A bidirectional authentication method for a server and a terminal

A two-way authentication, server-side technology, applied in the direction of public keys for secure communication, user identity/authority verification, electrical components, etc., can solve problems such as low reliability

Inactive Publication Date: 2014-03-12
SHANGHAI LINGPAN INFORMATION TECH
View PDF5 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] S...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A bidirectional authentication method for a server and a terminal
  • A bidirectional authentication method for a server and a terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The encryption method of the present invention uses two kinds of symmetric and asymmetric, and ensures the safety of encryption and decryption in a combined manner.

[0025] Preconditions:

[0026] 1. Pre-store the terminal alias NAME and a pair of identical private keys in the server and the terminal

[0027] ID and a pair of public keys KEY (server side) and KEY’ (terminal side).

[0028] 2. Negotiate the algorithm for encryption and decryption in advance;

[0029] Two-way authentication process:

[0030] 1. When the terminal needs to connect to the server to obtain services, it first uses the public key KEY’ internally

[0031] Encrypt NAME, record the encrypted information as , and generate random number RAND;

[0032] 2. Send an authentication request containing NAME, , and RAND information in plain text

[0033] information;

[0034] 3. After the server receives the authentication request, it queries the NAME corresponding to the NAME through the NAME.

[0...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a bidirectional authentication method for a server and a terminal. Two pairs of secret keys which are preset in a server side and a terminal and a negotiated encryption-decryption algorithm are used, and accordingly a bidirectional authentication mode is realized via a fixed process. The two pairs of secret keys are one pair of public keys and one pair of private keys. The one pair of public keys and the one pair of private keys are used and respectively stored at the server and the terminal side, and encryption and decryption processing is carried out through the negotiated algorithm. The beneficial effects of the present invention are that: through the secret keys stored in advance and the negotiated encryption-decryption algorithm, identification of clients is carried out employing asymmetric encryption in order to find client information highly efficiently at the server side; bidirectional authentication is carried out through symmetrical encryption and decryption inside the server and terminal in order to realize network plaintext transmission of authentication information without causing secret key leakage problems and to achieve the effect that correct bidirectional authentication can not be carried out even if either one of the public keys or the private keys is broken through.

Description

technical field [0001] The invention relates to a digital publication issuing system, in particular to a method capable of carrying out two-way authentication on a server and a terminal. Background technique [0002] The authentication and identification of servers and terminals in digital publishing is the basis of digital copyright protection. The identification of end customers plays a vital role in digital copyright protection, and with the upgrading of technology, some plug-in systems can easily simulate servers to obtain customer information. Therefore, it is necessary for the server and the client to provide two-way authentication to provide system security. [0003] Encryption and decryption algorithm description, there are three general encryption and decryption algorithms: [0004] 1. Symmetric encryption (also called private key encryption) refers to an encryption algorithm that uses the same key for encryption and decryption. The advantage of the symmetric enc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32H04L9/30
Inventor 苗忠良王珊珊张莉
Owner SHANGHAI LINGPAN INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products