WO2011022918A1 - 一种引入在线第三方的实体双向鉴别方法 - Google Patents
一种引入在线第三方的实体双向鉴别方法 Download PDFInfo
- Publication number
- WO2011022918A1 WO2011022918A1 PCT/CN2009/076179 CN2009076179W WO2011022918A1 WO 2011022918 A1 WO2011022918 A1 WO 2011022918A1 CN 2009076179 W CN2009076179 W CN 2009076179W WO 2011022918 A1 WO2011022918 A1 WO 2011022918A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- entity
- message
- party
- trusted
- verification
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 30
- 230000002457 bidirectional effect Effects 0.000 title claims abstract 7
- 238000012795 verification Methods 0.000 claims abstract description 39
- 230000007246 mechanism Effects 0.000 abstract description 10
- 230000001010 compromised effect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
- H04L9/3213—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
Definitions
- the present invention relates to an entity authentication method, and more particularly to an entity two-way authentication method for introducing an online third party.
- Entity authentication methods using asymmetric cryptography can be divided into two types, one-way authentication and two-way authentication.
- the uniqueness or timeliness of identification is identified by time-varying parameters and is often used as a time-series, sequence number, random number, etc. for time-varying parameters. If the time stamp or the sequence number is used as the time-varying parameter, the one-way authentication only needs to use one message, and the two-way authentication needs to use two messages. If the random number is used as the time-varying parameter, the one-way authentication needs to use two messages. Pass-through, two-way authentication requires three messages or four messages (ie, parallel authentication for two messages;).
- the verifier must have a valid public key of the claimant before or during the operation, otherwise the authentication process may be compromised or not successfully completed.
- the three-way method of two-way authentication is taken as an example:
- Tok AB R A , R B , 1511 Text3 ⁇ ⁇ sS A ( R A ⁇ ⁇ R B ⁇ ⁇ B ⁇ I Text2 )
- TokenBA R B ⁇ ⁇ R A ⁇ ⁇ A ⁇ ⁇ Text5 ⁇ ⁇ sS B (R B ⁇ ⁇ R A ⁇ ⁇ A ⁇ ⁇ Text4 ⁇
- X is the entity specifier, the authentication system has two authentication entities, C and ;
- Cert x represents the certificate of entity X;
- x represents the entity The signature of X;
- R x represents the random number generated by entity X; Tfcc is an optional text field.
- entity B sends random number R s , optional text 7fcc 7 to entity A;
- Entity A sends a token , optional certificate Cer A to the entity;
- the three-pass authentication mechanism must be successful in ensuring that entities A and B respectively have the valid public key of the other party, and how to obtain the public key of the other party and its validity, the agreement itself is not involved.
- This guarantee requirement condition cannot be satisfied in many current application environments.
- the communication network usually adopts an entity authentication mechanism to implement the user access control function. Before the authentication mechanism is successfully completed, the user is prohibited from accessing the network, and thus the user cannot or is difficult before the authentication.
- the access certificate authority obtains the validity of the peer entity, the network access point public key.
- the communication network usually needs to perform two-way authentication between the user and the network access point to ensure that the legitimate user accesses the legal network. Therefore, for the network entity, if the valid public key of the communication peer entity is not known before the authentication, Rather, the verification of the public key of the peer entity is completed in the authentication process, which not only improves the traditional entity authentication mechanism, but also makes it feasible and easy to use in practical applications.
- the present invention solves the above technical problems existing in the background art, and proposes an entity two-way authentication method that introduces an online third party.
