Two-way-security-authentication-based data downloading method and system

A two-way security authentication and data download technology, applied in the field of information security, can solve the problems of imperfect security authentication mechanism and data security download mechanism, and achieve the effect of protecting security and integrity

Active Publication Date: 2012-04-11
BEIJING SUMAVISION PAYMENT TECH CO LTD
View PDF3 Cites 41 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Aiming at the problem that only one-way security authentication is adopted between different terminals in the related technology, resulting in imperfect security authentication mechanism and data security download mechanism, the present invention has not been raised yet. Therefore, the main purpose of the present invention is to provide A data download method and system based on two-way security authentication to solve the above problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-way-security-authentication-based data downloading method and system
  • Two-way-security-authentication-based data downloading method and system
  • Two-way-security-authentication-based data downloading method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present invention will be described in detail below with reference to the accompanying drawings and examples.

[0025] figure 1 It is a schematic structural diagram of a data download system based on two-way security authentication according to an embodiment of the present invention. Such as figure 1 As shown, the data download system based on two-way security authentication includes: a first terminal, which sends a data download request; a second terminal, which receives a data download request, and after verifying that the first terminal and the second terminal are legal terminals, will pass The data encrypted and processed by the digital signature algorithm is downloaded to the first terminal; wherein, the first terminal verifies the second terminal through the symmetric key algorithm to obtain the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a two-way-security-authentication-based data downloading method and a two-way-security-authentication-based data downloading system. The method comprises that: a first terminal verifies a second terminal through a symmetric key algorithm to acquire a first verification result; after the second terminal is determined to be a legal terminal according to the first verification result, the second terminal verifies the first terminal through an asymmetric key algorithm to acquire a second verification result; and after the first terminal is determined to be a legal terminal according to the second verification result, the second terminal downloads data which is encrypted through a digital signature algorithm to the first terminal. By the method and the system, the creation of two-way authentication channels and security downloading among different terminals can be realized, and the security and integrity of interactive data are protected.

Description

technical field [0001] The invention relates to the field of information security, in particular to a data download method and system based on two-way security authentication. Background technique [0002] In the existing network information security field, the key can be generated by the public-private key generation module, and different verification parameters can be generated through public-private key exchange and matching, so as to realize the authentication process between different terminals. However, the existing authentication methods are usually one-way security authentication, and after the authentication is completed, a complete security mechanism is not provided for the secure download of data. [0003] At present, only one-way security authentication is used between different terminals of related technologies, which leads to the problem of imperfect security authentication mechanism and data security download mechanism, and no effective solution has been propo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 李京娜汤俊峰刘利华郑力铮陈鹏飞张向辉
Owner BEIJING SUMAVISION PAYMENT TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products