Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity authentication method and device

An identity authentication and identity technology, applied in the field of identity authentication methods and devices, can solve problems such as unimaginable consequences

Pending Publication Date: 2022-07-15
CHINA IWNCOMM
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, communication networks usually require two-way identity authentication between users and network access points to ensure that only legitimate users can communicate with legitimate networks. However, in some practical applications, one end uses a digital certificate as an identity certificate, and the other end uses a pre-shared key as an identity certificate. This poses a challenge to the entity identity authentication mechanism. challenge
[0003] In addition, in the identity authentication process, the identity information of the entity is directly exposed, and sometimes, the identity information of the entity contains some private or sensitive information of the entity, such as ID number, home address, bank card information, etc., if attacked If the attacker intercepts and then uses it to engage in illegal activities, the consequences will be unimaginable. How to complete entity identity verification without revealing sensitive identity information has become a top priority

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and device
  • Identity authentication method and device
  • Identity authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In a communication network, the requesting device can access the network through the authentication access controller. In order to ensure that the requesting device accessing the network belongs to a legitimate user and the network that the requesting device accesses is a legitimate network, the authentication between the access controller and the requesting device needs to be performed. Mutual Identity Authentication (MIA).

[0048] Taking the current wireless communication and mobile communication scenarios as an example, in the scenario where the requesting device accesses the wireless network through the authentication access controller, the requesting device may be a mobile phone, a personal digital assistant (PDA), a tablet computer, etc. The terminal device, the authentication access controller can be a network side device such as a wireless access point and a wireless router. In the scenario where the requesting device accesses the wired network through the auth...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity authentication method, which comprises the following steps that: an authentication access controller (AAC) receives an identity ciphertext message sent by request equipment (REQ), the AAC sends a first authentication request message to a trusted first authentication server, and the first authentication request message comprises a digital certificate of the REQ and an identity authentication code of the AAC; the first authentication server verifies an identity authentication code of the AAC, the second authentication server trusted by the REQ verifies legality of a digital certificate of the REQ, the AAC receives a first authentication response message which is sent by the first authentication server and carries authentication results of the AAC and the REQ, and the AAC and the REQ respectively obtain the authentication results of opposite entities to realize bidirectional identity authentication; and entity sensitive information is transmitted between the REQ and the AAC in a ciphertext form, so that the security of the entity is guaranteed.

Description

technical field [0001] The present application relates to the technical field of network communication security, and in particular, to an identity authentication method and device. Background technique [0002] At present, communication networks usually require two-way identity authentication between users and network access points to ensure that only legitimate users can communicate with legitimate networks. The form of pre-shared key is used between them, but in some scenarios in practical applications, one end uses a digital certificate as an identity credential, and the other end uses a pre-shared key as an identity credential. challenge. [0003] In addition, in the process of identity authentication, the identity information of the entity is directly exposed, and in some cases, the identity information of the entity contains some private or sensitive information of the entity, such as ID number, home address, bank card information, etc., if it is attacked If someone ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32H04L9/40
CPCH04L9/0841H04L9/085H04L9/0869H04L9/3242H04L9/3247H04L9/3263H04L63/0414H04L63/0435H04L63/0869H04L9/32H04L63/00H04L9/08
Inventor 铁满霞曹军赵晓荣赖晓龙李琴张变玲黄振海芦亮
Owner CHINA IWNCOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products