Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity authentication method and device

An identity authentication and identity identification technology, applied in the field of identity authentication methods and devices, can solve problems such as network service attacks, processing resource occupation, and impact, and achieve the effects of reducing signaling interaction, avoiding processing pressure, and fast computing speed

Pending Publication Date: 2021-03-19
HUAWEI TECH CO LTD
View PDF1 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the above implementation, although the privacy protection of SUPI based on asymmetric cryptography is adopted, some user devices will send false request packets to attack network services, and for such false request packets, the identity management server still needs to Execute the authentication process after decryption, resulting in a large amount of processing resources being occupied, which affects the inability to process normal request packets and has a huge impact on the normal operation of network services

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and device
  • Identity authentication method and device
  • Identity authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0101] The embodiments of the present application will be further described in detail below in conjunction with the accompanying drawings.

[0102] figure 1 It is a schematic diagram of an application scenario of an identity authentication method provided in the embodiment of this application, see figure 1 , the application scenario of the identity authentication method includes: a terminal device 101 , an identity management server 102 and a network device 103 , further, the implementation environment may also include an audit server 104 .

[0103] Terminal equipment 101 may refer to user equipment (user equipment, UE), access terminal, subscriber unit, subscriber station, mobile station, mobile station, remote station, remote terminal, mobile device, user terminal, terminal, wireless communication device, user agent or user device. The access terminal can be a cellular phone, a cordless phone, a session initiation protocol (session initiation protocol, SIP) phone, a wirele...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an identity authentication method and device, and belongs to the technical field of communication. According to the scheme provided by the invention, the terminal equipment sends the network access request carrying the temporary privacy identity identifier to the network equipment when having the network access requirement, and performs message interaction and verification with the network equipment according to the verification key corresponding to the temporary privacy identity identifier, and therefore the identity authentication process is completed. The network device can identify the anonymous identity of the user without maintaining an identity database, it can be guaranteed that privacy of the user is not leaked, meanwhile, due to the fact that the network device can filter out false request packets on the front side of the identity management server in the identity identification process, and the processing pressure of the network device is greatly reduced. In this way, a large number of processing resources are prevented from being occupied, processing of normal request packets is not affected, and normal operation of network services can be guaranteed.

Description

technical field [0001] The present application relates to the field of communication technology, and in particular to an identity authentication method and device. Background technique [0002] With the development of network technology, the network has increasingly penetrated into people's daily life. When users use the network, they often need their real name, ID number, bank account and other private information to perform certain operations. , network security issues are becoming more and more important. When faced with a large number of devices requesting access to the network, the server will authenticate the devices requesting access to prevent forged and illegal users from accessing the network and damage the legitimate rights and interests of other users in the network management domain. Attacks within the management domain still occur from time to time, and not all network environments are safe, which will pose a great threat to users' private information and prop...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W12/08H04W12/041H04L9/08H04L9/32H04L29/06
CPCH04W12/06H04W12/08H04L9/0866H04L9/3242H04L63/0414H04L63/0869H04L63/1458H04W12/75H04W12/02H04L2209/42H04L2209/80H04L9/3271
Inventor 江伟玉刘冰洋万俊杰
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products