Identity authentication method, terminal and server

An identity authentication and server technology, applied in the field of information security, can solve the problems of complex authentication process, high performance requirements, and inapplicability of multiple terminal lightweight identity authentication, to achieve the effect of simple authentication process

Active Publication Date: 2021-01-29
国网思极网安科技(北京)有限公司 +4
View PDF9 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The existing identity authentication method is based on the public key infrastructure technology (PKI system). Since the authentication process involves a complete authentication chain such as a CA institution, the authentication process is complicated, the performance requirements are high, and the authentication process needs to be networked to complete the authentication process, which is not applicable. For lightweight authentication of multiple terminals

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method, terminal and server
  • Identity authentication method, terminal and server
  • Identity authentication method, terminal and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] In order to make the purpose, technical solutions and advantages of the present disclosure clearer, the present disclosure will be further described in detail below in conjunction with specific embodiments and with reference to the accompanying drawings.

[0059] It should be noted that, unless otherwise defined, the technical terms or scientific terms used in one or more embodiments of the present specification shall have ordinary meanings understood by those skilled in the art to which the present disclosure belongs. "First", "second" and similar words used in one or more embodiments of the present specification do not indicate any order, quantity or importance, but are only used to distinguish different components. "Comprising" or "comprising" and similar words mean that the elements or items appearing before the word include the elements or items listed after the word and their equivalents, without excluding other elements or items. Words such as "connected" or "con...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

One or more embodiments of the present specification provide an identity authentication method, a terminal and a server. The terminal obtains a public key and a private key pair according to a deviceidentification number, generates a random number, and performs digital signature processing on the device identification number and the random number by using a private key to obtain signature data, and sends the device identification number, the random number and the signature data to a server, so that the server searches a public key corresponding to the terminal from a preset public key matrixaccording to the device identification number, verifies the signature data by using the searched public key, generates a communication key if the verification is passed, encrypts the communication keyby using the searched public key, obtains a ciphertext communication key, sends the ciphertext communication key to the terminal, receives a ciphertext communication key sent by the server, decryptsthe ciphertext communication key by using the private key to obtain a communication key, and performs secret communication with the server by using the communication key. According to the embodiment of the invention, identity authentication between the terminal and the server can be realized, and the authentication process is relatively simple.

Description

technical field [0001] One or more embodiments of this specification relate to the technical field of information security, and in particular, to an identity authentication method, a terminal, and a server. Background technique [0002] In some distributed systems, several terminals in distributed configuration need to be connected to the server uniformly to realize specific functions such as data transmission, control, and management. In various business scenarios such as multi-site integration, terminals are widely distributed, and the network environment is complex and diverse. There are security issues such as data theft and network attacks. In order to improve the data security of the distributed system, the terminal needs to authenticate with the server. The existing identity authentication method is based on the public key infrastructure technology (PKI system). Since the authentication process involves a complete authentication chain such as a CA institution, the aut...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/08
CPCH04L63/08H04L63/083H04L63/0442H04L9/0869H04L9/3247
Inventor 李强李祉岐孙娴陈晶黄卓王利斌杨阳冯磊
Owner 国网思极网安科技(北京)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products