WO2017059743A1 - Procédé et dispositif multi-ttp pour vérifier la validité de l'identité d'une entité - Google Patents
Procédé et dispositif multi-ttp pour vérifier la validité de l'identité d'une entité Download PDFInfo
- Publication number
- WO2017059743A1 WO2017059743A1 PCT/CN2016/096341 CN2016096341W WO2017059743A1 WO 2017059743 A1 WO2017059743 A1 WO 2017059743A1 CN 2016096341 W CN2016096341 W CN 2016096341W WO 2017059743 A1 WO2017059743 A1 WO 2017059743A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- message
- entity
- trusted
- ttp
- signature
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
- H04L9/3213—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
Definitions
- the invention relates to an entity identity validity verification method and device, in particular to an entity identity validity verification method and device with multiple trusted third parties participating.
- the specific identity validity verification environment is an environment that authenticates each other's identity validity between entities that trust different trusted third-party TTPs, and at the same time requires a trusted third party to participate and provide authentication. In this way, an entity identity validity verification method is needed to solve the above problem.
- the present invention provides a method for verifying the validity of an entity identity including two TTPs, and provides a service for entity B to verify the identity validity of entity A.
- a multi-TTP participation entity identity verification method involves entity A, entity B, trusted third party TTP A and trusted third party TTP B.
- the identity valid performance of entity A is verified by TTP A
- the identity of entity B is valid.
- the performance is verified by TTP B
- entity A trusts TTP A
- entity B trusts TTP B , characterized in that the method comprises the following steps:
- entity B sends message 1 to entity A, message 1 includes the random number R B generated by entity B ;
- the entity A After receiving the message 1, the entity A sends a message 2 to the trusted third party TTP A , the message 2 includes the identity information I A of the entity A, the random number R A generated by the entity A, and the random number R B of the entity B ;
- the TTP Trusted Third Party A receives the message sent by the entity A 2, I A according to verify the identity of the entity A, and the trusted third party TTP B 3 sends a message, the message comprising Res 3 A, the TTP randomly generated A and R TPA token number TokenTPAB, wherein, a is the TTP Res a verification result for the entity a, TokenTPAB a contains the TTP the signature, the signature of the TTP signature object comprises Res a and a R B;
- the TTP B After receiving the message 3 sent by the TTP A , the TTP B verifies the signature of the TTP A in the TokenTPAB. After the verification is passed, the message 4 is returned to the TTP A.
- the message 4 includes the R TPA and the token TokenTPBA, wherein the TokenTPBA includes the TTP B.
- Signature, signature object of TTP B signature includes Res A and R B ;
- the TTP A After receiving the message 4 sent by the TTP B , the TTP A verifies the signature of the TTP B included in the TokenTPBA. After the verification is passed, it checks whether the R TPA obtained from the message 4 is random with the TTP B that it sends to the TTP B in the message 3. The number R TPA is consistent. If consistent, the TTP A construct message 5 is sent to the entity A, and the message 5 includes the token TokenTA, wherein the TokenTA contains the signature of the TTP B ;
- construct message 6 is sent to entity B, and message 6 includes TokenTA;
- the entity B After receiving the message 6, the entity B verifies the signature of the TTP B. After the verification is passed, it checks whether the R B obtained from the message 6 is consistent with the random number R B that is sent to the entity A in the message 1. The entity B determines the validity of the identity of the entity A based on the verification result Res A.
- the first entity identity validity verification device includes a storage unit, a transceiver unit, and a processing unit. among them:
- the processing unit is configured to generate a random number R A ;
- the storage unit is configured to store the identity information I A of the first entity identity validity verification device
- the transceiver unit is configured to receive the message 1 sent by the second entity identity validity verification device, and send the message 2 to the first trusted third party device, where the message 1 includes the second entity identity validity verification a random number R B generated by the device, the message 2 comprising I A , R A and R B ;
- the transceiver unit is further configured to receive the message 5 sent by the first trusted third party device, and send the message 6 to the second entity identity validity verification device, where the message 5 includes a token TokenTA, where the TokenTA includes a signature of the second trusted third party device, the signature object of the signature of the second trusted third party device includes Res A and R B , and Res A is the first trusted third party device to the first The verification result of the entity identity validity verification device, the message 6 including TokenTA;
- the processing unit is also used to construct the message 6.
