WO2011022919A1 - 一种引入在线第三方的实体鉴别方法 - Google Patents
一种引入在线第三方的实体鉴别方法 Download PDFInfo
- Publication number
- WO2011022919A1 WO2011022919A1 PCT/CN2009/076181 CN2009076181W WO2011022919A1 WO 2011022919 A1 WO2011022919 A1 WO 2011022919A1 CN 2009076181 W CN2009076181 W CN 2009076181W WO 2011022919 A1 WO2011022919 A1 WO 2011022919A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- entity
- message
- party
- trusted
- random number
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
- H04L9/3213—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
Definitions
- the present invention relates to an entity authentication method, and more particularly to an entity authentication method for introducing an online third party.
- Entity authentication methods using asymmetric cryptography can be divided into two types, one-way authentication and two-way authentication.
- the uniqueness or timeliness of identification is identified by time-varying parameters and is often used as a time-series, sequence number, random number, etc. for time-varying parameters. If the time stamp or the sequence number is used as the time-varying parameter, the one-way authentication only needs to use one message, and the two-way authentication needs to use two messages. If the random number is used as the time-varying parameter, the one-way authentication needs to use two messages. Pass-through, two-way authentication requires three messages or four messages (ie, parallel authentication for two messages;).
- the verifier must have a valid public key of the claimant before or during the operation, otherwise the authentication process may be compromised or not successfully completed.
- the three-way method of two-way authentication is taken as an example:
- the entity ⁇ sends a random number R s , an optional text 73 ⁇ 4 ⁇ to the entity A;
- Entity A sends the token 7 ⁇ « ⁇ , the option certificate 3 ⁇ 4rt A to the entity ⁇ ;
- entity ⁇ sends token 7M a4, optional certificate to entity A;
- the three-pass authentication mechanism must be successful in ensuring that the entities ⁇ and ⁇ respectively have the valid public key of the other party, and how to obtain the public key of the other party and its validity, the agreement itself is not involved.
- This guarantee requirement condition cannot be satisfied in the current multi-application environment.
- the communication network usually adopts an entity authentication mechanism to implement the user access control function. Before the authentication mechanism is successfully completed, the user is prohibited from accessing the network, and thus the user cannot be authenticated before the authentication. Or it is difficult to access the certificate authority to obtain the validity of the peer entity, the network access point public key.
- communication networks especially wireless communication networks
- communication networks usually need to complete authentication between users and network access points, not only to ensure that legitimate users access the network, but also to ensure that the network accessed by users is legitimate, and therefore for network entities.
- the effective public key of the communication peer entity is not known before the authentication, but the verification of the public key of the peer entity is completed in the authentication process, the traditional entity authentication mechanism is not only perfected, but also the practical application is implemented. It has good feasibility and ease of use.
- the present invention solves the above technical problems existing in the background art, and proposes an entity authentication method for introducing an online third party.
- the technical solution of the present invention is:
- the present invention is an entity authentication method for introducing an online third party, which is special in that the method includes the following steps:
- the entity sends a message 1 to the entity ⁇ , the message 1 includes a random number R B and an optional text Textl
- the entity A After receiving the message 1, the entity A sends a message 2 to the trusted third party TP, and the message 2 includes a random number, an identity/ A and an optional text 73 ⁇ 4Jrt2;
- the trusted third party TP After receiving the message 2, the trusted third party TP checks the legality of the entity A according to the identity identifier ⁇ ; 4) After checking the legality of the entity A, the trusted third party TP returns a message 3 to the entity A, and the message 3 includes the entity verification result Res A , the token To/ enTA and the optional text Text4;
- the entity A After receiving the message 3, the entity A sends a message 4 to the entity ⁇ , and the message 4 includes the entity verification result Res A , the tokens TokenTA and the TokenAB;
- Step 6) includes:
- trusted third party TP in the TokenTA verify a signature, the message and checks the entity B generates a random number R B and data contained in the signature of the trusted third party TP in the TokenTA random number R B are consistent, if the verification Pass through step 6.2);
- Step 3 above) in legitimacy check entity A process as follows: In the message 2, if the identity of the entity A L A specifier entity A is valid public key of the trusted third party TP searches PublicKey A of the entity A; as ⁇ Entity A's identity / A is entity A's certificate C3 ⁇ 4r A , then trusted third party: TP check certificate (3 ⁇ 4 ⁇ 4 validity Valid A) .
- the above random number R A 'and is a time stamp or a sequence number.
- TokenAB Text6 ⁇ ⁇ I A ⁇ ⁇ sS A ( A ⁇ ⁇ R B ⁇ ⁇ Res A ⁇ ⁇ TokenTA ⁇ ⁇ Text5 )
- the invention adopts a three-entity framework, and the authentication entity needs to obtain the public key or certificate of the trusted third party before the authentication, and obtain the user certificate issued by the trusted third party to itself or hand over the public key to the trusted third party for storage. There is no need to know in advance the valid public key of the peer authentication entity.
