Authentication method, device and storage medium

An authentication method and certified technology, applied in the field of network information security, can solve problems such as hidden dangers of information security and poor anti-quantum computing ability, and achieve the effect of improving security, improving reliability, and high anti-quantum computing ability

Active Publication Date: 2022-05-27
南京易科腾信息技术有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, the commonly used 5G secondary authentication protocol is EAP-TLS. In the secondary authentication process of this protocol, the mutual authentication between the user and the server is realized by exchanging digital certificates between the terminal and the authentication server, and the private key is used. And the asymmetric key such as the public key encrypts and decrypts the interactive information. This process has poor anti-quantum computing ability and has a large information security risk.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method, device and storage medium
  • Authentication method, device and storage medium
  • Authentication method, device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, but not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without creative efforts shall fall within the protection scope of the present invention.

[0044] Throughout this specification, references to "one embodiment," "an example," or "an example" mean that a particular feature, structure, or characteristic described in connection with the embodiment or example is included in at least one embodiment of the present invention . Thus, appearances of the phrases "in one embodiment," "in an embodiment," "one example," or "an example" in various places throughout the specification are not necessarily all referring to the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an authentication method, device, and storage medium, wherein the method includes: the authenticated party sends an authentication request to a quantum authentication server, and the quantum authentication server generates a second quantum authentication according to a prestored first shared quantum key after receiving the authentication request. Encrypted information, and send the first encrypted information back to the authenticated party, after the authenticated party decrypts the first encrypted information through the pre-stored first shared quantum key, according to the information decrypted by the first encrypted information and the pre-stored The second shared quantum key generates the second encrypted information, and sends the second encrypted information to the quantum authentication server, and the quantum authentication server decrypts the second encrypted information according to the prestored second shared quantum key and completes the encrypted information based on the decrypted information. Authentication of the authenticating party. In the technical solution disclosed in the present invention, the mutual information is encrypted and decrypted through the pre-stored shared quantum key, thereby significantly improving the security of information mutual exchange.

Description

technical field [0001] The present invention relates to the technical field of network information security, and in particular, to an authentication method, device and storage medium. Background technique [0002] 5G networks will provide more services for vertical industries, and vertical industries have put forward more demands on 5G networks, such as the need to provide customized services for vertical industries through the new network slicing feature of 5G, including providing data for specific services. The authentication mechanism before the channel is established. 5G provides a secondary authentication channel based on EAP (Extensible Authentication Protocol, Extensible Authentication Protocol) unified bearer, 3GPP (The 3rd Generation Partnership Project) defines EAP-based authentication protocols, including EAP-TLS (Transport Layer Security, security Transport layer protocol), EAP-MD5 (Message Digest5, Message Digest Authentication Protocol), EAP-LEAP (Lightweight ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08H04W12/03H04W12/06
Inventor 王军丁松燕
Owner 南京易科腾信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products