, so as to solve the problem of how to carry out identity authentication for information collection terminal users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for carrying out identity authentication on information acquisition terminal user
  • Method and system for carrying out identity authentication on information acquisition terminal user
  • Method and system for carrying out identity authentication on information acquisition terminal user

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] Exemplary embodiments of the present invention will now be described with reference to the drawings; however, the present invention may be embodied in many different forms and are not limited to the embodiments described herein, which are provided for the purpose of exhaustively and completely disclosing the present invention. invention and fully convey the scope of the invention to those skilled in the art. The terms used in the exemplary embodiments shown in the drawings do not limit the present invention. In the figures, the same units / elements are given the same reference numerals.

[0040] Unless otherwise specified, the terms (including scientific and technical terms) used herein have the commonly understood meanings to those skilled in the art. In addition, it can be understood that the terms defined by commonly used dictionaries should be understood to have consistent meanings in the context of their related fields, and should not be understood as idealized or ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a system for carrying out identity authentication on an information acquisition terminal user. The method comprises the following steps: acquiring an encrypted request packet through a client; forwarding the encrypted request packet to an authentication server through the client based on the protocol encapsulation message; enabling the authentication server toencrypt and assemble the encrypted request packet through an encryption machine by using a secret key, and forward the assembled request packet to a security isolation gateway; decrypting the assemblyrequest packet for the first time through the security isolation gateway, and forwarding the decrypted assembly request packet to the use and collection system; performing secondary decryption on anassembly request packet subjected to primary decryption by using a collection system, and verifying identity information of an information collection terminal user to obtain an identity verification result; encrypting an identity verification result of an information acquisition terminal user by using an acquisition system, and sending the identity verification result to an authentication server;and enabling the authentication server to decrypt the identity verification result and forward the decrypted identity verification result to the client.

Description

technical field [0001] The present invention relates to the technical field of information security, and more specifically, to a method and system for identity authentication of information collection terminal users. Background technique [0002] The electricity consumption information collection system is a system that collects, processes and monitors electricity consumption information of power users in real time. The electricity, electricity charges, rates and other information involved in the system are related to the national economy and the people's livelihood, and the illegal use and leakage of information will cause national Security, social economy, and power grid operation pose great threats, and the basic source of information is provided by the collection terminal, so ensuring the access security of the power collection terminal has become a top priority [0003] Therefore, a technology is needed to realize the technology for identity authentication of informatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0478H04L63/0428H04L63/0892
Inventor 付义伦梁晓兵翟峰刘书勇李保丰岑炜曹永峰许斌徐萌张庚冯占成任博冯云
Owner CHINA ELECTRIC POWER RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products