Unlock instant, AI-driven research and patent intelligence for your innovation.

SSL-based authentication method and electronic devices

A technology of an electronic device and an authentication method, applied in the field of image processing, can solve the problems of inconvenient portability of a key storage USBKEY and the like

Active Publication Date: 2015-03-25
LENOVO (BEIJING) LTD
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, the embodiment of the present application provides an SSL-based authentication method and electronic equipment to solve the problem of inconvenient portability of the traditional key memory USB KEY that stores the client's authentication information, and at the same time effectively prevent loss and improve the security of the client's authentication information sex

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SSL-based authentication method and electronic devices
  • SSL-based authentication method and electronic devices
  • SSL-based authentication method and electronic devices

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0061] figure 1 It is a schematic flowchart of the SSL-based authentication method provided in Embodiment 1 of the present application.

[0062] refer to figure 1 As shown, the SSL-based authentication method provided by the embodiment of the present application is applied to the second electronic device, and the authentication card is pre-stored in the second electronic device, and the client certificate is stored in the authentication card. The method includes:

[0063] Step S11: receiving the second request information sent by the first electronic device according to the user's first request information;

[0064] In this embodiment of the present application, the first electronic device may be a computer or a server, and the second electronic device may be a user's portable mobile terminal, such as a mobile phone.

[0065] When the user sends the first request information through the first electronic device, the first electronic device will convert the first request infor...

Embodiment 2

[0071] figure 2 It is a schematic flowchart of the SSL-based authentication method provided in Embodiment 2 of the present application.

[0072] refer to figure 2 As shown, the SSL-based authentication method provided by the embodiment of the present application is applied to the second electronic device, and the authentication card is pre-stored in the second electronic device, and the client certificate and the client key are stored in the authentication card. The method then includes:

[0073] Step S21: receiving the second request information sent by the first electronic device according to the user's first request information;

[0074] In this embodiment of the present application, the first electronic device may be a computer or a server, and the second electronic device may be a user's portable mobile terminal, such as a mobile phone.

[0075] When the user sends the first request information through the first electronic device, the first electronic device will con...

Embodiment 3

[0093] Figure 4 It is a schematic flowchart of the SSL-based authentication method provided in Embodiment 3 of the present application.

[0094] refer to Figure 4 As shown, the SSL-based authentication method provided in the embodiment of the present application is applied to the first electronic device, and the method includes:

[0095] Step S31: receiving the first request information from the user, and judging whether the first request information is login request information;

[0096] Step S32: If the first request information is login request information, convert the first request information into second request information according to a predetermined communication protocol with the second electronic device, and send the second request information to the second electronic device. second request information, so that the second electronic device extracts the client certificate from the pre-stored authentication card;

[0097] Step S33: Receive the client certificate s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an SSL-based authentication method and electronic devices. An authentication card is pre-arranged in a second electronic device, and a client side certificate is stored in the authentication card. The method comprises the steps of receiving a second request message sent by a first electronic device according to a first request message of a user; analyzing the second request message according to a communication protocol pre-established with the first electronic device, judging whether the second request message is a login request message, and extracting the client side certificate from the authentication card of the second electronic device if the second request message is the login request message; sending the client side certificate extracted from the authentication card of the second electronic device to the first electronic device so that login authentication of the client side can be achieved through the first electronic device according to the client side certificate. In this way, the authentication card is integrated into the second electronic device as the carrier of the client side certificate, so that a secret key memory does not need to be carried, losing can be effectively prevented, and the safety of client side authentication information is improved.

Description

technical field [0001] The application relates to the field of image processing, in particular to an SSL-based authentication method and electronic equipment. Background technique [0002] With the development of e-commerce and the increasing popularity of smart handheld devices, the security of electronic transactions has become the focus of attention of users. The Secure Socket Layer SSL (Secure Socket Layer) protocol provides a safe and reliable network environment for online transactions, making it widely used. The SSL protocol is one of the most commonly used security protocols on the Internet. It is located between the TCP / IP protocol and various application layer protocols to provide security support for data communication. The SSL protocol can be divided into two layers: SSL Record Protocol (SSL Record Protocol): It is built on a reliable transmission protocol (such as TCP) and provides support for basic functions such as data encapsulation, compression, and encrypt...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 乔艳飞
Owner LENOVO (BEIJING) LTD