- the present invention is an entity two-way authentication method for introducing an online third party, and the method includes the following steps:
- Entity 3 sends message 1 to entity message 1 including random number R s , identity / ⁇ and optional text Textl
- entity A After receiving the message 1, entity A sends a message 2 to the trusted third party, and message 2 includes random numbers R, A and R s , identity / A and / ⁇ and optional text 7fcc 2; 3) After receiving the message 2, the trusted third party checks the legality of the entity A and the entity according to the identity/ A and / ⁇ ;
- message 3 includes entity verification result 3 ⁇ 4 and Res B , token TokenTA and optional text Text5 or includes entity verification result 3 ⁇ 4 And Res B , tokens TokmTAl and TokmTA2 and optional text Text 5;
- the entity A After receiving the message 3, the entity A sends a message 4 to the entity B, and the message 4 includes the token TokenAB and the identity identifier I A ;
- entity B After receiving the message 4, entity B performs verification
- the entity sends a message to the entity 5 5 , the message 5 includes the token TokenBA;
- Step 6) includes:
- step 6.1) Verify the signature of the trusted third party TP in TokenTA or TokmTA2, and check whether the random number R B generated by the entity in message 1 matches the random number R s in the signature data of the trusted third party TP included in TokenTA or TokmTA2. If the verification is passed, go to step 6.2);
- Step 8) includes:
- step 8.2 Verify the signature of the trusted third party TP in TokenTA or TokenTAl in message 3, and check the random number R' A generated by entity A in message 2 and the random number included in the signature data of the trusted third party TP in TokenTA or TokenTAl Whether the number R' A matches, if the verification is passed, step 8.2);
- the process of checking the legality of the entity A and the entity in the above step 3) is: In the message 2, if the identity/ A of the entity is the identifier of the entity A, the trusted public party searches for the valid public key PublicKey A of the entity A ; If the identity certificate of the entity a L a entity a Cert a, the trusted third party to check the validity of the certificate Cert Control Valid a TP a; and if the identity of the entity B to entity B specifier is trusted third party search Effective public key of the entity If the entity's identity ⁇ ⁇ is the entity's certificate Cert B , the trusted third party TP checks the validity of the certificate Cert B , Valid B .
- step 4 when the message 3 includes the entity verification results Res A and Res B , the token TokenTA and the optional text Text5, the step 8.1) is performed in advance to the above step 5), and after the entity A receives the message 3, Perform step 8.1) and send message 4 to entity 3.
- the above random numbers R A , ? and 3 ⁇ 4 are time stamps or sequence numbers.
- TokenTAl sS T (R' A ⁇ Res B ⁇ Text4 )
- TokenTA2 sS T (R B ⁇ Res A ⁇ Text3 )
- TokenAB R A ⁇ Res A ⁇ Text7 ⁇ TokenTA2 ⁇ sS A (A ⁇ R A ⁇ B ⁇ ⁇ R B ⁇ TokenTA2 ⁇ Text6 )
- TokenBA Text9 ⁇ sS B (B ⁇ ⁇ R B ⁇ ⁇ A ⁇ R A ⁇ Text8 )
- TokenTA sS T (R' A ⁇ R B ⁇ ⁇ Res B ⁇ ⁇ Res A ⁇ Text3 )
- TokenAB R A ⁇ R ⁇ Text7 ⁇ ⁇ Res B ⁇ ⁇ Res A ⁇ TokenTA ⁇ sS A
- TokenBA Text9 ⁇ sS B (B ⁇ ⁇ R B ⁇ ⁇ A ⁇ R A ⁇ Text8 )
- the invention adopts a three-entity framework, and the authentication entity needs to obtain the public key or certificate of the trusted third party before the authentication, and obtain the user certificate issued by the trusted third party to itself or hand over the public key to the trusted third party for storage. There is no need to know in advance the valid public key of the peer authentication entity.
- the public key of the authentication entity and its validity are automatically transmitted to the required ones through the search and verification of the trusted third party. Peer.
- the invention discloses an online retrieval and authentication mechanism of the public key, realizes centralized management thereof, and simplifies the operating conditions of the protocol, and facilitates its application implementation.
- FIG. 1 is a schematic diagram of identification of a three-pass authentication mechanism in the prior art
- Figure 2 is a schematic illustration of the process of the present invention.
- the method of the invention involves three entities, two authentication entities A and one trusted third party
- the trusted third party TP is a trusted third party that authenticates the entity A and provides the authentication service for the entity and the entity, and realizes the peer-to-peer identification between the two entities A and B through the trusted third party.