- the second entity identity validity verification device comprises a transceiver unit and a processing unit, wherein:
- the processing unit is configured to generate a random number R B ;
- the transceiver unit is configured to send a message 1 and receive the message 6 sent by the first entity identity validity verification device, the message 1 includes R B , and the message 6 includes a token TokenTA, where the TokenTA includes the a signature of the second trusted third party device, the signature object of the signature of the second trusted third party device includes Res A and R B , and Res A is valid for the first trusted third party device to identify the first entity Verification result of the verification device;
- the processing unit is further configured to verify the signature of the second trusted third party device, and check whether the R B obtained from the message 6 is a random number R that is sent to the first entity identity validity verification device in the message 1 B is consistent, and the validity of the first entity identity validity verification device identity is determined according to the verification result Res A.
- the first trusted third party device comprises a transceiver unit and a processing unit, wherein:
- the transceiver unit is configured to receive the message 2 sent by the first entity identity validity verification device, where the message 2 includes the identity information I A of the first entity identity validity verification device, and the first entity identity validity verification a random number R A generated by the device and a random number R B generated by the second entity identity validity verification device;
- the processing unit is configured to verify the identity of the first entity identity validity verification device according to the I A ;
- the transceiver unit is further configured to send a message 3 to the second trusted third party device, where the message 3 includes Res A , a random number R TPA generated by the first trusted third party device, and a token TokenTPAB, where Res A is the verification result of the first trusted third party device to the first entity identity validity verification device, and the TokenTPAB includes the signature of the first trusted third party device, the first trusted third party device Signature objects of the signature include Res A and R B ;
- the transceiver unit is further configured to receive the message 4 sent by the second trusted third party device, where the message 4 includes an R TPA and a token TokenTPBA, where the TokenTPBA includes a signature of the second trusted third party device,
- the signature object of the signature of the second trusted third party device includes Res A and R B ;
- the processing unit is further configured to verify the signature of the second trusted third party device included in the TokenTPBA, and check whether the R TPA obtained from the message 4 is sent to the second trusted third party device in the message 3
- the random number R TPA is consistent, and constructs a message 5, the message 5 including a token TokenTA, wherein the TokenTA includes a signature of the second trusted third party device;
- the transceiver unit is further configured to send the message 5 to the first entity identity validity verification device.
- the second trusted third party device comprises a transceiver unit and a processing unit, wherein:
- the transceiver unit is configured to receive the message 3 sent by the first trusted third party device, where the message 3 includes Res A , a random number R TPA generated by the first trusted third party device, and a token TokenTPAB, where Res A is the verification result of the first trusted third party device to the first entity identity validity verification device, and the TokenTPAB includes the signature of the first trusted third party device, the first trusted third party device
- the signature object of the signature includes Res A and R B , and R B is a random number generated by the second entity identity validity verification device;
- the processing unit is configured to verify the signature of the first trusted third party device in TokenTPAB;
- the transceiver unit is further configured to return a message 4 to the first trusted third party device, where the message 4 includes an R TPA and a token TokenTPBA, where the TokenTPBA includes a signature of the second trusted third party device, and the second The signed object of the signature of the third party device includes Res A and R B .
- the identity validity of the entity performing mutual identity validity verification can only be verified by different trusted third party TTPs.
- the interaction between the TTPs trusted by the two entities is one entity to another.
- An entity's identity validity verification provides an authentication service that completes the identity validity verification between entities. The invention solves the problem of identity validity verification when an entity trusts different TTPs respectively.
- FIG. 1 is a schematic diagram of a preferred embodiment of a multi-TTP entity identity validity verification method according to the present invention.
- FIG. 2 is a schematic diagram of a first entity identity validity verification apparatus according to the present invention.
- FIG. 3 is a schematic diagram of a second entity identity validity verification apparatus according to the present invention.
- FIG. 4 is a schematic diagram of a first trusted third party device of the present invention.
