Dynamic signature method, client using the same and server

A client-side and server-side technology, applied in the field of identity authentication, can solve problems such as user account theft and authentication failures, and achieve the effect of increasing attack costs and improving security

Active Publication Date: 2017-01-11
ADVANCED NEW TECH CO LTD
View PDF4 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the existing technology uses a fixed algorithm for signature. If the signature key leaks, the attacker can forge the response message, resulting in the theft of the user account or authentication failure.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dynamic signature method, client using the same and server
  • Dynamic signature method, client using the same and server
  • Dynamic signature method, client using the same and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The technical solutions of the present application will be described in further detail below in conjunction with the accompanying drawings and embodiments, and the following embodiments do not limit the present application.

[0047] Generally speaking, in Internet-based applications, there is a client on the user side and a server on the service provider's side. Clients are generally applications installed on users' mobile terminals, computers or other smart devices, and some clients are directly webpages provided by service providers. User authentication is required for opening services between the client and the server, performing verification during business operations, and canceling services.

[0048] The dynamic signature method of this embodiment is as follows: figure 1 shown, including the following steps:

[0049]S1. The client sends an authentication request to the server.

[0050] S2. After receiving the authentication request, the server sends an authentic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a dynamic signature method, a client using the same and a server. The method comprises steps that: an authentication request is sent to the server through the client; after the server receives the authentication request, an authentication request response message carrying a challenging value is sent to the client; the client selects a signature algorithm according to the challenging value in the authentication request response message, signs the generated authentication response message by using the selected signature algorithm and sends the authentication response message to the server; and the server receives the authentication response message, selects the signature algorithm according to the challenging value, and verifies the signature of the response message. If the verification is passed, the authentication is passed, or else an error is reported. According to the invention, a random signature algorithm is adopted, and even if a user key is leaked, an attacker does not know the signature algorithm and fails to forge the response message, so safety is improved.

Description

technical field [0001] The application belongs to the technical field of identity authentication, and in particular relates to a dynamic signature method in the identity authentication process and a client and a server applying the method. Background technique [0002] Replay attack means that the attacker sends a data packet that the destination host has accepted to achieve the purpose of deceiving the system. It is mainly used in the identity authentication process and destroys the correctness of the authentication. Replay attack is one of the attack methods commonly used by hackers in the computer world. In order to resist replay attack, current identity authentication generally adopts a challenge-response method. [0003] The challenge response method is to send a request first when the user applies to log in to the system on the client side for identity authentication. After receiving the request, the system server sends a challenge value to the client. The client calcu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3247H04L63/08
Inventor 林钧燧
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products