Identity identifying method

An identity authentication and identity technology, applied in the field of authentication, identity authentication methods and systems, can solve the problem of single authentication information, achieve the effect of increasing active participation, diversifying methods, increasing user experience and interactivity

Inactive Publication Date: 2010-08-11
HUAWEI TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] The purpose of the present invention is to provide an identity authentication method and system to solve the technical problem of single authentication information in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity identifying method
  • Identity identifying method
  • Identity identifying method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0081] In network communication, after the second-party node sends a communication request, the first-party node needs to verify the authenticity of the identity of the second-party node before accepting the communication request for communication. The existing technology generally adopts a method based on public key The identity authentication method based on the public key mainly relies on a special third-party certification authorization center to issue an identity certificate for the customer to confirm the identity information of the other party. In the existing technology, both parties need to go to the certification center to obtain the digital certificate of the other party. Use the root certificate of the certification center to verify the digital signature of the digital certificate to determine whether the digital certificate is trustworthy, and then use the public key in the digital certificate to encrypt and communicate with the other party, so that the identity of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The method is in use for carrying out ID authentication before communication between two parties. After establishing communicating desire, two parties negotiate about authentication mode, and select public node to carry out ID authentication based on basic information, individualized information, or both of basic information and individualized information. The system includes communication request module, authentication negotiation module, and information authentication module. Features are: interactive flexible authentication mode, taking full advantage of network node, diversified authenticating content.

Description

technical field [0001] The present invention relates to authentication technology in the field of communication, in particular to an identity authentication method and system. Background technique [0002] In order to meet the security and reliability of the communication process in the communication process, it is very important and necessary to authenticate the authenticity of the identity of the communication counterparty. How to carry out effective identity authentication has gradually become an important component of network security technology in the current communication system. part. [0003] In the prior art, in the communication process, in order to ensure the security of the communication process, each communication party proves its identity through an identity verification mechanism to verify whether the identity information provided by the communication party is consistent with the communication party's own information. [0004] Authentication can be used to pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/32
CPCH04L9/32H04L63/0869
Inventor 何均宏陈兵
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products