User terminal, authentication server, middle server, system and transmission method

A technology of authentication server and intermediate server, applied in the field of key transmission, can solve problems such as security reduction, and achieve the effect of improving security

Active Publication Date: 2016-05-04
LENOVO (BEIJING) CO LTD
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in the above-mentioned key transfer method, there is a risk that the user's public key will be maliciously used by a counterfeit user, thereby reducing security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User terminal, authentication server, middle server, system and transmission method
  • User terminal, authentication server, middle server, system and transmission method
  • User terminal, authentication server, middle server, system and transmission method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] Embodiments of the present invention will be described below with reference to the drawings. The following description with reference to the accompanying drawings is provided to assist understanding of example embodiments of the invention as defined by the claims and their equivalents. It includes various specific details to aid in understanding but they are to be regarded as exemplary only. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the invention. Also, detailed descriptions of functions and constructions well-known in the art will be omitted to make the description clearer and more concise.

[0020] refer to figure 1 A system according to an embodiment of the present invention will be described. The system of the embodiment of the present invention includes a user terminal 1 , an intermediate server 2 and an authe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a user terminal, an authentication server, a middle server, a system and a transmission method for a key for further improving the security for user authentication. The transmission method comprises the following steps of generating a second key pair corresponding to a first application by the middle server; sending a first key in the second key pair to the user terminal and sending a second key in the second key pair to the authentication server; generating a first key pair associated with user information by the user terminal; utilizing the first key in the second key pair corresponding to the first application to encrypt a second key in the first key pair to obtain first encryption information, and sending the first encryption information to the authentication server; and receiving the first encryption information from the user terminal in the authentication server, and utilizing the second key in the second key pair corresponding to the first application to decrypt the first encryption information to obtain the second key in the first key pair associated with the user information.

Description

technical field [0001] The present invention relates to a user terminal, an authentication server, an intermediate server, a system including the user terminal, the authentication server, and the intermediate server, and a key transmission method applied to the user terminal, the authentication server, the intermediate server, and the system. Background technique [0002] After the user public key and the user private key are generated in the user terminal, the user public key is sent to the authentication server. When performing user authentication, the user terminal uses the user private key to sign the authentication request and sends it to the authentication server, and the authentication server uses the corresponding user private key to verify the signature, thereby realizing user authentication. [0003] However, in the above-mentioned key transfer method, there is a risk that the user's public key will be maliciously used by a counterfeit user, thereby reducing securi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0478H04L63/08
Inventor 李俊崔忠勇
Owner LENOVO (BEIJING) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products