Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A network authentication method and system based on data link encrypted transmission

An encrypted transmission and data link technology, which is applied in the information field, can solve the problems of being stolen, easily cracked and copied, and the storage and use of serial numbers or registration files are not safe, so as to prevent equipment transfer and theft, increase the difficulty of cracking, Increase the effect of cracking cost

Active Publication Date: 2017-08-25
RUN TECH CO LTD BEIJING
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] 1. The storage and use of the serial number or registration file itself is not safe, and the authentication information is stored on the same storage medium as the relevant software, which is easy to be stolen by hackers
Both the serial number and the registration file are local authentication methods, and are easy to be cracked and copied through data analysis methods such as memory images
[0008] 2. The algorithm of the software dog has been fixed after leaving the factory, and there are situations such as theft and loss. The encrypted data is easy to be intercepted locally, and the memory image is cracked, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A network authentication method and system based on data link encrypted transmission
  • A network authentication method and system based on data link encrypted transmission
  • A network authentication method and system based on data link encrypted transmission

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In order to make the above objects, features and advantages of the present invention more obvious and understandable, the present invention will be further described below through specific embodiments and accompanying drawings.

[0036] The network authentication scheme adopted by the present invention is composed of a device end (or called a device terminal, client) and a server (or called an authentication server). The communication link between the device side and the server side uses an asymmetric encryption algorithm for encrypted transmission, the device side uses public-key encrypted transmission, and the server side uses private-key encrypted transmission. The device side and the server side should have the files shown in Table 1 below:

[0037] Table 1. Device-side and server-side files

[0038] Device side public-key, identification information, 100 sets of keys, 100 sets of random numbers Service-Terminal private-key, identification inform...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a network authentication method and system based on data link encrypted transmission. The network link data is encrypted and transmitted using an asymmetric algorithm to prevent network monitoring and injection. The network identity information is specific device hardware and software information, which is unique. During the start-up process of network authentication, the network key and identity information will be updated to limit the time limit for network transmission key and identity information. In addition, random authentication through symmetric encryption algorithm, that is, network real-time authentication, increases the difficulty of data being monitored and cracked, and effectively prevents the device from being transferred to other places for operation after successful identity authentication. The present invention can effectively prevent the link from being monitored, and prevent authentication files from being leaked and used; if the authentication file is leaked and used, the server can timely discover the device network information of the device terminal through timely feedback from legal users.

Description

technical field [0001] The invention belongs to the field of information technology, and in particular relates to a network authentication method and system based on data link encrypted transmission. Background technique [0002] With the development of computer software and hardware, in order to better protect the intellectual property rights of computer software and hardware products, manufacturers often use various encryption and authentication technologies to ensure that the products are used legally, avoid piracy and hotlinking, and effectively protect the legitimate rights of developers. rights and interests. The current popular software and hardware protection methods are as follows: [0003] Serial number protection: When the user wants to obtain the right to use a certain software, he needs to register relevant information with the relevant software company, and enter the corresponding information in the software according to a series of registration steps, such as...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/00
Inventor 杜志波
Owner RUN TECH CO LTD BEIJING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products