- FIG. 5 is a schematic diagram of a second trusted third party device of the present invention.
- Entities involved in the method of the present invention include entities A and B, trusted third parties TTP A and TTP B .
- the identity valid performance of entity A is verified by TTP A
- the identity valid performance of entity B is verified by TTP B
- Entity A trusts TTP A
- Entity B trusts TTP B
- the connection relationship between the entity and the TTP is: entity B only connects to entity A, entity A connects entity B and trusted third party TTP A , and trusted third party TTP A simultaneously connects entity A.
- trusted third party TTP B trusted third party TTP B only connects to trusted third party TTP A.
- the method for verifying entity identity validity of multi-TTP participation relates to entity A, entity B, trusted third party TTP A and trusted third party TTP B , and the effective performance of entity A is verified by TTP A
- the identity valid performance of entity B is verified by TTP B
- entity A trusts TTP A
- entity B trusts TTP B , characterized in that the method comprises the following steps:
- entity B sends message 1 to entity A, message 1 includes the random number R B generated by entity B ;
- the entity A After receiving the message 1, the entity A sends a message 2 to the trusted third party TTP A , the message 2 includes the identity information I A of the entity A, the random number R A generated by the entity A, and the random number R B of the entity B ;
- the TTP Trusted Third Party A receives the message sent by the entity A 2, I A according to verify the identity of the entity A, and the trusted third party TTP B 3 sends a message, the message comprising Res 3 A, the TTP randomly generated A and R TPA token number TokenTPAB, wherein, a is the TTP Res a verification result for the entity a, TokenTPAB a contains the TTP the signature, the signature of the TTP signature object comprises Res a and a R B;
- the TTP B After receiving the message 3 sent by the TTP A , the TTP B verifies the signature of the TTP A in the TokenTPAB. After the verification is passed, the message 4 is returned to the TTP A.
- the message 4 includes the R TPA and the token TokenTPBA, wherein the TokenTPBA includes the TTP B.
- Signature, signature object of TTP B signature includes Res A and R B ;
- the TTP A After receiving the message 4 sent by the TTP B , the TTP A verifies the signature of the TTP B included in the TokenTPBA. After the verification is passed, it checks whether the R TPA obtained from the message 4 is random with the TTP B that it sends to the TTP B in the message 3. The number R TPA is consistent. If consistent, the TTP A construct message 5 is sent to the entity A, and the message 5 includes the token TokenTA, wherein the TokenTA contains the signature of the TTP B ;
- construct message 6 is sent to entity B, and message 6 includes TokenTA;
- the entity B After receiving the message 6, the entity B verifies the signature of the TTP B. After the verification is passed, it checks whether the R B obtained from the message 6 is consistent with the random number R B that is sent to the entity A in the message 1. The entity B determines the validity of the identity of the entity A based on the verification result Res A.
- entity B has completed verification of the validity of entity A identity.
- the TTP Trusted Third Party A receives the message sent by the entity A 2, I A according to verify the identity of the entity A comprises:
- TTP A extracts the public key P A of entity A , and Re A includes P A at this time;
- Res A includes the content indicating that the verification failed.
- the TTP generates a random number A may not necessarily be the RTP A, but used directly in the message 3 by the entity A generated and sent to the TTP A random number R A in place of R TPA, the subsequent step 4) R A is also used instead of R TPA in step 5).
- TTP A does not have to generate random numbers without affecting the security, which reduces the computational complexity of TTP A , thereby improving the efficiency of the system.
- step 5 when the verification signature fails or the random number is determined to be inconsistent, the corresponding message may be discarded or the identity validity verification process may be terminated. The way to deal with it.
- the digital signature algorithm includes an algorithm with message recovery and no message recovery. If the target field can be restored when the signature is verified, the verification signer can directly recover the target from the signature after the verification signature is passed. Field; if the target field cannot be recovered when the signature is verified, those skilled in the art will usually carry the target field in the message, thereby verifying that the signer can directly obtain the target field from the message.
