Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for authenticating user's ID in safety communication service of public network based on cryptotechnique of identification

A technology of user identity and public network, applied in the field of authentication of public network security communication service user identity, can solve the problem of inability to provide public charging services, and achieve the effect of continuous service authorization and billing

Active Publication Date: 2005-11-16
SHENZHEN OLYM INFORMATION SECURITY TECHOLOGY CO LTD
View PDF0 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The h) method can safely verify the user's ownership of the email address, but only using this method cannot avoid counterfeiting, malicious applications, misoperations, etc., and cannot provide public charging services

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for authenticating user's ID in safety communication service of public network based on cryptotechnique of identification
  • Method for authenticating user's ID in safety communication service of public network based on cryptotechnique of identification
  • Method for authenticating user's ID in safety communication service of public network based on cryptotechnique of identification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The present invention will be described in further detail below in conjunction with specific examples.

[0039] The method of the present invention is proposed in view of the following problems: the existing network security communication service system based on identification encryption technology cannot provide services to public customers because it does not solve the problem of identity authentication and charging of public customers. This restricts the large-scale popularization and application of this advanced technology. The present invention combines two of the existing communication technical means that are indispensable for public users. Through the combination of these two means, the identification problem of the public network security communication service system based on identification encryption technology is solved, It also solves the problem of unique and effective public user identity. The concrete authentication method that the present invention prov...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

When requesting registration, user transfers service id such as Email address and user id for fee collecting such as number of handset to cryptographic center. The said center sends token 1 and token 2 to Email address and handset respectively. User returns tokens to acknowledge registration application. Receiving the feedback returned from the user, the cryptographic center validates the effective application. The invention binds two authentication modes, eliminates other invalid applications, and features simple method and easy of implementation.

Description

technical field [0001] The invention belongs to the field of network technology, and in particular relates to a method for authenticating user identities of public network security communication services based on identification encryption technology. Background technique [0002] Many security systems based on traditional public key cryptography have been widely used. For example, an important Internet application: e-mail has a corresponding security system PGP (Pretty Good Privacy) system and so on. IETF (Internet Engineering Task Force) has also formulated the corresponding standard S / MIME (Secure / Multipurpose Internet MailExtensions). But such systems all rely on a complex certificate issuing system: PKI (PublicKey Infrastructure). In 2001, two American cryptographers, Boneh and Franklin, proposed the first practical identity-based encryption system IBE whose security can be proven, that is, Identity based encryption (see literature D.Boneh and M....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32
Inventor 程朝辉王李琰
Owner SHENZHEN OLYM INFORMATION SECURITY TECHOLOGY CO LTD