- the system called the ternary peer-to-peer authentication, is a 'j TePA (Tri-element Peer Authentication) system.
- Valid x indicates the validity of the certificate Cert x ;
- PublicKey x is the public key of the entity X (X stands for A or);
- / ⁇ is the identity of the entity X, represented by the certificate Cer x or the classifier X of the entity;
- Res x represents the entity The result of X verification, consisting of the certificate Cert x and its validity Valid x or by the entity (: and its public key PublicKeyx group; Token is the token field.
- each token field of the present invention has the following two forms:
- TokenTAl sS T (R' A ⁇ Res B ⁇ Text4 )
- TokenTA2 sS T (R B ⁇ ⁇ Res A ⁇ Text3 )
- TokenAB R A ⁇ Res A ⁇ Text7 ⁇ TokenTA2 ⁇ sS A (A ⁇ R A ⁇ B ⁇ ⁇ R B ⁇ TokenTA2 ⁇ Text6 )
- TokenBA Text9 ⁇ sS B (B ⁇ ⁇ R B ⁇ ⁇ A ⁇ R A ⁇ Text8 )
- TokenTA sS T (R' A ⁇ R B ⁇ ⁇ Res B ⁇ ⁇ Res A ⁇ Text3 )
- TokenAB R A ⁇ R ⁇ Text7 ⁇ ⁇ Res B ⁇ ⁇ Res A ⁇ TokenTA ⁇ sS A
- TokenBA Text9 ⁇ sS B (B ⁇ ⁇ R B ⁇ ⁇ A ⁇ R A ⁇ Text8 )
- Entity 3 sends message 1 to entity message 1 including random number R s , identity / ⁇ and Select text Textl
- entity A After receiving the message 1, entity A sends a message 2 to the trusted third party, and message 2 includes random numbers R, A and R s , identity / A and / ⁇ and optional text 7fcc 2;
- the trusted third party After receiving the message 2, the trusted third party checks the legality of entity A and entity 3 according to the identity/ A and / ⁇ ;
- the trusted third party searches for the valid public key of the entity A, PublicKey A ; if the identity of the entity A/ A is the certificate Cert A of the entity A , Then the trusted third party checks the validity of the certificate 0 ⁇ 3 ⁇ 4 Valid A ; if the identity of the entity / ⁇ is the identifier of the entity B, the valid public key of the trusted third party search entity
- message 3 includes entity verification result 3 ⁇ 4 and Res B , token TokenTA and optional text Text5 or includes entity verification result 3 ⁇ 4 And Res B , tokens TokmTAl and TokmTA2 and optional text Text 5;
- the entity A After receiving the message 3, the entity A sends a message 4 to the entity B, and the message 4 includes the token TokenAB and the identity identifier I A ;
- entity B After receiving the message 4, entity B performs verification
- step 8.2 Verify the signature of the trusted third party TP in TokmTA or TokenTAl in message 3, and check the random number R ' A generated by entity A in message 2 and the random number included in the signature data of the trusted third party TP in TokenTA or TokenTAl Whether the number R' A matches, if the verification is passed, step 8.2);
- step 4 when the message 3 includes the entity verification results Res A and Res B , the token TokenTA and the optional text 7fcc 5, the above step 8.1) may be performed in advance to the above step 5), that is, the entity A receives the message. After 3, step 8.1) is performed first, and then message 4 is sent to entity 3.
- the random numbers R A , ? and 3 ⁇ 4 can be replaced with time stamps or sequence numbers.
- the entity 3 resides on the communication user terminal, and the entity A resides on the network access point.
