METHOD, DEVICE, AND SYSTEM FOR IDENTITY AUTHENTICATION
    1.
    发明申请
    METHOD, DEVICE, AND SYSTEM FOR IDENTITY AUTHENTICATION 审中-公开
    用于身份认证的方法,设备和系统

    公开(公告)号:US20150128238A1

    公开(公告)日:2015-05-07

    申请号:US14384445

    申请日:2013-03-12

    IPC分类号: H04L29/06

    摘要: The present invention relates to the field of identity authentication. Provided are a method, device, and system for identity authentication, solving the technical problem that existing identity authentication technologies are incapable of protecting personal privacy, and that authentication technologies comprising personal privacy must provide a traceability feature. The method for identity authentication mainly comprises: a first authenticator transmitting to a second authenticator a first identity authentication message; the second authenticator transmitting to an authentication server a second identity authentication message; the authentication server verifying the validity of a secure domain where the second authenticator is at on the basis of the second identity authentication message; the authentication server returning to the second authenticator a third identity authentication message; when the third identity authentication message is received by the second authenticator, same transmitting to the first authenticator a fourth identity authentication message.

    摘要翻译: 本发明涉及身份认证领域。 提供用于身份认证的方法,设备和系统,解决现有身份认证技术不能保护个人隐私的技术问题,并且包括个人隐私的认证技术必须提供可追溯性特征。 用于身份认证的方法主要包括:第一认证器向第二认证者发送第一身份认证消息; 所述第二认证器向认证服务器发送第二身份认证消息; 所述认证服务器基于所述第二身份认证消息来验证所述第二认证者所在的安全域的有效性; 所述认证服务器返回到所述第二认证者第三身份认证消息; 当第二身份认证消息被第二认证者接收时,向第一认证者发送第四身份认证消息。

    Method for device having WLAN function to access network and device for implementing method

    公开(公告)号:US10554431B2

    公开(公告)日:2020-02-04

    申请号:US15525602

    申请日:2015-10-26

    摘要: A method for a WLAN-enabled device to access to a network is provided, including the following steps. An intelligent terminal device acquires a key KEY1, encrypts, by using the KEY 1, access information of a wireless access device that is known by the intelligent terminal device, and then transmits the access information as well as the unique identification information. WLAN-enabled device sniffs and acquires the unique identification information and the encrypted access information, generates the KEY1 based on the unique identification information and a preset key material, and decrypts the encrypted access information by using the KEY1 to obtain the access information. The present invention further relates to a WLAN-enabled device for implementing the method and an intelligent terminal device.

    Entity authentication method and device with Elliptic Curve Diffie Hellman (ECDH) key exchange capability

    公开(公告)号:US10389702B2

    公开(公告)日:2019-08-20

    申请号:US15122806

    申请日:2015-03-27

    摘要: Disclosed are an entity authentication method and device, involving: sending, by an entity A, a first identity authentication message to an entity B; inspecting, by the entity B after receiving the first message, the validity of a certificate of the entity A; sending, by the entity B, a second identity authentication message to the entity A; inspecting, by the entity A after receiving the second message, the correctness of field data therein; calculating, by the entity A, a secret information and message authentication code using a private key thereof and a temporary public key of the entity B, and sending a third message to the entity B; inspecting, by the entity B after receiving the third message, the correctness of field data therein; calculating, by the entity B, a secret information and message authentication code using a private key thereof and a public key of the entity A.

    ENTITY AUTHENTICATION METHOD AND DEVICE BASED ON PRE-SHARED KEY

    公开(公告)号:US20170310475A1

    公开(公告)日:2017-10-26

    申请号:US15510006

    申请日:2015-06-23

    IPC分类号: H04L9/08 H04L9/06 H04L29/06

    摘要: An entity authentication method includes: an entity A generates and sends NA to an entity B; the entity B generates NB and ZSEEDB, computes a key MKA∥KEIA and first encrypted authentication data AuthEncDataB, and sends the NB∥NA∥AuthEncDataB to the entity A for verification; the entity A generates ZSEEDA, computes second encrypted authentication data AuthEncDataA, a shared key seed Z, a master key MK and a first message authentication identifier MacTagA, and sends the NA∥NB∥AuthEncDataA∥MacTagA to the entity B for verification; the entity B computes Z, MK and MacTagA, compares the MacTagA with the received MacTagA, and if the two are equal, considers that the entity A is valid; the entity B computes and sends a second message authentication identifier MacTagB to the entity A; and the entity A computes MacTagB, compares the MacTagB with the received MacTagB, and if the two are equal, considers that the entity B is valid.

    Multi-TTP-based method and device for verifying validity of identity of entity

    公开(公告)号:US10681045B2

    公开(公告)日:2020-06-09

    申请号:US15766332

    申请日:2016-08-26

    IPC分类号: H04L29/06 H04L9/32

    摘要: Provided are an entity identity validity verification method and device with multiple trusted third parties being involved. In the application, validity of identities of entities performing mutual identity validity verification can only be verified by different trusted third parties. During the verification process, the trusted third parties that are respectively trusted by the two entities interact with each other, and provide services for mutual identity validity verification between the entities, to complete the identity validity verification between the entities.

    MULTI-TTP-BASED METHOD AND DEVICE FOR VERIFYING VALIDITY OF IDENTITY OF ENTITY

    公开(公告)号:US20180295132A1

    公开(公告)日:2018-10-11

    申请号:US15766332

    申请日:2016-08-26

    IPC分类号: H04L29/06 H04L9/32

    摘要: Provided are an entity identity validity verification method and device with multiple trusted third parties being involved. In the application, validity of identities of entities performing mutual identity validity verification can only be verified by different trusted third parties. During the verification process, the trusted third parties that are respectively trusted by the two entities interact with each other, and provide services for mutual identity validity verification between the entities, to complete the identity validity verification between the entities.

    Digital credential management method and device

    公开(公告)号:US11323433B2

    公开(公告)日:2022-05-03

    申请号:US16645149

    申请日:2018-09-07

    IPC分类号: H04L29/06 H04L9/32

    摘要: Provided in the present invention are a digital credential management method and a device, the method comprising: a digital credential application device negotiating establishment of a secure data channel with a digital credential issuing device, and sending to the digital credential issuing device a digital credential management request message; the digital credential issuing device receiving the message, and sending to the digital credential application device a digital credential management verification request message; the digital credential application device receiving the verification request message, and sending to the digital credential issuing device a digital credential management verification response message; the digital credential issuing device receiving the digital credential management verification response message, and sending to the digital credential application device a digital credential management response message; the digital credential application device receiving the digital credential management response message, and sending to the digital credential issuing device a digital credential management confirmation message.

    Method and device for verifying validity of identity of entity

    公开(公告)号:US10812480B2

    公开(公告)日:2020-10-20

    申请号:US15766322

    申请日:2016-08-16

    IPC分类号: H04L29/06 H04L9/32

    摘要: Provided are an entity identity validity verification method and device with multiple trusted third parties being involved. In the application, validity of identities of entities performing mutual identity validity verification can only be verified by different trusted third parties. During the verification process, the trusted third parties that are respectively trusted by the two entities interact with each other, and provide identity validity verification services for mutual identity validity verification between the entities, to complete the identity validity verification between the entities.