Unlock instant, AI-driven research and patent intelligence for your innovation.

Identity identifying device

An identity authentication and first-party technology, applied in identity authentication methods and systems, and in the field of authentication, can solve problems such as single authentication information, achieve the effect of increasing active participation, authenticity and reliability of identity information, and increasing user experience and interactivity

Inactive Publication Date: 2007-06-13
HUAWEI TECH CO LTD
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] The purpose of the present invention is to provide an identity authentication method and system to solve the technical problem of single authentication information in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity identifying device
  • Identity identifying device
  • Identity identifying device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0081] In network communication, after the second-party node sends a communication request, the first-party node needs to verify the authenticity of the identity of the second-party node before accepting the communication request for communication. The prior art generally uses public key-based The identity authentication method based on public key mainly relies on a dedicated third-party certification authority to issue identity certificates for customers to confirm the identity information of the other party. In the prior art, both parties need to go to the authentication center to obtain the digital certificate of the other party. Use the root certificate of the certification authority to verify the digital signature of the digital certificate to determine whether the digital certificate is trustworthy, and then use the public key in the digital certificate to encrypt the communication with the other party, so that the identity of the other party can be confirmed. Since the cont...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The method is in use for carrying out ID authentication before communication between two parties. After establishing communicating desire, two parties negotiate about authentication mode, and select public node to carry out ID authentication based on basic information, individualized information, or both of basic information and individualized information. The system includes communication request module, authentication negotiation module, and information authentication module. Features are: interactive flexible authentication mode, taking full advantage of network node, diversified authenticating content.

Description

Technical field [0001] The present invention relates to authentication technology in the communication field, and in particular to an identity authentication method and system. Background technique [0002] In order to meet the security and reliability of the communication process in the communication process, it is very important and necessary to authenticate the authenticity of the communication partner's identity. How to carry out effective identity authentication has gradually become an important component of the network security technology in the current communication system. section. [0003] In the prior art, in the communication process, in order to ensure the security of the communication process, each party in the communication proves their identities through an identity verification mechanism to verify whether the identity information provided by the communicating party is consistent with the information provided by the communicating party itself. [0004] Authenticati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/32H04L63/0869
Inventor 何均宏陈兵
Owner HUAWEI TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More