Identity authentication method and device

An identity authentication and identity technology, which is applied in the field of identity authentication methods and devices, can solve the problems of identifying access controllers, requesting equipment, and network security risks, and achieve the effects of real-time authentication, exposure prevention, and confidentiality protection

Pending Publication Date: 2022-07-15
CHINA IWNCOMM
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] If during the two-way authentication process between the requesting device and the authentication access controller, the identity information of the requesting device or the authentication access controller is intercepted by the attacker for illegal purposes, the authentication access controller, the requesting device, and the network cause great safety hazard

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and device
  • Identity authentication method and device
  • Identity authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] In a communication network, the requesting device can access the network through the authentication access controller. In order to ensure that the requesting device accessing the network belongs to a legitimate user, the authentication access controller needs to authenticate the identity of the requesting device. Similarly, in order to ensure that the network accessed by the requesting device belongs to a legitimate network, the requesting device also needs to authenticate the identity of the authentication access controller.

[0061] Taking the current wireless communication and mobile communication scenarios as an example, in the scenario where the requesting device accesses the wireless network through the authentication access controller, the requesting device may be a mobile phone, a personal digital assistant (PDA), a tablet computer, etc. The terminal device, the authentication access controller can be a network side device such as a wireless access point and a wi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses an identity authentication method, which is used for preventing identity information of a request device and an authentication access controller from being exposed in a transmission process by performing confidential processing on the identity information of the request device and the authentication access controller, and ensuring that an attacker cannot obtain private and sensitive information of the request device and the authentication access controller. And the authentication server is introduced, so that bidirectional identity authentication of the request equipment and the authentication access controller is realized while the confidentiality of entity identity related information is guaranteed.

Description

technical field [0001] The present application relates to the technical field of network communication security, and in particular, to an identity authentication method and device. Background technique [0002] In a communication network, a requesting device can access the network through an authenticated access controller. In some cases with high security requirements, the authentication access controller needs to authenticate the identity of the requesting device, and the requesting device also needs to authenticate the identity of the authentication access controller to ensure that the requesting device accessing the network It belongs to a legitimate user, and the network that requests the device to access belongs to a legitimate network. In addition, the point-to-point transmission in the blockchain technology also needs to establish a trust relationship between different nodes, so it is also very important for the identification of nodes. [0003] In the two-way iden...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32H04L9/40
CPCH04L9/0841H04L9/085H04L9/0869H04L9/3242H04L9/3247H04L9/3263H04L63/0414H04L63/0435H04L63/0869H04L9/32H04L63/00H04L9/08
Inventor 铁满霞曹军赖晓龙赵晓荣李琴张变玲王月辉
Owner CHINA IWNCOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products