Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Bilateral authentication and data interaction security protection method based on CPK (Combined Public Key Cryptosystem)

A two-way authentication and security protection technology, applied in secure communication devices, digital transmission systems, user identity/authority verification, etc., can solve the problems of user data leakage, poor system security, and difficulty in deciphering, and achieve good security and Ease of use, flexible upgrade, simple and convenient deployment

Inactive Publication Date: 2015-09-09
成都腾甲数据服务有限公司
View PDF10 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The symmetric encryption algorithm uses the same key (symmetric key) to encrypt and decrypt data, and the encryption and decryption speed is fast. The main disadvantage is that due to the single key, the system security is poor when used for a long time, and it is not easy to use in an open network. Environment use
Asymmetric encryption algorithm (public key encryption) uses a pair of different keys (that is, an asymmetric key, including a public key, which can be made public; the other is a private key, which is kept secret by the user himself). It is very difficult to decipher, and the system security is very high, so it is especially suitable for use in an open network environment. Its main disadvantage is that the algorithm is complex, and the speed and efficiency of encrypting and decrypting data are relatively low
[0003] Many existing user servers use a single encryption method for data interaction, and only perform one-way authentication for users or user equipment
The existing one-way authentication method assumes that one of the authentication parties is credible, that is, the user server side is considered to be credible, and only verifies the identity of the user device and does not verify the identity of the server.
On today's Internet, viruses, phishing sites, Trojan horses, hackers, etc. seriously threaten the security of user data interaction, and leaks of user data often occur.
The security of the commonly used one-way security authentication and single encryption method is threatened, and the security of the system is poor.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Bilateral authentication and data interaction security protection method based on CPK (Combined Public Key Cryptosystem)

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the embodiments and accompanying drawings.

[0021] The present invention provides a two-way authentication between an Internet user server (S1) and a user device (D1) and a method for security protection of all data interaction, using the existing CPK identification authentication technology to realize the whole process of all data in a fully encrypted state Information exchange.

[0022] When the user needs to use the user server (S1), the user needs to register on S1, and submit the user identification and authentication user private information required by S1. User private information includes user identification, user login password, ID card number, telephone terminal number, email address and other private information for identifying and authenticating users, which will vary depending o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a bilateral authentication and data interaction security protection method based on a CPK (Combined Public Key Cryptosystem). The method is applied to bilateral authentication between a user server (S1) and user equipment (D1) and interaction protection of all data. The method comprises the following steps that: the S1 receives a user login request transmitted by the D1, generates a random number a, a CPK identification public-private key pair of the random number and identification private key signature information of the S1, encrypts the random number a, the CPK identification public-private key pair and the identification private key signature information, and downloads the encrypted random number a, CPK identification public-private key pair and identification private key signature information to the D1; the D1 verifies whether or not the signature information of the S1 is legal with an identification public key of the S1 to finish authentication of the S1; the S1 performs comparative verification with the hash value of the received user login password and a saved value to finish authentication of the D1; if bilateral authentication is passed, the S1 generates a random number b, encrypts the random number b, and transmits the encrypted random number b to the D1; otherwise the S1 returns bilateral authentication failure information; and after the success of bilateral authentication of a user, the random number b is taken as a session key for all data between the D1 and the S1 in order to perform bilateral all-homomorphism data interaction.

Description

technical field [0001] The invention relates to the field of Internet communication data interaction security protection, in particular to a CPK-based two-way authentication and data interaction security protection method. Background technique [0002] With the rapid development of the Internet, various Internet-based user services emerge in an endless stream. The Internet has penetrated into all aspects of users' lives. Users often use various services closely related to life, work and entertainment through the Internet. How to make all data interactions of Internet users more credible and secure is particularly important. Data encryption is the only effective method to ensure the safe transmission of data. According to the key type, it can be divided into two categories: symmetric encryption algorithm and asymmetric encryption algorithm. The symmetric encryption algorithm uses the same key (symmetric key) to encrypt and decrypt data, and the encryption and decryption spe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/0435H04L9/3247
Inventor 陈谦孟俊邱银娟
Owner 成都腾甲数据服务有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products