Identity authentication method and device

An identity authentication and identity technology, which is applied in the field of identity authentication methods and devices, can solve the problems of identifying access controllers, requesting equipment, and network security risks, and achieve the effects of real-time authentication, exposure prevention, and confidentiality protection

Pending Publication Date: 2022-07-15
CHINA IWNCOMM
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] If during the identity authentication process of the requesting device, the identity information of the requesting device is intercepted by an attacker and used for illegal purposes, it will cause great security risks to the authentication access controller, requesting device and the network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and device
  • Identity authentication method and device
  • Identity authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In a communication network, the requesting device can access the network through the authentication access controller. In order to ensure that the requesting device accessing the network belongs to a legitimate user, the authentication access controller needs to authenticate the identity of the requesting device.

[0034] Taking the current wireless communication and mobile communication scenarios as an example, in the scenario where the requesting device accesses the wireless network through the authentication access controller, the requesting device may be a mobile phone, a personal digital assistant (PDA), a tablet computer, etc. The terminal device, the authentication access controller can be a network side device such as a wireless access point and a wireless router. In the scenario where the requesting device accesses the 4th / 5th Generation mobile communication technology (4G / 5G) network through the authentication access controller, the requesting device may be a t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses an identity authentication method, which comprises the following steps that: an authentication access controller (AAC) acquires an identity ciphertext message sent by a request device REQ, the identity ciphertext message comprises an identity information ciphertext of the REQ, the AAC decrypts the identity information ciphertext of the REQ to obtain a digital certificate CertREQ of the REQ, a first authentication request message comprising the CertREQ is sent to a first authentication server, and the first authentication request message comprises the CertREQ; the AAC receives a first authentication response message sent by the first authentication server, the first authentication response message comprises authentication result information and a digital signature of the first authentication server, the AAC verifies the digital signature of the first authentication server by using a public key of the first authentication server, and if the verification is passed, the AAC sends the authentication result information to the first authentication server; and if yes, the AAC determines an identity authentication result of the REQ according to a verification result of the CertREQ in the authentication result information.

Description

technical field [0001] The present application relates to the technical field of network communication security, and in particular, to an identity authentication method and device. Background technique [0002] In a communication network, a requesting device can access the network through an authenticated access controller. In some situations with high security requirements, the authentication access controller needs to authenticate the identity of the requesting device to ensure that the requesting device accessing the network belongs to a legitimate user. In addition, the point-to-point transmission in the blockchain technology also needs to establish a trust relationship between different nodes, so it is also very important for the identification of nodes. [0003] In the process of performing identity authentication on the requesting device, the requesting device needs to provide its own identity information for identity authentication. However, this type of identity i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32H04L9/40
CPCH04L9/0841H04L9/085H04L9/0869H04L9/3242H04L9/3247H04L9/3263H04L63/0414H04L63/0435H04L63/08H04L9/32H04L63/00H04L9/08
Inventor 铁满霞曹军赖晓龙赵晓荣李琴张变玲张国强
Owner CHINA IWNCOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products