- step 5 if the target field R TPA can be restored when the TTP A verifies the signature, the TTP A can directly recover the R TPA from the signature after verifying the signature of the TTP B ; if the TTP A verifies the signature, it cannot To restore the target field R TPA , you need to carry R TPA directly in message 4, and TTP A can directly obtain R TPA from message 4.
- the present invention further provides a first entity identity validity verification apparatus, which is used by the first trusted third party device and the second trusted third party device. And performing identity validity verification with the second entity identity validity verification device, where the first entity identity validity verification device includes a storage unit 11, a transceiver unit 12, and a processing unit 13, wherein:
- the processing unit 13 is configured to generate a random number R A ;
- the storage unit 11 is configured to store the identity information I A of the first entity identity validity verification device
- the transceiver unit 12 is configured to receive the message 1 sent by the second entity identity validity verification device, and send the message 2 to the first trusted third party device, where the message 1 includes the second entity identity validity Verifying the random number R B generated by the device, the message 2 including I A , R A and R B ;
- the transceiver unit 12 is further configured to receive the message 5 sent by the first trusted third party device, and send a message 6 to the second entity identity validity verification device, where the message 5 includes a token TokenTA, where TokenTA
- the signature of the second trusted third party device, the signature object of the signature of the second trusted third party device includes Res A and R B , and Res A is the first trusted third party device a verification result of an entity identity validity verification device, the message 6 including TokenTA;
- the processing unit 13 is also used to construct the message 6.
- the present invention further provides a second entity identity validity verification apparatus for participation by the first trusted third party device and the second trusted third party device. And performing identity validity verification with the first entity identity validity verification device, where the second entity identity validity verification device includes a transceiver unit 21 and a processing unit 22, wherein:
- the processing unit 22 is configured to generate a random number R B ;
- the transceiver unit 21 is configured to send a message 1 and receive the message 6 sent by the first entity identity validity verification device, the message 1 includes R B , and the message 6 includes a token TokenTA, where the TokenTA includes the a signature of the second trusted third party device, the signature object of the signature of the second trusted third party device includes Res A and R B , and Res A is the identity of the first entity by the first trusted third party device The verification result of the validity verification device;
- For further processing unit 22 of the second trusted third party signature verification device checks the message obtained from 6 R B whether to transmit the random number with its own identity the first entity the validity verification means in a message R B is consistent, and the validity of the identity of the first entity identity validity verification device is determined according to the verification result Res A.
- the present invention further provides a first trusted third party device for participating in the first entity identity validity verification device together with the second trusted third party device.
- Identity validity verification between the second entity identity validity verification device, the first trusted third party device comprising a transceiver unit 31 and a processing unit 32, characterized in that:
- the transceiver unit 31 is configured to receive the message 2 sent by the first entity identity validity verification device, where the message 2 includes the identity information I A of the first entity identity validity verification device, and the first entity identity validity a random number R A generated by the verification device and a random number R B generated by the second entity identity validity verification device;
- the processing unit 32 is configured to verify the identity of the first entity identity validity verification device according to the I A ;
- the transceiver unit 31 is further configured to send a message 3 to the second trusted third party device, where the message 3 includes Res A , a random number R TPA generated by the first trusted third party device, and a token TokenTPAB, where Res A is the verification result of the first trusted third party device to the first entity identity validity verification device, and the TokenTPAB includes the signature of the first trusted third party device, the first trusted third party
- the signed object of the signature of the device includes Res A and R B ;
- the transceiver unit 31 is further configured to receive the message 4 sent by the second trusted third party device, where the message 4 includes an R TPA and a token TokenTPBA, where the TokenTPBA includes a signature of the second trusted third party device.
- the signature object of the signature of the second trusted third party device includes Res A and R B ;
- the processing unit 32 is further configured to verify the signature of the second trusted third party device included in the TokenTPBA, and check whether the R TPA obtained from the message 4 is sent to the second trusted third party device in the message 3 The random number R TPA is consistent, and constructs a message 5, the message 5 including a token TokenTA, wherein the TokenTA contains the signature of the second trusted third party device;
- the transceiver unit 31 is further configured to send the message 5 to the first entity identity validity verification device.
