Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Identity authentication method and device

An identity authentication and identity technology, applied in the field of identity authentication methods and devices, can solve problems such as unimaginable

Pending Publication Date: 2022-07-15
CHINA IWNCOMM
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, in the existing entity authentication schemes, the identity certificate of the entity either adopts a digital certificate or a pre-shared key uniformly. The situation where one end uses a pre-shared key as an identity credential poses a challenge to the entity identity authentication mechanism
In addition, during the transmission of identity authentication messages, the identity information of the entity is often exposed, and the identity information of the entity usually includes some private or sensitive information, such as ID number, home address, bank card information, geographic location information or affiliation. Institutional information, etc., if intercepted by attackers and used for illegal activities, the consequences will be unimaginable. How to complete entity identity authentication without revealing identity-sensitive information has become a top priority

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and device
  • Identity authentication method and device
  • Identity authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] In a communication network, the requesting device can access the network through the authentication access controller. In order to ensure that the requesting device accessing the network belongs to a legitimate user and the network that the requesting device accesses is a legitimate network, the authentication between the access controller and the requesting device needs to be performed. Mutual Identity Authentication (MIA for short).

[0056] Taking the current wireless communication and mobile communication scenarios as an example, in the scenario where the requesting device accesses the wireless network through the authentication access controller, the requesting device may be a mobile phone, a personal digital assistant (PDA), a tablet computer, etc. The terminal device, the authentication access controller can be a network side device such as a wireless access point and a wireless router. In the scenario where the requesting device accesses the wired network throug...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity authentication method, which aims at an authentication scene that request equipment adopts a pre-shared key and an authentication access controller adopts a digital certificate, and comprises the following steps of: verifying the legality of the digital certificate of the authentication access controller by a first authentication server trusted by the authentication access controller to obtain a first verification result; a second authentication server trusted by the request device verifies the identity authentication code of the request device by using a pre-shared key of the request device to obtain a second verification result, and the request device and the authentication access controller determine whether the opposite entity is legal according to the verification results corresponding to the opposite entity; the bidirectional identity authentication of the access controller and the request equipment is realized, so that only a legal user can access a legal network. Moreover, the private information of the entity, such as the identity label and the authentication result information, is transmitted in a ciphertext form, so that the transmission security of the private information is ensured, and the identity protection of the entity is realized.

Description

technical field [0001] The present application relates to the technical field of network communication security, and in particular, to an identity authentication method and device. Background technique [0002] In a communication network, it is usually required to perform two-way authentication between the requesting device and the authenticating access controller to ensure that the requesting device accessing the network belongs to a legitimate user and that the network that the requesting device accesses belongs to a legitimate network. In addition, the point-to-point transmission in the blockchain technology also needs to establish a trust relationship between different nodes, so it is also very important for the identification of nodes. [0003] At present, in the existing entity authentication scheme, the identity certificate of the entity either adopts a digital certificate or a pre-shared key. One end uses the pre-shared key as the identity credential, which poses a ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32H04L9/40
CPCH04L9/0841H04L9/085H04L9/0869H04L9/3228H04L9/3242H04L9/3247H04L9/3263H04L63/0435H04L63/0869H04L9/32H04L63/00H04L9/08
Inventor 铁满霞曹军赵晓荣赖晓龙李琴张变玲杜志强
Owner CHINA IWNCOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products