- the two-way legality authentication between the user and the network access point can be implemented to ensure that the legal user accesses the legal network.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer And Data Communications (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020127007947A KR101471827B1 (ko) | 2009-08-28 | 2009-12-29 | 온라인 제3자를 도입하는 양방향 개체 인증 방법 |
JP2012525850A JP5468137B2 (ja) | 2009-08-28 | 2009-12-29 | オンライン第三者装置を導入するエンティティ双方向認証方法 |
US13/392,899 US8732464B2 (en) | 2009-08-28 | 2009-12-29 | Bidirectional entity authentication method with introduction of online third party |
EP09848650.9A EP2472770A4 (en) | 2009-08-28 | 2009-12-29 | Entity bidirectional authentication method by introducing an online third party |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200910023734.0 | 2009-08-28 | ||
CN2009100237340A CN101640593B (zh) | 2009-08-28 | 2009-08-28 | 一种引入在线第三方的实体双向鉴别方法 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2011022918A1 true WO2011022918A1 (zh) | 2011-03-03 |
Family
ID=41615402
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2009/076179 WO2011022918A1 (zh) | 2009-08-28 | 2009-12-29 | 一种引入在线第三方的实体双向鉴别方法 |
Country Status (6)
Country | Link |
---|---|
US (1) | US8732464B2 (zh) |
EP (1) | EP2472770A4 (zh) |
JP (1) | JP5468137B2 (zh) |
KR (1) | KR101471827B1 (zh) |
CN (1) | CN101640593B (zh) |
WO (1) | WO2011022918A1 (zh) |
Families Citing this family (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100553193C (zh) | 2007-10-23 | 2009-10-21 | 西安西电捷通无线网络通信有限公司 | 一种基于可信第三方的实体双向鉴别方法及其系统 |
CN101674182B (zh) | 2009-09-30 | 2011-07-06 | 西安西电捷通无线网络通信股份有限公司 | 引入在线可信第三方的实体公钥获取、证书验证及鉴别的方法及系统 |
CN101997688B (zh) * | 2010-11-12 | 2013-02-06 | 西安西电捷通无线网络通信股份有限公司 | 一种匿名实体鉴别方法及系统 |
CN101984577B (zh) | 2010-11-12 | 2013-05-01 | 西安西电捷通无线网络通信股份有限公司 | 匿名实体鉴别方法及系统 |
CN103312499B (zh) | 2012-03-12 | 2018-07-03 | 西安西电捷通无线网络通信股份有限公司 | 一种身份认证方法及系统 |
CN103312670A (zh) | 2012-03-12 | 2013-09-18 | 西安西电捷通无线网络通信股份有限公司 | 一种认证方法及系统 |
CN104125063B (zh) | 2013-04-28 | 2016-10-12 | 腾讯科技(深圳)有限公司 | 授权认证方法、设备及系统 |
CN106571920B (zh) * | 2015-10-10 | 2019-09-27 | 西安西电捷通无线网络通信股份有限公司 | 一种多ttp参与的实体身份有效性验证方法及装置 |
CN106572066B (zh) * | 2015-10-10 | 2019-11-22 | 西安西电捷通无线网络通信股份有限公司 | 一种实体身份有效性验证方法及其装置 |
CN106572065B (zh) * | 2015-10-10 | 2019-11-22 | 西安西电捷通无线网络通信股份有限公司 | 一种多ttp参与的实体身份有效性验证方法及装置 |
CN106572063B (zh) * | 2015-10-10 | 2019-10-29 | 西安西电捷通无线网络通信股份有限公司 | 一种多ttp参与的实体身份有效性验证方法及装置 |
CN106572064B (zh) | 2015-10-10 | 2019-10-29 | 西安西电捷通无线网络通信股份有限公司 | 一种多ttp参与的实体身份有效性验证方法及装置 |
JP2019053493A (ja) * | 2017-09-14 | 2019-04-04 | 株式会社日本総合研究所 | クレジットカード、使用可能化方法、およびプログラム |
