Bidirectional authentication method between authentication terminal and host and device

A two-way authentication and host technology, applied in the field of authentication, can solve problems such as the complexity of the authentication process, the impact of the authentication process, and the impact on the authentication results, and achieve the effect of simple authentication process and guaranteed security and privacy

Inactive Publication Date: 2014-04-02
LEADER TECH BEIJING DIGITAL TECH
View PDF1 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when the authentication terminal is lost, if the person who picks up the authentication terminal cracks the authentication terminal, the interests of the original authentication terminal holder will be threatened.
[0005] In order to solve the above problems, some two-way authentication methods have appeared. However, the existing two-way authentic

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Bidirectional authentication method between authentication terminal and host and device
  • Bidirectional authentication method between authentication terminal and host and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The present invention provides a two-way authentication method between an authentication terminal and a host, comprising the following steps:

[0045] S10. The host verifies the identity of the authentication terminal by identifying the key information in the authentication terminal;

[0046] S20. The authentication terminal verifies the identity of the host by identifying part or all of the hardware identifiers in the host.

[0047] Such as figure 1 Shown, concrete steps of the present invention are as follows:

[0048] S100. Establish a connection between the authentication terminal and the host. Wherein, the authentication terminal may be connected to the host computer through a network connection or through a data interface.

[0049] S200. The host reads the key information stored in the authentication terminal. Wherein, since the encryption process of the key information is completely carried out on the hardware chip of the authentication terminal, the security...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a bidirectional authentication method between an authentication terminal and a host, which comprises the steps that the host verifies the identity of the authentication terminal by identifying secret key information in the authentication terminal, and the authentication terminal verifies the identity of the host by identifying partial hardware identification or all the hardware identification in the host. A device for implementing the method comprises the host and the authentication terminal, the host is internally provided with a reading module for reading the secret key information of the authentication terminal, a host database for storing secret key information, and a judging module for comparing the secret key information with the secret key information stored in the database, and the authentication terminal comprises a reading module for reading hardware identification of the host, an authentication terminal database for storing hardware identification in the host and secret key information, and a judging module for comparing the read hardware identification with the hardware identification stored in the authentication terminal database. The bidirectional authentication process can become simpler and more convenient without applying plenty of encryption algorithms and logical algorithms.

Description

[0001] technical field [0002] The invention relates to an authentication method, in particular to a two-way authentication method, especially a two-way authentication method and device between an authentication terminal and a host. [0003] Background technique [0004] At present, generally, an external encryption device is used as the key for starting the software. The host with the software installed only needs to verify the identity of the authentication terminal to determine that the user authority is legal, and then the software can be started or subsequent operations can be performed. In the case of one-way authentication, if the software is installed on other hosts and has an authentication terminal at the same time, the software can run on other hosts. However, when the authentication terminal is lost, if the person who picks up the authentication terminal cracks the authentication terminal, the interests of the original authentication terminal holder will be th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32
Inventor 姚为万宏宇
Owner LEADER TECH BEIJING DIGITAL TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products