Safety authentication method for service-feeding proxy gateway to service-feeding initiator

A push service and agent gateway technology, which is applied in the directions of public key, network connection, user identity/authority verification of secure communication, etc., can solve problems such as prolonging data transmission and processing time, difficulty, and complicated encryption negotiation process, etc., to achieve Ease of grasp and use, increased safety effects

Inactive Publication Date: 2009-01-21
ZTE CORP
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But TLS also has some disadvantages: 1. Slow speed
Due to the complicated encryption negotiation process of TLS, additional time is required for application layer encryption, which will prolong the actual application data transmission and processing time
This effect is fatal for SPs with more requests
2. Difficulty
The TLS encryption process requires a relatively high level of application development and technical personnel, which is a technical threshold for some SPs
3. Additional fees are required
These shortcomings also make it impossible to use TLS in the actual PUSH process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety authentication method for service-feeding proxy gateway to service-feeding initiator
  • Safety authentication method for service-feeding proxy gateway to service-feeding initiator

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] Below in conjunction with accompanying drawing and embodiment the present invention will be described in further detail:

[0028] Such as figure 1 As shown in the interaction diagram between PI and PPG in the present invention, PI sends a PUSH HTTP request, and PPG returns a response message to PI after authentication to inform PI whether the authentication is successful.

[0029] Such as figure 2 Shown, PPG described in the present invention comprises the following steps to the security authentication method of PID:

[0030] Step 201: PI selects the required HTTP header for encryption, and sets an encryption summary expression and an encryption algorithm. In this embodiment, the MD5 algorithm is selected, and the encryption summary expression and the encryption algorithm are notified to PPG;

[0031] The principle of selecting the HTTP header required for encryption in this step is:

[0032] Do not select the HTTP header used for authentication; do not select the H...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a security authentication method for a pushing service requester, which is used by a pushing service proxy gateway. The method comprises that: 1. the pushing service requester selects a HTTP head required by encryption and sets the cryptographic digest expression and the cryptographic algorithm, and informs the pushing service proxy gateway of the cryptographic digest expression and the cryptographic algorithm; 2. the pushing service requester builds the pushing service HTTP request comprising an authentication HTTP head and sends to the pushing service proxy gateway; 3. the pushing service proxy gateway analyzes the HTTP head of the pushing service HTTP request received, fills in the cryptographic digest expression and utilizes the cryptographic algorithm to obtain the digest result, the digest result is contrasted to the value of the authentication HTTP head, if the digest result is same with the value, the HTTP request of the pushing service is legal, otherwise, the HTTP request of the pushing service is illegal. The invention can effectively solve the rubbishy pushing service problem caused by the fake service provider.

Description

technical field [0001] The invention relates to the technical field of mobile communication, in particular to a security authentication method for a push service initiator (PI) by a push service proxy gateway (PPG). Background technique [0002] With the rapid development of mobile communication technology and computer network technology, the popularization of mobile terminals and the improvement of mobile terminal capabilities, the application of Wireless Application Protocol (WAP) is also developing rapidly. Push service (PUSH) is the two major services of WAP applications. One is also developing rapidly and is widely used in multimedia messaging, positioning and other systems. At the same time, spam PUSH messages are also flooding like ordinary spam text messages, partly because of insufficient security certification, and the situation of pretending to be a service provider (SP), which seriously affects consumers' telecom consumption and normal life, and also affects oper...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/30H04L9/32H04L12/66
Inventor 邹小燕
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products