Identity authentication method and system

Identity authentication method and system

  • CN 103,312,499 A
  • Filed: 03/12/2012
  • Published: 09/18/2013
  • Est. Priority Date: 03/12/2012
  • Status: Active Grant
First Claim
Patent Images

1. an identity identifying method is characterized in that, said method comprising the steps of:

  • 1) the first authenticator sends the first authentication message to the second authenticator;

    2) the second authenticator sends the second authentication message to certificate server, comprises the sign of the second authenticator security domain of living in the second authentication message;

    3) after certificate server is received the second authentication message, according to the legitimacy of the second authentication information authentication the second authenticator security domain of living in, produce the result to the second authenticator security domain of living in;

    4) certificate server returns the tiers e'"'"'tat authentication message to the second authenticator, comprises in the tiers e'"'"'tat authentication message that the result of the second authenticator security domain of living in and certificate server are to the result that comprises the second authenticator security domain of living in authentication information at internal information;

    5) after the second authenticator receives the tiers e'"'"'tat authentication message, send the 4th authentication message to the first authenticator, the result, certificate server that comprises sign, the second authenticator security domain of living in of the second authenticator security domain of living in the 4th authentication message to the result that comprises the second authenticator security domain of living in the authentication information of internal information and the second authenticator to the identifier that comprises the first authenticator authentication information at internal information;

    6) after the first authenticator receives the 4th authentication message, the 4th authentication message is verified and is determined according to the checking situation legitimacy of second authenticator'"'"'s identity.

View all claims
    ×
    ×

    Thank you for your feedback

    ×
    ×