US20220038910A1 (en) * | 2020-07-31 | 2022-02-03 | Electronics And Telecommunications Research Institute | Method for guaranteeing reliability of packet and apparatus using the same in synchronous wireless distributed communication system |
KR20230049967A (ko) * | 2021-10-07 | 2023-04-14 | 한국전자통신연구원 | 무선 분산 통신 시스템에서 신뢰 필드를 이용한 패킷의 무결성 검사 방법 및 장치 |
CN114615046B (zh) * | 2022-03-07 | 2024-04-30 | 中国大唐集团科学技术研究总院有限公司 | 一种基于国密证书的管理员双因子认证方法 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101145910A (zh) * | 2007-10-23 | 2008-03-19 | 西安西电捷通无线网络通信有限公司 | 一种基于可信第三方的实体双向鉴别方法及其系统 |
CN101222328A (zh) * | 2007-12-14 | 2008-07-16 | 西安西电捷通无线网络通信有限公司 | 一种实体双向鉴别方法 |
CN101247223A (zh) * | 2008-03-06 | 2008-08-20 | 西安西电捷通无线网络通信有限公司 | 一种实用的基于可信第三方的实体双向鉴别方法 |
CN101364876A (zh) * | 2008-09-12 | 2009-02-11 | 西安西电捷通无线网络通信有限公司 | 一种实现实体的公钥获取、证书验证及鉴别的方法 |
CN101364875A (zh) * | 2008-09-12 | 2009-02-11 | 西安西电捷通无线网络通信有限公司 | 一种实现实体的公钥获取、证书验证及双向鉴别的方法 |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH08297638A (ja) * | 1995-04-26 | 1996-11-12 | Nippon Telegr & Teleph Corp <Ntt> | 利用者認証方式 |
JPH08335208A (ja) * | 1995-06-08 | 1996-12-17 | Nippon Telegr & Teleph Corp <Ntt> | 代理認証方法及びシステム |
JPH10210023A (ja) * | 1997-01-27 | 1998-08-07 | Oki Electric Ind Co Ltd | 認証方法、暗号鍵共有方法および通信システム |
US6826690B1 (en) * | 1999-11-08 | 2004-11-30 | International Business Machines Corporation | Using device certificates for automated authentication of communicating devices |
AU8475401A (en) * | 2000-08-08 | 2002-02-18 | Wachovia Corp | Internet third-party authentication using electronic tickets |
JP4714482B2 (ja) * | 2005-02-28 | 2011-06-29 | 株式会社日立製作所 | 暗号通信システムおよび方法 |
CN100488305C (zh) * | 2006-09-23 | 2009-05-13 | 西安西电捷通无线网络通信有限公司 | 一种网络接入鉴别与授权方法以及授权密钥更新方法 |
CN100495963C (zh) * | 2006-09-23 | 2009-06-03 | 西安西电捷通无线网络通信有限公司 | 一种公钥证书状态的获取及验证方法 |
CN101286840B (zh) * | 2008-05-29 | 2014-07-30 | 西安西电捷通无线网络通信股份有限公司 | 一种利用公钥密码技术的密钥分配方法及其系统 |
-
2009
- 2009-08-28 CN CN2009100237340A patent/CN101640593B/zh active Active
- 2009-12-29 EP EP09848650.9A patent/EP2472770A4/en not_active Ceased
- 2009-12-29 JP JP2012525850A patent/JP5468137B2/ja active Active
- 2009-12-29 US US13/392,899 patent/US8732464B2/en active Active
- 2009-12-29 WO PCT/CN2009/076179 patent/WO2011022918A1/zh active Application Filing
- 2009-12-29 KR KR1020127007947A patent/KR101471827B1/ko active IP Right Grant
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101145910A (zh) * | 2007-10-23 | 2008-03-19 | 西安西电捷通无线网络通信有限公司 | 一种基于可信第三方的实体双向鉴别方法及其系统 |
CN101222328A (zh) * | 2007-12-14 | 2008-07-16 | 西安西电捷通无线网络通信有限公司 | 一种实体双向鉴别方法 |
