Bidirectional ID (Identity) authentication method based on dynamic password and digital certificate

A technology of two-way identity authentication and digital certificate, applied in the field of computer system network security

Active Publication Date: 2011-01-26
SICHUAN CHANGHONG ELECTRIC CO LTD
View PDF1 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of the present invention is to overcome the disadvantages of system resource authorization risks in current dig...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Bidirectional ID (Identity) authentication method based on dynamic password and digital certificate
  • Bidirectional ID (Identity) authentication method based on dynamic password and digital certificate
  • Bidirectional ID (Identity) authentication method based on dynamic password and digital certificate

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0045] In this example, both the default server and the client already have their own certificate chains, which means that the default server has the server certificate and the upper-level CA certificate, and the client has the client certificate and the upper-level CA certificate.

[0046] First, the client sends a registration request to the server, and the user enters the user's identity information ID on the client c and password PW, when the server receives the registration request, it judges the received ID c Whether it has been registered, if so, go back to the step where the client sends a registration request to the server, and prompt the client to re-enter, if not, the client generates a random number R 0-1 and R 0 , and calculate as follows: Y 0 =H(ID c , X 0 ), get data R 0 、C 0 、X 0 , the client saves the data R 0 、C 0 , and put the data X 0 Send to the server through the network security channel, the server receives and saves the data X 0 , the reg...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a computer network security technology, in particular to a bidirectional ID (Identity) authentication method based on a dynamic password and a digital certificate, solving the problem of system resource authorization risk in a traditional authentication system. The technical scheme comprises the following steps of: acquiring a user ID and a server ID in a certificate analysis mode; and authenticating a client and the server in a mode of combining the digital certificate with the dynamic password. The invention has the advantage of high security authentication between two communicating parties and is suitable for the secured communication of a network.

Description

technical field [0001] The invention relates to computer technology, in particular to the technology of computer system network security. Background technique [0002] With the development of computer networks and the rapid popularization of network applications, people pay more and more attention to network security, and network security access control is becoming more and more important. Most of the attacks on network systems are intruders who obtain existing channels or disguise their identities. On the basis of establishing a communication channel with users, identity authentication is the first checkpoint in the security system. Identity authentication technology solves the problem of verifying the real identities of both parties in network communication, and the purpose is to establish a relationship of mutual trust between communication parties , to verify the real identity of the user, to prevent illegal users from stealing sensitive data, through theoretical analysi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32
Inventor 王艳艳刘贤洪
Owner SICHUAN CHANGHONG ELECTRIC CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products