Wireless safety authentication method orienting to mobile terminal

An identity verification method and mobile terminal technology, applied in the field of wireless security identity verification, can solve problems affecting system security, achieve the effects of preventing malicious registration, reducing the risk of malicious access, and preventing replay attacks

Inactive Publication Date: 2012-09-19
HANGZHOU NORMAL UNIVERSITY
View PDF3 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If TTP becomes untrustworthy due to attacks and other reasons, it will become a stronghold for man-in-the-middle attacks, seriously affecting the security of the entire system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless safety authentication method orienting to mobile terminal
  • Wireless safety authentication method orienting to mobile terminal
  • Wireless safety authentication method orienting to mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The present invention will be further described below in conjunction with accompanying drawing.

[0040] Step (1). Mobile terminal registration:

[0041] 1-1. Fill in the registration form on the mobile terminal, and send the user information of the registration form to the authentication server.

[0042] 1-2. After receiving the user information sent by the mobile terminal, the authentication server searches the local database for the record of the user name (Email) in the user information. If the user name already exists, it prompts that the user has registered; if the user name does not If present, registration is allowed.

[0043] 1-3. During the registration process, the authentication server generates the user identity certificate, the user RSA private key, the Diffie-Hellman (DH) key pair belonging to the mobile terminal C and the Diffie-Hellman (DH) key pair belonging to the authentication server CS ;like figure 2As shown, the authentication server invokes t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a wireless safety authentication method orienting to a mobile terminal. The traditional mobile terminal is lower in both computing power and safety. According to the invention, a Diffie-Hellman safety key exchange algorithm, a digital certificate technology and a DES (Data Encryption Standard) symmetric cryptographic algorithm are used, and a local certificate authentication technology, a secondary logon technology and a timestamp technology are combined. The wireless safety authentication method comprises the steps of: firstly, registering by the mobile terminal for the first time; and then, performing local authentication on a user identity certificate and logging on an authentication server by the mobile terminal, thereby realizing the functions of registering in and logging on the authentication server by the mobile terminal in a wireless network. The wireless safety authentication method has the advantages of strong safety, simpleness in oerpation and the like and provides a new reliable method for access intranet resources by the mobile terminal.

Description

technical field [0001] The present invention belongs to the technical field of wireless security identity verification, and in particular relates to a mobile terminal-oriented wireless security identity verification method, in particular to a traditional wireless public key infrastructure (WPKI) based security algorithm and security algorithm used by WPKI Architecture for an improved authentication method for wireless communication networks. Background technique [0002] With the continuous acceleration of the construction of government informatization projects, more and more government departments tend to network their business, such as information collection, data sharing, business acceptance, public opinion feedback, etc., can all be realized through the Internet. At the same time, with the rapid development of wireless communication network technology and the improvement of people's requirements for the convenience of various services, more and more application services ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W12/069
Inventor 夏莹杰邝砾孙才俊吴佳明
Owner HANGZHOU NORMAL UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products