- the public key of the authentication entity and its validity are automatically transmitted to the required peers through the search and verification of the trusted third party.
- the invention discloses an online retrieval and authentication mechanism of the public key, realizes centralized management thereof, and simplifies the operating conditions of the protocol, and is convenient for its application implementation.
- DRAWINGS 1 is a schematic diagram of authentication of a three-pass authentication mechanism in the prior art
- Figure 2 is a schematic illustration of the process of the present invention.
- the method of the present invention involves three entities, two authentication entities A and ⁇ , a trusted third party T, and a trusted third party TP is a trusted third party that authenticates entities A and ⁇ .
- entity ⁇ provides an authentication service
- the system for realizing the peer-to-peer authentication between the two entities A and ⁇ through the trusted third party TP is called a Tri-element Peer Authentication (TePA) system.
- TePA Tri-element Peer Authentication
- TokenTA sS T (R B ⁇ ⁇ Res A ⁇ I Text3 )
- entity B sends message 1 to entity A, message 1 includes random number RS and optional text Tfcc;
- the entity A After receiving the message 1, the entity A sends a message 2 to the trusted third party TP, and the message 2 includes a random number, an identity I A and an optional text Text2;
- the trusted third party TP After receiving the message 2, the trusted third party TP checks the legality of the entity A according to the identity/ 4 : In the message 2, if the identity/ A of the entity A is the identifier A of the entity A, the trusted The three-party TP searches for the valid public key of the entity A, PublicKey A ; if the identity of the entity A is the certificate Cert A of the entity A , the trusted third party checks the validity of the certificate Cert A , Valid A.
- the trusted third party TP checks the legality of the entity A, and returns a message 3 to the entity A.
- the message 3 includes the entity verification result Re, the token TokenTA and the optional text Text4;
- the entity A After receiving the message 3, the entity A sends a message 4 to the entity ⁇ , and the message 4 includes the entity verification result Res A , the tokens TokenTA and the TokenAB; 6) After the entity receives the message 4, it performs verification:
- trusted third party TP in the TokenTA verify a signature, the message and checks the entity B generates a random number R B and data contained in the signature of the trusted third party TP in the TokenTA random number R B are consistent, if the verification Pass through step 6.2);
- random numbers R A and R B can be replaced with time stamps or sequence numbers.
- the authentication system is used.
- the entity ⁇ resides on the communication user terminal, and the entity ⁇ resides on the network access point.
- the user can authenticate the legality of the network access point and ensure that the network accessed by the user is legal.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer And Data Communications (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Information Transfer Between Computers (AREA)
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020127007895A KR101471259B1 (ko) | 2009-08-28 | 2009-12-29 | 온라인 제3자를 도입하는 개체 인증 방법 |
JP2012525851A JP5468138B2 (ja) | 2009-08-28 | 2009-12-29 | オンライン第三者装置を導入するエンティティ認証方法 |
US13/392,915 US8763100B2 (en) | 2009-08-28 | 2009-12-29 | Entity authentication method with introduction of online third party |
