Unlock instant, AI-driven research and patent intelligence for your innovation.

Identity authentication method and device

An identity authentication and identity technology, applied in the field of identity authentication methods and devices, can solve the problems of identifying access controllers, requesting equipment network security risks, etc.

Pending Publication Date: 2022-07-15
CHINA IWNCOMM
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] If during the identity authentication process between the requesting device and the network, the identity information of the requesting device is intercepted by an attacker for illegal purposes, or the identity information of the network is intercepted by an attacker for illegal purposes, the authentication access controller, request Devices and networks pose a great security risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and device
  • Identity authentication method and device
  • Identity authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] In a communication network, the requesting device can access the network through the authentication access controller. In order to ensure that the requesting device accessing the network belongs to a legitimate user, and / or the network requested by the user is a legitimate network, the access controller and the requesting device are authenticated. Two-way or one-way authentication is usually required between devices.

[0041] For example, in the scenario where the requesting device accesses the wireless network through the authentication access controller, the requesting device may be a terminal device such as a mobile phone, a personal digital assistant (PDA), or a tablet computer, and the authentication access controller may be wireless access point. In the scenario where the requesting device accesses the wired network through the authentication access controller, the requesting device may be a terminal device such as a desktop computer or a notebook computer, and th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity authentication method, a request device and an authentication access controller, when identity authentication is carried out based on an authentication mechanism of a pre-shared key, identity information of an authenticated party is transmitted in a ciphertext form, the identity information of the authenticated party is prevented from being directly exposed in a transmission process, and an attacker is ensured not to obtain private and sensitive information; according to the method, the confidentiality of entity identity related information is ensured, and bidirectional or unidirectional identity authentication between the access controller and the request equipment is realized, so that a foundation is laid for ensuring that a user accessing a network is legal and / or the network accessed by the user is legal. Meanwhile, in combination with key exchange calculation and through ingenious detail design, the ability of resisting dictionary brute force cracking or quantum computing attack in the identification process is enhanced.

Description

technical field [0001] The present application relates to the technical field of network communication security, and in particular, to an identity authentication method and device. Background technique [0002] In a communication network, a requesting device can access the network through an authenticated access controller. In some cases with high security requirements, the authentication access controller needs to authenticate the identity of the requesting device, and sometimes the requesting device also needs to authenticate the identity of the authentication access controller to ensure that the requesting device accessing the network belong to a legitimate user, and / or the network requesting access to the device belongs to a legitimate network. In addition, the point-to-point transmission in the blockchain technology also needs to establish a trust relationship between different nodes, so it is also very important for the identification of nodes. [0003] At present, t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32H04L9/40
CPCH04L9/0841H04L9/085H04L9/0869H04L9/3242H04L63/0414H04L63/0435H04L63/08H04L63/0869H04L9/3273H04L9/3073H04L63/061H04L63/0442H04L63/0876H04L63/083H04W12/037H04W12/069
Inventor 铁满霞曹军赖晓龙赵晓荣李琴张变玲芦亮
Owner CHINA IWNCOMM