Mutual authentication method between terminal and server

A two-way authentication, server technology, applied in user identity/authority verification, key distribution, can solve the problem of low communication security, and achieve the effect of ensuring security and privacy, simple two-way authentication method, and realizing protection.

Inactive Publication Date: 2010-07-07
上海茂碧信息科技有限公司
View PDF0 Cites 51 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In order to solve the problem of low communication security between the terminal and the server in the prior art, it is necessary to provide a two-way authentication method between the terminal and the server that improves communication security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mutual authentication method between terminal and server
  • Mutual authentication method between terminal and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0007] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0008] The two-way authentication method between the terminal and the server of the present invention is applicable to a general terminal (client)-server communication architecture, and the terminal can be a PC (Personal Computer), a mobile phone, a PDA (Personal Digital Assistant), a PMP (Personal Media Player) ) and other communication terminals.

[0009] see figure 1 , is a flow chart of the two-way authentication method between the terminal and the server of the present invention. The two-way authentication method between the terminal and the server includes a process for the terminal to verify whether the server is legal and a process for the server to verify whether the terminal is legal, wherein the process for the terminal to verify whether the server is ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a mutual authentication method between a terminal and a server. The method comprises that: the terminal generates an identity number and a first random number and sends the identity number and the first random number to the server; the server verifies whether the identity number exists in a database of the server; the server generates a first operation result according to the identity number, the first random number and a server secret key, and the first operation result and a second random number are transmitted to the terminal; the terminal generates a second operation result according to the identity number, the first random number and the server secret key and carries out authentication on the server according to the first and second operation results; the terminal generates a third operation result according to the second random number and a terminal secret key and sends the third operation result to the server; and the server generates a fourth operation result according to the second random number and the terminal secret key and carries out authentication on the terminal according to the third and fourth operation results.

Description

technical field [0001] The invention relates to a two-way authentication method between a terminal and a server. Background technique [0002] With the development of communication technology, there are more and more types of communication terminal products and their applications are becoming more and more extensive, but communication networks are also being attacked more and more. Therefore, most of the existing communication networks are The terminal uses a fixed user name and password for authentication to increase security. However, due to the long-term use of a fixed user name and password, the user name and password are easy to be stolen. Therefore, the security of the communication method using a fixed user name and password is low. Contents of the invention [0003] In order to solve the problem of low communication security between the terminal and the server in the prior art, it is necessary to provide a two-way authentication method between the terminal and the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08
Inventor 刘银兵
Owner 上海茂碧信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products