Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security authentication method, device and system based on security transport layer protocol

A technology of secure transport layer and security authentication, which is applied to equipment and systems, and in the field of security authentication methods based on secure transport layer protocols, can solve problems such as secure data transmission that have not yet been proposed

Active Publication Date: 2016-12-28
HUAWEI TECH CO LTD
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the SM2 algorithm is still in the promotion stage, and an effective mechanism for applying the SM2 algorithm for secure data transmission has not yet been proposed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security authentication method, device and system based on security transport layer protocol
  • Security authentication method, device and system based on security transport layer protocol
  • Security authentication method, device and system based on security transport layer protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0128] The embodiment of the present invention provides a security authentication method based on a security transport layer protocol, related equipment and a communication system, in order to provide a mechanism capable of using the SM2 algorithm for data transmission, so as to accelerate the application of the SM2 algorithm.

[0129] In order to enable those skilled in the art to better understand the solutions of the present invention, the following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is an embodiment of a part of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[01...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a TLS-based security authentication method, related equipment and a communication system. A method for security authentication based on the TLS protocol, comprising: a client sends a client initialization handshake message to a server, the client initialization handshake message carries N algorithm set identifiers, and M algorithm set identifiers among the N algorithm set identifiers The algorithm set corresponding to each algorithm set identifier in includes the SM2 algorithm; receiving the server initialization handshake message sent by the server, the server initialization handshake message carries the first algorithm set identifier, and the first algorithm set identifier is one of the M algorithm set identifiers One of them; performing security authentication with the server based on the first algorithm set corresponding to the first algorithm set identifier. The scheme of the embodiment of the present invention provides a mechanism capable of using the SM2 algorithm for data transmission, which is beneficial to give play to the advantages of the SM2 algorithm in terms of security, and improve the security and performance of security authentication and data transmission.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a security authentication method, device and system based on a security transport layer protocol. Background technique [0002] Currently, the Transport Layer Security (TLS) protocol is the most widely used security protocol in network transmission. The TLS protocol is an international standard, and the TLS protocol uses a large number of internationally used related algorithms. [0003] The SM2 algorithm is an asymmetric encryption algorithm issued by the National Standard Cryptography Bureau of China, and is designated by the Ministry of Industry and Information Technology to replace the RSA algorithm. Among them, the SM2 algorithm adopts the principle of elliptic curve, its key is relatively shorter, its security is relatively higher, and its performance is relatively higher. Among them, the SM2 algorithm includes: SM2 public key encryption algorithm, SM2 signature al...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 栾世鹏朱贤
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products