Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

User registration and user identification method and user registration and user identification system

A user and user name technology, applied in the field of network security, can solve the problems of increasing the service cost of manufacturers and increasing the consumption of server resources, and achieve the effect of ensuring reliability and low cost

Active Publication Date: 2014-12-17
SICHUAN CHANGHONG ELECTRIC CO LTD
View PDF7 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 3) It increases the loss of server resources, requires more hardware servers, and increases the service cost of the manufacturer
[0006] In other words, if a server originally uses the HTTP protocol for multiple client connections, the number of supported client connections can reach 3000, while using the HTTPS protocol for multiple client connections, the number of supported client connections can only reach More than 600

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User registration and user identification method and user registration and user identification system
  • User registration and user identification method and user registration and user identification system

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0057] Such as figure 1 , a user registration method, the client and the server both contain the same symmetric encryption and decryption algorithm, and both parties follow the http communication protocol, including:

[0058] Step 1: the client uses the symmetric encryption and decryption algorithm to encrypt the username and password;

[0059] Step 2: The client transmits the encrypted user name and password to the server according to the http protocol;

[0060] Step 3: The server uses the symmetric encryption and decryption algorithm to decrypt the received user name and password; check whether the user name already exists in the database of the server, if not, the server uses an asymmetric encryption algorithm to generate a password for the user. A key pair of public key / private key, and the server uses the symmetric encryption and decryption algorithm to encrypt the returned registration success information and the public key, and at the same time, the server writes the u...

no. 2 example

[0068] Such as figure 2 After the registration is completed, the user logs in to the server through the user name and login password. The specific process is as follows: First, both the client and the server contain the same symmetric encryption and decryption algorithm, including:

[0069] Step 1: The client uses the symmetric encryption and decryption algorithm to encrypt the user name and login password;

[0070] Step 2: The client transmits the encrypted user name and login password to the server according to the http protocol;

[0071] Step 3: The server uses the symmetric encryption and decryption algorithm to decrypt the received username and login password; then compare the decrypted login password with the login password corresponding to the username in the database of the server, if they are the same, the server Generate a random key and use the symmetric encryption and decryption algorithm to encrypt the login success information and the random key; if they are di...

no. 3 example

[0077] In this embodiment, steps 1 and 3 are improved on the basis of the second embodiment.

[0078] Step 1 further includes: the client first encrypts the login password with the public key obtained during registration, and then uses the symmetric encryption and decryption algorithm to encrypt the login password encrypted by the user name and the public key;

[0079] Correspondingly, step 3 further includes: using the symmetric encryption and decryption algorithm to decrypt the received information to obtain the ciphertext of the user name and login password; and then decrypting the ciphertext using the private key corresponding to the user name in the database , to obtain the user’s login password, compare the decrypted login password with the login password stored corresponding to the user name in the server’s database, if they are the same, it means that the user’s login is successful, the server generates a random key and uses the The symmetric encryption and decryption ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a user registration and user identification method and a user registration and user identification system and aims to provide a HTTP (hyper text transfer protocol)-based encrypted client register and user identification method. The method is technically characterized by including: step 1, a client encrypts a user name and a password according to symmetric encryption and decryption algorithms; step 2, the client transmits the encrypted user name and password to a server according to the HTTP; step 3, the server decrypts the received user name and password according to the symmetric encryption and decryption algorithms; searching a database to determine whether the user name already exists or not; if not, the server encrypts a register success message and a public key of an asymmetric cryptography according to the symmetric encryption and decryption algorithms and writes the user name and the password into the database; if yes, the server encrypts a to-be-returned register failure message according to the symmetric encryption and decryption algorithms; step 4, the server transmits the encrypted message acquired at the step 3 to the client according to the HTTP.

Description

technical field [0001] The invention relates to network security technology, in particular to a client registration and user identification method based on encryption technology. Background technique [0002] When a common cloud computing platform identifies a user, it usually uses the HTTPS protocol, which ensures that the information transmission between the terminal and the server is encrypted and secure. However, this technology is not so suitable for terminal equipment such as smart TVs and smart air conditioners. Because for the APP field of home appliances, the HTTPS protocol has many shortcomings. There are: [0003] 1) The HTTPS protocol needs to apply for a certificate from a CA, and the certificates are charged, which increases the cost of the terminal. [0004] 2) HTTPS is a secure SSL encrypted transmission protocol. Compared with the HTTP protocol, it consumes much more network bandwidth resources. [0005] 3) It increases the loss of server resources, requ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/32
Inventor 李强李晓东刘东
Owner SICHUAN CHANGHONG ELECTRIC CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products