Identity authentication method and system and data transmission method and device based on same

A technology of a data transmission method and a data transmission device, which is applied in the field of devices, data transmission methods, identity authentication methods, and systems, can solve problems such as unfavorable secure communication between a client and a server, and achieve the effect of ensuring security and the security of an identity authentication method

Active Publication Date: 2013-09-04
中科芯云微电子科技有限公司
View PDF3 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The above-mentioned identity authentication method is too simple, which is not conducive to the secure communication between the client and the server

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and system and data transmission method and device based on same
  • Identity authentication method and system and data transmission method and device based on same
  • Identity authentication method and system and data transmission method and device based on same

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0082] figure 2 It shows a schematic flowchart of an identity authentication method in Embodiment 1 of the present invention, and the method includes the following steps:

[0083] Step S201: the client establishes a connection with the server.

[0084] In the embodiment of the present invention, the client may be a VNC client, and the server may be a VNC server. Specifically, the client can establish an HTTP (Hypertext transport protocol, hypertext transfer protocol) connection or a Socket (socket) connection with the server, where the connection between the client and the server is only the client and the server can send messages to each other The state is not the state where the client and the server send data and communicate with each other.

[0085] Step S202: the client sends an identity authentication request message to the server.

[0086] Step S203: The server generates a corresponding key file according to the received request message.

[0087] After the server r...

Embodiment 2

[0108] image 3 It shows a schematic flowchart of the method for identity authentication in Embodiment 2 of the present invention, and the method includes the following steps:

[0109] It should be noted that steps S301 to S308 in the second embodiment are the same as steps S201 to S208 in the first embodiment, and will not be repeated here. For related content, please refer to the description in the first embodiment.

[0110] Step S309: the server generates a second session key, and encrypts the second session key.

[0111] After sending the first session key to the client, the server can generate a second session key through a random function, and encrypt the second session key with a public key (such as an RSA public key).

[0112] Further, the server can also obtain the length z of the second session key, and the function defining the length of the second session key can be N(z), wherein the function N(z) can be a linear function, preferably the function N(z ) can be a n...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an identity authentication method and system and a data transmission method and device based on the identity authentication method and system. The identity authentication method comprises the steps: sending a request message of identity authentication to a server, receiving a secret key file returned by the server according to the request message, decoding the secret key file, receiving a first session secret key sent by the server, decoding the first session secret key, receiving a challenge message which is generated and sent by the server and encrypted through the first session secret key, and decoding the challenge message through the first session secret key. Compared with a simple identity authentication method in the prior art, the identity authentication method is safer, and accordingly safety of communication between a client and the server is ensured.

Description

technical field [0001] The invention belongs to the technical field of computer network communication, and in particular relates to an identity authentication method and system and a data transmission method and device based thereon. Background technique [0002] With the rapid development of network technology, remote control technology has attracted more and more attention. Commonly used remote management desktop connection tools under the Linux system include RDP (Remote Desktop Protocol, Remote Desktop Protocol), VNC (Virtual Network Computing, virtual network computer), NX, SSH (Secure Shell, secure shell protocol), etc. One of the most important is VNC, which communicates based on the RFB (Remote Frame Buffer, remote frame buffer) protocol. The RFB protocol works at the frame buffer layer, so it is more cross-platform. The RFB protocol is a "thin client" protocol, and VNC can reduce the requirements for client hardware; VNC is open source, and users can continuously ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
Inventor 王颖陈岚白利达
Owner 中科芯云微电子科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products