Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network authentication method and system based on data link encryption transmission

An encrypted transmission and data link technology, applied in the information field, can solve the problems of being stolen, easily cracked and copied, and insecure in the storage and use of serial numbers or registration files. The effect of increasing the cost of cracking

Active Publication Date: 2014-10-29
RUN TECH CO LTD BEIJING
View PDF6 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] 1. The storage and use of the serial number or registration file itself is not safe, and the authentication information is stored on the same storage medium as the relevant software, which is easy to be stolen by hackers
Both the serial number and the registration file are local authentication methods, and are easy to be cracked and copied through data analysis methods such as memory images
[0008] 2. The algorithm of the software dog has been fixed after leaving the factory, and there are situations such as theft and loss. The encrypted data is easy to be intercepted locally, and the memory image is cracked, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network authentication method and system based on data link encryption transmission
  • Network authentication method and system based on data link encryption transmission
  • Network authentication method and system based on data link encryption transmission

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In order to make the above objects, features and advantages of the present invention more obvious and understandable, the present invention will be further described below through specific embodiments and accompanying drawings.

[0036] The network authentication scheme adopted by the present invention is composed of a device end (or called a device terminal, client) and a server (or called an authentication server). The communication link between the device side and the server side uses an asymmetric encryption algorithm for encrypted transmission, the device side uses public-key encrypted transmission, and the server side uses private-key encrypted transmission. The device side and the server side should have the files shown in Table 1 below:

[0037] Table 1. Device-side and server-side files

[0038] Device side

public-key, identification information, 100 sets of keys, 100 sets of random numbers

Service-Terminal

private-key, identification ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a network authentication method and system based on data link encryption transmission. The method is characterized in that the network link data are encrypted by the asymmetric algorithm and then transmitted, which avoids network monitoring and input; the network identity information is the specific device hardware and software information and has the uniqueness; a network key and the identity information are updated during starting the network authentication, in order to limit the ageing cycle of the network transmission key and the identity information; the symmetric encryption algorithm is carried out for random authentication, namely, real-time authentication, and thereby, the difficulty at breaking the data monitoring is raised, and transferring the device to other place to operate after the identity is authenticated successfully is effectively prevented. With the adoption of the method and system, the link can be effectively prevented from being monitored, and authentication files are prevented from releasing and spreading; once the authentication files are released and used and a legal user feeds back timely, a server can timely find out the device network information of a device end.

Description

technical field [0001] The invention belongs to the field of information technology, and in particular relates to a network authentication method and system based on data link encrypted transmission. Background technique [0002] With the development of computer software and hardware, in order to better protect the intellectual property rights of computer software and hardware products, manufacturers often use various encryption and authentication technologies to ensure that the products are used legally, avoid piracy and hotlinking, and effectively protect the legitimate rights of developers. rights and interests. The current popular software and hardware protection methods are as follows: [0003] Serial number protection: When the user wants to obtain the right to use a certain software, he needs to register relevant information with the relevant software company, and enter the corresponding information in the software according to a series of registration steps, such as...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/00
Inventor 杜志波
Owner RUN TECH CO LTD BEIJING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products