EP09848651.7A EP2472771A4 (en) | 2009-08-28 | 2009-12-29 | Entity authentication method by introducing online third party |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200910023735.5 | 2009-08-28 | ||
CN2009100237355A CN101645776B (zh) | 2009-08-28 | 2009-08-28 | 一种引入在线第三方的实体鉴别方法 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2011022919A1 true WO2011022919A1 (zh) | 2011-03-03 |
Family
ID=41657503
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2009/076181 WO2011022919A1 (zh) | 2009-08-28 | 2009-12-29 | 一种引入在线第三方的实体鉴别方法 |
Country Status (6)
Country | Link |
---|---|
US (1) | US8763100B2 (zh) |
EP (1) | EP2472771A4 (zh) |
JP (1) | JP5468138B2 (zh) |
KR (1) | KR101471259B1 (zh) |
CN (1) | CN101645776B (zh) |
WO (1) | WO2011022919A1 (zh) |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101997688B (zh) * | 2010-11-12 | 2013-02-06 | 西安西电捷通无线网络通信股份有限公司 | 一种匿名实体鉴别方法及系统 |
CN101984577B (zh) | 2010-11-12 | 2013-05-01 | 西安西电捷通无线网络通信股份有限公司 | 匿名实体鉴别方法及系统 |
JP5988036B2 (ja) * | 2011-05-18 | 2016-09-07 | パナソニックIpマネジメント株式会社 | 通信制御システムおよびその方法、ならびに通信装置およびその方法、プログラム |
CN103312670A (zh) | 2012-03-12 | 2013-09-18 | 西安西电捷通无线网络通信股份有限公司 | 一种认证方法及系统 |
CN103312499B (zh) | 2012-03-12 | 2018-07-03 | 西安西电捷通无线网络通信股份有限公司 | 一种身份认证方法及系统 |
CN103067385B (zh) * | 2012-12-27 | 2015-09-09 | 深圳市深信服电子科技有限公司 | 防御会话劫持攻击的方法和防火墙 |
US9560046B2 (en) * | 2014-11-07 | 2017-01-31 | Kaiser Foundation Hospitals | Device notarization |
JP6489835B2 (ja) * | 2015-01-09 | 2019-03-27 | キヤノン株式会社 | 情報処理システム、情報処理装置の制御方法、及びプログラム |
JP6387908B2 (ja) * | 2015-06-22 | 2018-09-12 | トヨタ自動車株式会社 | 認証システム |
CN106572064B (zh) * | 2015-10-10 | 2019-10-29 | 西安西电捷通无线网络通信股份有限公司 | 一种多ttp参与的实体身份有效性验证方法及装置 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1297636A (zh) * | 1998-03-17 | 2001-05-30 | 桑纳拉斯麦脱信托有限公司 | 可靠和安全地识别合同方的过程和系统 |
US20070208941A1 (en) * | 2006-02-09 | 2007-09-06 | Alejandro Backer | Method and system for authentication of electronic communications |
CN101247223A (zh) * | 2008-03-06 | 2008-08-20 | 西安西电捷通无线网络通信有限公司 | 一种实用的基于可信第三方的实体双向鉴别方法 |
CN101364876A (zh) * | 2008-09-12 | 2009-02-11 | 西安西电捷通无线网络通信有限公司 | 一种实现实体的公钥获取、证书验证及鉴别的方法 |
Family Cites Families (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH08297638A (ja) | 1995-04-26 | 1996-11-12 | Nippon Telegr & Teleph Corp <Ntt> | 利用者認証方式 |
JPH08335208A (ja) | 1995-06-08 | 1996-12-17 | Nippon Telegr & Teleph Corp <Ntt> | 代理認証方法及びシステム |
US5794221A (en) | 1995-07-07 | 1998-08-11 | Egendorf; Andrew | Internet billing method |
JPH10210023A (ja) | 1997-01-27 | 1998-08-07 | Oki Electric Ind Co Ltd | 認証方法、暗号鍵共有方法および通信システム |
US6886102B1 (en) * | 1999-07-14 | 2005-04-26 | Symantec Corporation | System and method for protecting a computer network against denial of service attacks |
CA2418740C (en) | 2000-08-08 | 2010-07-27 | Wachovia Corporation | Internet third-party authentication using electronic tickets |
US7370351B1 (en) | 2001-03-22 | 2008-05-06 | Novell, Inc. | Cross domain authentication and security services using proxies for HTTP access |
US7155608B1 (en) | 2001-12-05 | 2006-12-26 | Bellsouth Intellectual Property Corp. | Foreign network SPAM blocker |
US20030190046A1 (en) * | 2002-04-05 | 2003-10-09 | Kamerman Matthew Albert | Three party signing protocol providing non-linkability |
KR100989487B1 (ko) | 2002-05-24 | 2010-10-22 | 텔레폰악티에볼라겟엘엠에릭슨(펍) | 서비스 제공자의 서비스에 대한 사용자를 인증하는 방법 |
CN100428667C (zh) | 2003-12-01 | 2008-10-22 | 中国电子科技集团公司第三十研究所 | 一种采用公开密钥密码算法数字签名模式的强鉴别方法 |
EP1594280B1 (en) * | 2004-05-07 | 2011-04-20 | Alcatel Lucent | Data authentication method and agent based system |
