Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Service safety authentication method based on smart card under controlled Internet network environment

A technology of security authentication and smart card, which is applied in the field of security authentication mechanism, can solve problems such as inability to adapt well, and achieve the effects of ensuring data security, simplifying the authentication process, and reducing construction costs

Inactive Publication Date: 2006-12-20
CHINA TELECOM CORP LTD
View PDF0 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The main disadvantage of this solution is that the protocols carried by it are all private and unreadable protocols, which cannot be well adapted to the development of a large number of Internet-based transmission protocol services.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Service safety authentication method based on smart card under controlled Internet network environment
  • Service safety authentication method based on smart card under controlled Internet network environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The following is based on figure 1 and figure 2 The preferred embodiments of the present invention are given and described in detail so that those skilled in the art can understand the present invention more easily, but they are not intended to limit the scope of the present invention.

[0038] see figure 1 ,as the picture shows:

[0039] 1. Write the smart card key (ICKey) and smart card number (ICNM) in the smart card and distribute them to users;

[0040] 2. When the user uses related services for the first time, send the smart card number (ICNM) to the service server, that is, the service platform server;

[0041] 3. The business server initiates a challenge process, requiring the user to use the smart card key (ICKey) for identity verification;

[0042] 4. The user generates a time stamp (TimeStamp), uses the smart card key (ICKey) to encrypt the challenge word (Challenge) and time stamp (TS), and responds to the challenge word;

[0043] 5. The service server...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a safety identification method of intelligent card service in the controllable network protocol network, wherein S1, user identifies the intelligent card via the IP network service platform server, while the card contains key and card number; S2, the identify server initializes the battle word process to the user to request identification; S3, the user via the battle word obtains the service application public key and the survival period; S4, the user uses the identification key to encrypt the relative information, to enter into the service application process. With said invention, the safety identification process has high safety, few steps, quick response, simple management and low cost.

Description

technical field [0001] The invention relates to a security authentication mechanism for smart card terminal equipment in a controllable IP network environment, such as a broadband digital set-top box and a handheld network terminal, which uses the network to provide services. The authentication method for the managed network. Background technique [0002] With the continuous development of the IP network, a large amount of information and services are provided on the IP network, and more and more service providers are providing new services based on the Internet or IP network technology, such as: streaming media broadcasting, on-demand, real-time information services Wait. Some common characteristics of these services are strong real-time performance, QoS quality assurance, and paid services. How to ensure that legitimate users can use these services and how to prevent unauthorized users from obtaining content is directly related to the development of services and the indus...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/00H04L29/06G06K9/00
Inventor 严海宁冯明蒋力陈琰顾丽丽孟建庭胡冰松
Owner CHINA TELECOM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products