- the first trusted third party TTP A receives the message 2 sent by the first entity identity validity verification device, and verifies the identity of the first entity identity validity verification device according to the I A ,
- I A is a discriminator of the first entity identity validity verification device
- the processing unit 32 is further configured to extract the public key P A of the first entity identity validity verification device
- Processing unit 32 is further configured to check the validity of Cert A.
- the present invention further provides a second trusted third party device for participating in the first entity identity validity verification device together with the first trusted third party device.
- Identity validity verification between the second entity identity validity verification device, the second trusted third party device comprising a transceiver unit 41 and a processing unit 42, characterized in that:
- the transceiver unit 41 is configured to receive the message 3 sent by the first trusted third party device, where the message 3 includes Res A , a random number R TPA generated by the first trusted third party device, and a token TokenTPAB, where Res A is the verification result of the first trusted third party device to the first entity identity validity verification device, and the TokenTPAB includes the signature of the first trusted third party device, the first trusted third party
- the signature object of the signature of the device includes Res A and R B , and the R B is a random number generated by the second entity identity validity verification device;
- the processing unit 42 is configured to verify the signature of the first trusted third party device in the TokenTPAB;
- the transceiver unit 41 is further configured to return a message 4 to the first trusted third party device, where the message 4 includes an R TPA and a token TokenTPBA, where the TokenTPBA includes a signature of the second trusted third party device, and the second The signature objects of the signature of the trusted third party device include Res A and R B .
- the foregoing apparatus corresponds to each entity in the method embodiment of the present invention.
- the first entity identity validity verification apparatus includes an entity A
- the second entity identity validity verification apparatus includes Entity B
- the first trusted third party device includes a trusted third party TTP A
- the second trusted third party device includes a trusted third party TTP B .
- the system of the above described apparatus provided in accordance with Figure 1 is capable of implementing the method of the present invention. It should be understood by those skilled in the art that the specific configuration of each device has been demonstrated by the foregoing device embodiments, and further working details are also corresponding to the foregoing method embodiments, and need not be described.
- embodiments of the present invention can be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment, or a combination of software and hardware. Moreover, the invention can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) including computer usable program code.
- computer-usable storage media including but not limited to disk storage, CD-ROM, optical storage, etc.
- the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
- the apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
- These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device.
- the instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Storage Device Security (AREA)
Abstract
L'invention concerne un procédé et un dispositif multi-TTP pour vérifier si l'identité d'une entité est valide. Le procédé comprend les étapes suivantes : la transmission, par une entité B, d'un message 1 à une entité A ; après réception du message 1, la transmission, par l'entité A, d'un message 2 à un tiers de confiance (TTPA) ; après réception du message 2, la vérification, par le TTPA, de l'identité de l'entité A pour déterminer sa validité et la transmission d'un message 3 au TTPB ; après réception du message 3, la vérification, par le TTPB, d'une première signature du TTPAdans le message 3 et la transmission d'un message 4 au TTPA ; après réception du message 4, la vérification, par le TTPA, d'une première signature du TTPB dans le message 4, et la transmission d'un message 5 à l'entité A ; après réception du message 5, la configuration, par l'entité A, d'un message 6 et la transmission du message 6 à l'entité B ; et, après la réception du message 6, la vérification, par l'entité B, de l'identité de l'entité A pour déterminer sa validité. L'invention vérifie la validité de l'identité d'entités faisant confiance à des tiers de confiance différents, respectivement.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201510654784.4A CN106571920B (zh) | 2015-10-10 | 2015-10-10 | 一种多ttp参与的实体身份有效性验证方法及装置 |