JP4714482B2 (ja) | 2005-02-28 | 2011-06-29 | 株式会社日立製作所 | 暗号通信システムおよび方法 |
JP4692167B2 (ja) | 2005-09-05 | 2011-06-01 | ヤマハ株式会社 | ミキシング装置 |
CN101064605B (zh) | 2006-04-29 | 2011-02-16 | 华为技术有限公司 | 一种多主机网络的aaa系统及认证方法 |
CN100495963C (zh) | 2006-09-23 | 2009-06-03 | 西安西电捷通无线网络通信有限公司 | 一种公钥证书状态的获取及验证方法 |
CN100488305C (zh) * | 2006-09-23 | 2009-05-13 | 西安西电捷通无线网络通信有限公司 | 一种网络接入鉴别与授权方法以及授权密钥更新方法 |
CN101222328B (zh) * | 2007-12-14 | 2010-11-03 | 西安西电捷通无线网络通信股份有限公司 | 一种实体双向鉴别方法 |
US20110131640A1 (en) * | 2008-02-18 | 2011-06-02 | Microelectronica Espanola S.A.U. | Secure transfer of data |
CN101364875B (zh) * | 2008-09-12 | 2010-08-11 | 西安西电捷通无线网络通信有限公司 | 一种实现实体的公钥获取、证书验证及双向鉴别的方法 |
-
2009
- 2009-08-28 CN CN2009100237355A patent/CN101645776B/zh active Active
- 2009-12-29 EP EP09848651.7A patent/EP2472771A4/en not_active Ceased
- 2009-12-29 WO PCT/CN2009/076181 patent/WO2011022919A1/zh active Application Filing
- 2009-12-29 JP JP2012525851A patent/JP5468138B2/ja active Active
- 2009-12-29 KR KR1020127007895A patent/KR101471259B1/ko active IP Right Grant
- 2009-12-29 US US13/392,915 patent/US8763100B2/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1297636A (zh) * | 1998-03-17 | 2001-05-30 | 桑纳拉斯麦脱信托有限公司 | 可靠和安全地识别合同方的过程和系统 |
US20070208941A1 (en) * | 2006-02-09 | 2007-09-06 | Alejandro Backer | Method and system for authentication of electronic communications |
CN101247223A (zh) * | 2008-03-06 | 2008-08-20 | 西安西电捷通无线网络通信有限公司 | 一种实用的基于可信第三方的实体双向鉴别方法 |
CN101364876A (zh) * | 2008-09-12 | 2009-02-11 | 西安西电捷通无线网络通信有限公司 | 一种实现实体的公钥获取、证书验证及鉴别的方法 |
Also Published As
Publication number | Publication date |
---|---|
US8763100B2 (en) | 2014-06-24 |
JP2013503513A (ja) | 2013-01-31 |
JP5468138B2 (ja) | 2014-04-09 |
KR101471259B1 (ko) | 2014-12-09 |
CN101645776B (zh) | 2011-09-21 |
EP2472771A1 (en) | 2012-07-04 |
KR20120052403A (ko) | 2012-05-23 |
US20120167190A1 (en) | 2012-06-28 |
EP2472771A4 (en) | 2017-07-26 |
CN101645776A (zh) | 2010-02-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2011022919A1 (zh) | 一种引入在线第三方的实体鉴别方法 | |
JP5099568B2 (ja) | 信頼できる第三者に基づいたエンティティの相互認証の方法、及びシステム | |
WO2009076879A1 (zh) | 一种实体双向鉴别方法和系统 | |
WO2011022918A1 (zh) | 一种引入在线第三方的实体双向鉴别方法 | |
WO2009109136A1 (zh) | 一种实用的基于可信第三方的实体双向鉴别方法 | |
KR101405509B1 (ko) | 온라인 제 3 신뢰 기관을 도입함으로써 엔티티 공개키 획득, 인증서 검증 및 인증을 수행하는 방법 및 시스템 | |
WO2011026296A1 (zh) | 引入在线可信第三方的实体鉴别方法 | |
CN101364876B (zh) | 一种实现实体的公钥获取、证书验证及鉴别的方法 | |
KR101254868B1 (ko) | 고속 핸드오프를 지원하는 엔티티 양방향 신원 방법 | |
KR20190114434A (ko) | 블록체인 기반의 권한 인증 방법, 단말 및 이를 이용한 서버 | |
KR20050064119A (ko) | 인터넷접속을 위한 확장인증프로토콜 인증시 단말에서의서버인증서 유효성 검증 방법 | |
KR20220006097A (ko) | 블록체인을 이용한 공개 키 관리를 위한 방법 및 디바이스 | |
US20070234054A1 (en) | System and method of network equipment remote access authentication in a communications network | |
KR20190114433A (ko) | 블록체인 기반의 권한 인증 방법, 단말 및 이를 이용한 서버 | |
KR20190114432A (ko) | 블록체인 기반의 권한 인증 방법, 단말 및 이를 이용한 서버 | |
JP6122399B2 (ja) | クライアント証明書による端末認証方法、端末認証システム及びプログラム | |
CN114915494B (zh) | 一种匿名认证的方法、系统、设备和存储介质 | |
Bellatriu | Kerberos Realm Crossover | |
KR20190114435A (ko) | 블록체인 기반의 권한 인증 방법, 단말 및 이를 이용한 서버 | |
WO2011075907A1 (zh) | 一种实现实体的公钥获取、证书验证及双向鉴别的方法 | |
WO2011075906A1 (zh) | 一种实现实体的公钥获取、证书验证及鉴别的方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 09848651 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2009848651 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2012525851 Country of ref document: JP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 13392915 Country of ref document: US |
|
ENP | Entry into the national phase |
Ref document number: 20127007895 Country of ref document: KR Kind code of ref document: A |