CN101247223A (zh) * | 2008-03-06 | 2008-08-20 | 西安西电捷通无线网络通信有限公司 | 一种实用的基于可信第三方的实体双向鉴别方法 |
CN101364876A (zh) * | 2008-09-12 | 2009-02-11 | 西安西电捷通无线网络通信有限公司 | 一种实现实体的公钥获取、证书验证及鉴别的方法 |
CN101364875A (zh) * | 2008-09-12 | 2009-02-11 | 西安西电捷通无线网络通信有限公司 | 一种实现实体的公钥获取、证书验证及双向鉴别的方法 |
Also Published As
Publication number | Publication date |
---|---|
KR20120052404A (ko) | 2012-05-23 |
JP2013503512A (ja) | 2013-01-31 |
CN101640593B (zh) | 2011-11-02 |
KR101471827B1 (ko) | 2014-12-11 |
EP2472770A4 (en) | 2017-07-26 |
US8732464B2 (en) | 2014-05-20 |
JP5468137B2 (ja) | 2014-04-09 |
CN101640593A (zh) | 2010-02-03 |
US20120159169A1 (en) | 2012-06-21 |
EP2472770A1 (en) | 2012-07-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2011022918A1 (zh) | 一种引入在线第三方的实体双向鉴别方法 | |
KR101117393B1 (ko) | 신뢰가능한 제 3 자 기반의 엔티티 양방향 식별 방법 및 시스템 | |
WO2011026296A1 (zh) | 引入在线可信第三方的实体鉴别方法 | |
KR101139547B1 (ko) | 엔티티 쌍방향 인증 방법 및 시스템 | |
US8510565B2 (en) | Bidirectional entity authentication method based on the credible third party | |
KR101405509B1 (ko) | 온라인 제 3 신뢰 기관을 도입함으로써 엔티티 공개키 획득, 인증서 검증 및 인증을 수행하는 방법 및 시스템 | |
KR101254868B1 (ko) | 고속 핸드오프를 지원하는 엔티티 양방향 신원 방법 | |
JP2019519987A (ja) | ブロックチェーンに基づくアイデンティティ認証方法、装置、ノード及びシステム | |
WO2011022919A1 (zh) | 一种引入在线第三方的实体鉴别方法 | |
TW200952440A (en) | Network helper for authentication between a token and verifiers | |
EP3360279B1 (en) | Public key infrastructure&method of distribution | |
KR20190114434A (ko) | 블록체인 기반의 권한 인증 방법, 단말 및 이를 이용한 서버 | |
KR20220006097A (ko) | 블록체인을 이용한 공개 키 관리를 위한 방법 및 디바이스 | |
WO2012062120A1 (zh) | 匿名实体鉴别方法及装置 | |
JP2013544053A (ja) | 匿名エンティティ認証方法およびシステム本出願は、2010年11月12日に中国特許局に提出し、出願番号が201010546320.9であり、発明名称が「匿名エンティティ認証方法およびシステム」との中国特許出願を基礎とする優先権を主張し、その開示の総てをここに取り込む。 | |
CN107786515B (zh) | 一种证书认证的方法和设备 | |
KR20190114432A (ko) | 블록체인 기반의 권한 인증 방법, 단말 및 이를 이용한 서버 | |
WO2013135170A1 (zh) | 身份认证方法、装置及系统 | |
WO2013135171A1 (zh) | 一种身份认证方法、装置及系统 | |
WO2013135172A1 (zh) | 一种认证方法、装置及系统 | |
JP6122399B2 (ja) | クライアント証明書による端末認証方法、端末認証システム及びプログラム | |
CN116506118A (zh) | 一种pki证书透明化服务中身份隐私性保护方法 | |
WO2011075907A1 (zh) | 一种实现实体的公钥获取、证书验证及双向鉴别的方法 | |
WO2011075906A1 (zh) | 一种实现实体的公钥获取、证书验证及鉴别的方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 09848650 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2009848650 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2012525850 Country of ref document: JP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 13392899 Country of ref document: US |
|
ENP | Entry into the national phase |
Ref document number: 20127007947 Country of ref document: KR Kind code of ref document: A |