| CN201510654784.4 | 2015-10-10 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2017059743A1 true WO2017059743A1 (fr) | 2017-04-13 |
Family
ID=58487276
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2016/096341 Ceased WO2017059743A1 (fr) | 2015-10-10 | 2016-08-23 | Procédé et dispositif multi-ttp pour vérifier la validité de l'identité d'une entité |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN106571920B (fr) |
| WO (1) | WO2017059743A1 (fr) |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20020174075A1 (en) * | 2001-05-15 | 2002-11-21 | International Business Machines Corporation | System & method for on-line payment |
| CN101247223A (zh) * | 2008-03-06 | 2008-08-20 | 西安西电捷通无线网络通信有限公司 | 一种实用的基于可信第三方的实体双向鉴别方法 |
| WO2009031082A1 (fr) * | 2007-09-03 | 2009-03-12 | Koninklijke Philips Electronics N.V. | Appareil et procédés pour transférer du contenu numérique |
| CN101453476A (zh) * | 2009-01-06 | 2009-06-10 | 中国人民解放军信息工程大学 | 一种跨域认证方法和系统 |
Family Cites Families (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| GB2415579B (en) * | 2004-06-23 | 2006-12-20 | Hewlett Packard Development Co | Cryptographic method and apparatus |
| GB2416282B (en) * | 2004-07-15 | 2007-05-16 | Hewlett Packard Development Co | Identifier-based signcryption with two trusted authorities |
| EP2128781A1 (fr) * | 2008-05-27 | 2009-12-02 | Benny Kalbratt | Procédé d'authentification |
| CN101378318B (zh) * | 2008-10-08 | 2010-09-15 | 南京邮电大学 | 开放网络中基于动态可信第三方的身份认证方法 |
| CN101640593B (zh) * | 2009-08-28 | 2011-11-02 | 西安西电捷通无线网络通信股份有限公司 | 一种引入在线第三方的实体双向鉴别方法 |
| CN101674182B (zh) * | 2009-09-30 | 2011-07-06 | 西安西电捷通无线网络通信股份有限公司 | 引入在线可信第三方的实体公钥获取、证书验证及鉴别的方法及系统 |
-
2015
- 2015-10-10 CN CN201510654784.4A patent/CN106571920B/zh active Active
-
2016
- 2016-08-23 WO PCT/CN2016/096341 patent/WO2017059743A1/fr not_active Ceased
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20020174075A1 (en) * | 2001-05-15 | 2002-11-21 | International Business Machines Corporation | System & method for on-line payment |
| WO2009031082A1 (fr) * | 2007-09-03 | 2009-03-12 | Koninklijke Philips Electronics N.V. | Appareil et procédés pour transférer du contenu numérique |
| CN101247223A (zh) * | 2008-03-06 | 2008-08-20 | 西安西电捷通无线网络通信有限公司 | 一种实用的基于可信第三方的实体双向鉴别方法 |
| CN101453476A (zh) * | 2009-01-06 | 2009-06-10 | 中国人民解放军信息工程大学 | 一种跨域认证方法和系统 |
Non-Patent Citations (1)
| Title |
|---|
| BODKHE, B. ET AL.: "An Efficient Free Fair Contract Signing Protocol Using OTPK", IEEE XPLORE, 3 October 2013 (2013-10-03), pages 1 - 5, XP032492692 * |
Also Published As
| Publication number | Publication date |
|---|---|
| CN106571920B (zh) | 2019-09-27 |
| CN106571920A (zh) | 2017-04-19 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN104836784B (zh) | 一种信息处理方法、客户端和服务器 | |
| US10176307B2 (en) | Licensing using a node locked virtual machine | |
| WO2017059737A1 (fr) | Procédé et dispositif pour vérifier la validité de l'identité d'une entité | |
| WO2017059744A1 (fr) | Procédé et dispositif utilisant de multiples ttp pour vérifier la validité de l'identité d'une entité | |
| CN106572063B (zh) | 一种多ttp参与的实体身份有效性验证方法及装置 | |
| WO2017059735A1 (fr) | Procédé et dispositif multi-ttp pour vérifier la validité de l'identité d'une entité | |
| WO2017059743A1 (fr) | Procédé et dispositif multi-ttp pour vérifier la validité de l'identité d'une entité | |
| CN106571921B (zh) | 一种实体身份有效性验证方法及其装置 | |
| WO2017059755A1 (fr) | Procédé et dispositif permettant de vérifier la validité de l'identité d'une entité |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 16853049 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 16853049 Country of ref document: EP Kind code of ref document: A1 |