Time type plug-in authentication method and system

An authentication method and technology of an authentication system, applied in the field of time-based plug-in authentication, can solve problems such as no digital signature, plug-in information replay attack, plug-in information copy, etc., to prevent replay attacks, ensure that it is not used by copying, The effect of increasing safety

Inactive Publication Date: 2017-03-29
SHANGHAI PEOPLENET SECURITY TECH
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, digital signatures are often used to identify identities, but the storage and invalidation of private keys make this method flawed. Once the private key expire

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Time type plug-in authentication method and system
  • Time type plug-in authentication method and system
  • Time type plug-in authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0032] In order to more clearly describe the embodiments of the present invention or the technical solutions in the prior art, the specific embodiments of the present invention will be described below with reference to the accompanying drawings. Obviously, the accompanying drawings in the following description are only some embodiments of the present invention. For those of ordinary skill in the art, other drawings can also be obtained from these drawings without creative efforts, and obtain other implementations.

[0033] In order to keep the drawings concise, the drawings only schematically show the parts related to the present invention, and they do not represent its actual structure as a product. In addition, in order to make the drawings concise and easy to understand, in some drawings, only one of the components having the same structure or function is schematically shown, or only one of them is marked. As used herein, "one" not only means "only one", but also "more tha...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a time type plug-in authentication method and system. The method comprises the following steps: step S100, a client initiates request information of applying for a plug-in to a server; step S200, the server releases applied plug-in information to the client according to device identification information of the client; step S300, the client applies to the server for time information authentication in the received plug-in information; and after the authentication success of the server, step S400 is executed; and step S400, the client updates the time information in the plug-in information to the current time when the plug-in information is authenticated. The purpose is to solve the problem that the plug-in information is subjected to tampering and replay attacks by authenticating the time in the plug-in information, and the security of the system is effectively improved.

Description

technical field [0001] The invention relates to the field of secure communication, in particular to a method and system for time-based plug-in authentication. Background technique [0002] The rapid development of the Internet has brought about a series of Internet security problems. Hackers intercept the data packets sent by users and continuously send a valid data to the server fraudulently. Therefore, the server needs to determine which request is real and valid. [0003] At present, digital signatures are widely used to identify identities, but the storage and invalidation of private keys make this method flawed. Once the private key expires, all digital signatures related to it will no longer be "non-repudiable". Then it is easy for the plug-in information to be copied, and the plug-in information replay attack. [0004] Therefore, aiming at the defects of the above technical problems, the present invention provides related technical solutions for solving the problems....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/06
CPCH04L9/3297H04L63/108
Inventor 谈剑锋李光岩姜立稳胡剑波谢勇钱金金
Owner SHANGHAI PEOPLENET SECURITY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products