Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secure communication method and device based on identity authentication

An identity authentication and security technology, applied in the field of communication security, can solve problems such as cumbersomeness, inapplicability, and inconvenient security data communication, and achieve the effects of improving security, increasing convenience, and increasing flexibility

Active Publication Date: 2020-03-13
SUNING CLOUD COMPUTING CO LTD
View PDF23 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In addition, when using the digital certificate + TLS mechanism, it is necessary to apply for a digital certificate from a CA (Certificate Authority, certificate authority), which brings great inconvenience to the construction of secure data communication in fast application scenarios and lacks application flexibility. The TLS communication protocol requires multi-step negotiation before organizing the ciphertext to be sent. It is too cumbersome in general application scenarios and is not applicable. Instead, important information such as encryption and decryption algorithms, signature algorithms, and keys are exchanged and stored persistently in the In a two-party system, there is a degree of management risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure communication method and device based on identity authentication
  • Secure communication method and device based on identity authentication
  • Secure communication method and device based on identity authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0057] see Figure 1-Figure 3 , this embodiment provides a secure communication method based on identity authentication, including:

[0058] The requesting node and the responding node make their own electronic seals, and the electronic seal includes a verification area composed of signature algorithm, signature information, encryption algorithm, fingerprint information, digest algorithm, public key and encrypted private key; the requesting node and the responding node Report the fingerprint information in each other's electronic seals to each other, and after the two parties exchange electronic seals, extract each other's fingerprint information and compare them with the reported fingerprint information to verify their identities; after the two nodes pass the identity verification, the requesting node uses it The random factor encrypts the plaintext data to generate ciphertext data, and uses the public key of the responding node's electronic seal to encrypt the random factor ...

Embodiment 2

[0093] This embodiment provides a secure communication device based on identity authentication, including:

[0094] The seal making unit is used to make their own electronic seals by the requesting node and the responding node, and the electronic seal includes a verification algorithm composed of signature algorithm, signature information, encryption algorithm, fingerprint information, digest algorithm, public key and encrypted private key. test area;

[0095] The fingerprint registration unit is used for the requesting node and the responding node to report the fingerprint information in the electronic seal of the other party to each other, and is used to extract the fingerprint information of the other party and compare it with the reported fingerprint information to verify the identity after the two parties exchange the electronic seal;

[0096] A file encryption unit, configured to save the compressed logistics box code message in the storage system, and complete the archi...

Embodiment 3

[0100] This embodiment provides a computer-readable storage medium. A computer program is stored on the computer-readable storage medium. When the computer program is run by a processor, the steps of the above-mentioned secure communication method based on identity authentication are executed.

[0101] Compared with the prior art, the beneficial effect of the computer-readable storage medium provided by this embodiment is the same as the beneficial effect of the identity authentication-based secure communication method provided by the above technical solution, and will not be repeated here.

[0102] Those of ordinary skill in the art can understand that all or part of the steps in the above-mentioned inventive method can be completed by instructing related hardware through a program. The above-mentioned program can be stored in a computer-readable storage medium. When the program is executed, it includes: For each step of the method in the foregoing embodiments, the foregoing s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a secure communication method and device based on identity authentication, and the method and device can achieve the flexible and efficient verification of identity informationof two communication sides through electronic seals of two forced authentication sides under the condition that there is no need to apply for a digital certificate from a CA mechanism, and guaranteesthe safety of communication data. The method comprises the following steps that: a request node and a response node respectively manufacture respective electronic seals; the request node and a response node report fingerprint information in electronic seals of the opposite side; the request node encrypts plaintext data by using a random factor to generate ciphertext data, encrypts the random factor by using a public key of the electronic seals of an opposite side to obtain a communication key, and then packages and sends the ciphertext data, the communication key and the fingerprint information to the response node; and the response node compares the fingerprint information in the file package with the reported fingerprint information, decrypts the encrypted private key of the electronicseals to which the response node belongs after successful comparison, decrypts the communication key through the private key to restore the random factor, and analyzes the ciphertext data to obtain plaintext data.

Description

technical field [0001] The invention relates to the technical field of communication security, in particular to an identity authentication-based security communication method and device. Background technique [0002] In order to ensure communication security, the two nodes of the business system need to carry out security design during data communication to identify and verify the identity of the other party. Traditional security solutions mostly use digital certificates + TLS (TransportLayer Security, transport layer security protocol ) mechanism to meet the needs of identification and secure communication. In terms of identity identification, the existing technology adopts a scheme in which the initiator's identity information (such as identity code) is added in the message, and the receiver, after obtaining the identity information, verifies the legality of the other party's identity by checking the database; in terms of security, the existing technology Through the sche...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/0823H04L63/0869H04L63/0876H04L9/3231H04L9/3247H04L9/3268
Inventor 马青龙孙健张炳康夏繁丁健文
Owner SUNING CLOUD COMPUTING CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products