Method and system for implementing authentication and data safe transmission

A data security and data technology, which is applied in the field of authentication and data security transmission, and can solve problems such as key security storage

Inactive Publication Date: 2009-07-15
BEIJING HUADA ZHIBAO ELECTRONICS SYST
View PDF0 Cites 44 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, the object of the present invention is to provide a method and system for realizing authentication and secure data transmission, which is used to solve the problem of key security storage in the current authentication process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for implementing authentication and data safe transmission
  • Method and system for implementing authentication and data safe transmission
  • Method and system for implementing authentication and data safe transmission

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The embodiment of the present invention provides a method for data security interaction between a terminal security device and an authentication terminal, and furthermore, provides a security protection method for the used symmetric key, which can solve the problem of key security storage in the current authentication process. At the same time, it effectively prevents the plug-in "spoofing" operation, and improves the security of authentication, transaction and data transmission.

[0020] In the method and system for implementing authentication and secure data transmission provided by the embodiments of the present invention, after the terminal security device and the authentication terminal are connected, the terminal security device and the authentication terminal agree on the same data as the root key, and at the same time, both parties negotiate and agree on the same dispersion factor And algorithm, the two parties use this algorithm to generate the same session key ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an authentication and safe transmission of data realizing method. A terminal safety device and an authentication terminal after being connected negotiates to have a same data to be used as a root key, and at the same time negotiates to have a same dispersion factor and a same algorithm, the negotiated root key and dispersion factor generate a same session key used as a symmetrical key by using the algorithm, and then, safety authentication and data encryption and decryption can be performed and safety data interaction between the two ends can be realized. The invention also discloses a system for realizing authentication and safe transmission of data, and the system comprises a terminal safety device, an authentication terminal and an authentication server. According to the invention, randomness of the session key for data encryption transmission can be assured, even though a session key is decrypted, the safety of the whole system can be assured, and at the same time, atom manipulation for safety authentication and safe transmission of data can be realized for avoiding that in the current authentication process, once a password is verified by the terminal safety device, limits of authority are totally released and potential safety hazard is generated, therefore, authentication safety is improved greatly.

Description

technical field [0001] The invention relates to authentication and data transmission technology, in particular to a method and system for realizing authentication and data security transmission. Background technique [0002] A smart card is a special integrated circuit chip, which has the characteristics of fast calculation, large storage capacity, and high security. It can realize functions such as identification, payment, encryption / decryption, and has been widely used in banking, telecommunications, social insurance, and e-commerce. and other fields. [0003] The security system of the smart card is based on the framework of the symmetric key system, that is, the authentication parties must share the same key or password to complete the authentication and the encryption / decryption of data. In traditional applications, the SAM module (card) installed in the smart card terminal (card reader) or the encryption machine installed in the background of the system can be used to...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04W12/02H04W12/04
Inventor 夏皓如广忠海华燕翔冯海川张超张炜胡庆格
Owner BEIJING HUADA ZHIBAO ELECTRONICS SYST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products