Unlock instant, AI-driven research and patent intelligence for your innovation.

Identity authentication method and device, equipment and readable storage medium

An identification and identity technology, applied in the field of identification and computer-readable storage media, can solve the problems of low security and resource consumption of digital certificate management, and achieve the effect of solving low security and improving security

Pending Publication Date: 2022-02-25
WEIWEI SHANGHAI NETWORK TECH CO LTD
View PDF17 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] This application provides an identity authentication method, device, and storage medium to solve the problem of low security and resource consumption of digital certificate management based on the identification of the identities of both parties in data transmission through a trusted third-party organization

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and device, equipment and readable storage medium
  • Identity authentication method and device, equipment and readable storage medium
  • Identity authentication method and device, equipment and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments It is a part of the embodiments of this application, but not all of them. Based on the embodiments in the present application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present application.

[0056] This application is applied to the scenario where the data receiver authenticates the data sender in computer communication.

[0057]When different computers are exchanging data (especially authorization information, privacy information, etc.), the data receiver needs to verify whether the identity of the data sender is true and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an identity authentication method which is characterized by comprising the following steps: acquiring a block cipher ciphertext of a data sender, and splitting the block cipher ciphertext into identity information and an agreed message password according to a preset separator; encrypting the identity information by using a preset key and a preset block cipher algorithm, and taking an encryption result as a message key; decrypting the agreed message password by using the message key and a block cipher algorithm to obtain an agreed message plaintext; judging whether the agreement message plaintext is consistent with a preset agreement message; if the agreement message plaintext is inconsistent with the preset agreement message, determining that the identity of the data sender is wrong; and if the agreement message plaintext is consistent with the agreement message, determining that the identity of the data sender is correct. In addition, the invention also relates to an identity authentication method and device, equipment and a storage medium. According to the method, the problems of low security and resource consumption of digital certificate management when identities of both data transmission parties are authenticated through a trusted third-party mechanism can be solved.

Description

technical field [0001] The present application relates to the field of audio processing, and in particular to an identification method, device, electronic equipment and computer-readable storage medium. Background technique [0002] With the rapid development of computer technology, people are in the era of network computers. The current Internet only has the ability to transmit data accurately and efficiently end-to-end, but it cannot determine the identity of the sender and receiver. Therefore, in most data transmission scenarios, the identification of both parties to the data exchange has become the focus of more and more attention. [0003] At present, the way of identity authentication can be realized through secure hypertext transfer protocol (Hypertext Transfer Protocol Secure, HTTPS) and key infrastructure (Public Key Infrastructure, PKI); , CA), leading to all identity authentication requires the participation of a third party, and the security of identity authent...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04L9/08H04L9/32H04L9/40
CPCH04L63/083H04L63/0428H04L9/0618H04L9/0838H04L9/3236
Inventor 宗瑞张伟春李子阳
Owner WEIWEI SHANGHAI NETWORK TECH CO LTD