Safety communication secret key negotiation interaction scheme

A technology of key agreement and secure communication, which is applied in the field of information-based mobile office, which can solve the problems of SSL usage restrictions, being attacked, and the lack of safe storage of private keys in mobile terminals, so as to achieve the effect of ensuring security and authenticity

Active Publication Date: 2015-04-08
QINGDAO WEIZHIHUI INFORMATION
View PDF6 Cites 88 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, because SSL is based on Web browsers, it can support B / S applications very well, but the application support for C / S is not perfect. Because many enterprises have many C / S applications, the use of SSL has been greatly restricted. limit
In addition, the mobile terminal does not have the conditions to safely store the private key. If the digital certificate and key are leaked, there is a possibility of being attacked, tampered with and forged

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety communication secret key negotiation interaction scheme
  • Safety communication secret key negotiation interaction scheme
  • Safety communication secret key negotiation interaction scheme

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The present invention is described in further detail below in conjunction with accompanying drawing:

[0025] 1. According to figure 1 As described, the user and terminal registration process is as follows:

[0026] 1.1 The user first installs the application software on the smart mobile terminal. After the application software is started, it first checks whether there is a certificate of the network server. If there is no certificate, it will automatically download the certificate from the preset website. The user first registers, and when registering, enter: user name, login password, user mobile phone number, and then request a mobile phone verification code;

[0027] 1.2 After receiving the user's mobile phone verification code request, the server compares the user name and mobile phone number with the registered information according to the user name entered by the user. If the user name already exists, it means that the user has already registered. At this time, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for safety communication between an application on a mobile terminal and a network server. Shared secrets of a user and a server are overlapped and bound with an identification code of mobile intelligent terminal equipment and a mobile phone number of the user by utilizing a cryptology; then the obtained product is applied to an identity authentication system to implement authentication on a client side; a digital certificate and a digital signature mechanism are utilized to implement authentication on the server; a session key is established with a network server by utilizing a Differ-Hellman secret key negotiation protocol so as to carry out safety data communication. The method is characterized in that the shared secrets are overlapped and bound with identification code of the machine and the mobile phone number of the user and the shared secrets are updated regularly; even though information is stolen by an attacker, a system still cannot be influenced. The user not only needs to provide a login password, but also needs to use the system on designated equipment. The method can ensure that the user carries out safety communication with the server on internet by the mobile equipment.

Description

technical field [0001] The invention relates to the technical field of information-based mobile office, in particular to the technology of secure communication of mobile terminals. A method for secure communication between an application on a mobile terminal and a network server is provided. Background technique [0002] A smart mobile terminal is a multifunctional device that not only has a communication function, but also can conduct e-commerce, mobile office and other services after installing an application program. After the terminal is connected to a computer to form a network, it can complete information processing and interaction according to the received instructions. , to provide users with a convenient and efficient information interaction medium. As a kind of mobile device, intelligent mobile terminal equipment has the characteristics of "small and light" and "convenient communication". The interface is simple, and it interacts with other devices wirelessly. W...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/08
Inventor 张卫海赵军李传松孙文浩赵长江刘培顺戴洪尚任传祥
Owner QINGDAO WEIZHIHUI INFORMATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products