Unlock instant, AI-driven research and patent intelligence for your innovation.

Bidirectional authentication method and communication system

A two-way authentication and communication system technology, applied in the field of two-way authentication methods and communication systems, can solve problems such as counterfeit terminals, and achieve the effects of reducing risks, preventing tampering, and strengthening verification

Inactive Publication Date: 2017-05-31
CHINA INFORMATION TECH SECURITY EVALUATION CENT
View PDF5 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, since the verification information sent by the terminal to the processing center in the prior art is dispersed into relatively independent modules, there is a risk that a third party may change the content of a certain module in the verification information sent by the terminal to the processing center, thus achieving the risk of counterfeiting the terminal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Bidirectional authentication method and communication system
  • Bidirectional authentication method and communication system
  • Bidirectional authentication method and communication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0035] The embodiment of this application provides a two-way authentication method, such as figure 1 As shown, it is applied to a communication system composed of a terminal and a processing center, and the two-way authentication method includes:

[0036] The terminal sets the first algorithm identification A1 and generates a first random number r1, and sends the first algorithm identification A1 and the first random number r1 to the processing center;

[003...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a bidirectional authentication method and a communication system. In the bidirectional authentication method, a terminal utilizes a terminal private key to process a first random number, a second random number and a shared main secret key to acquire a signature value so as to realize signing of whole verification information sent to a processing center by the terminal, and the signature value does not only contain information of the first random number and the second random number, so that probability of fabricating the terminal by replacement of certain information in the signature value is avoided, the verification information is prevented from being tampered, verification of the terminal by the processing center is enhanced, and risk of fabricating the terminal by a third party is lowered.

Description

technical field [0001] The present application relates to the technical field of communication, and more specifically, relates to a two-way authentication method and a communication system. Background technique [0002] With the continuous development of communication technology, the communication security between the terminal and the processing center has attracted more and more attention. How to establish a secure communication channel between the terminal and the processing center to prevent data theft and interception during data transmission and tampering. Therefore, before the communication between the terminal and the processing center, the legality verification of the terminal to the processing center or the processing center to the terminal is an important means to ensure the security of the communication link. [0003] In the prior art, there is a specification for realizing the two-way authentication process between the terminal and the processing center, refer t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32H04L9/08
CPCH04L63/0869H04L9/085H04L9/0869H04L9/3247H04L63/0823
Inventor 朱克雷张普含王嘉捷谢丰邸丽清王婷高洋
Owner CHINA INFORMATION TECH SECURITY EVALUATION CENT