Unlock instant, AI-driven research and patent intelligence for your innovation.

A white-box password two-way identity authentication method, terminal, server and system

A technology of two-way identity authentication and white-box password, applied in the field of white-box password two-way identity authentication method, terminal, server and system, it can solve the problems of fragility and cannot be used safely, and achieve the effect of improving security and guaranteeing security.

Active Publication Date: 2020-01-07
BEIJING BANGCLE TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Identity authentication based on symmetric cryptographic system cannot be used safely, and it is even extremely fragile. The key becomes a single point of failure for any protection system that uses cryptographic technology.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A white-box password two-way identity authentication method, terminal, server and system
  • A white-box password two-way identity authentication method, terminal, server and system
  • A white-box password two-way identity authentication method, terminal, server and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] The application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain related inventions, rather than to limit the invention. It should also be noted that, for ease of description, only parts related to the invention are shown in the drawings.

[0052] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present application will be described in detail below with reference to the accompanying drawings and embodiments.

[0053] figure 1 It is a flow chart of a two-way identity authentication method applicable to a terminal provided by an embodiment of the present invention.

[0054] Such as figure 1 As shown, in this embodiment, a two-way identity authentication method provided by the present invention includes:...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a white-box cryptography bidirectional identity authentication method, a terminal, a server side and a system. The method comprises the steps of: according to a first white-box key and a first white-box library, encrypting a first identification code by a symmetric white-box cryptography algorithm to obtain a first ciphertext; encrypting the first ciphertext and a random number by a second cryptography algorithm to obtain a second ciphertext; partitioning the second ciphertext into first and second portions, and sending the first identification code, the first ciphertext and the first portion to the server side for carrying out verification; receiving a returned fourth portion and carrying out comparison verification with the second portion, obtaining a third verification result and sending the third verification result to the server end for judging an identity authentication result; receiving a second verification result, and if both the second verification result and the third verification result are successful in verification, judging that identity authentication is passed, wherein the first and second white-box keys and the first and second white-box libraries are generated according to the symmetric white-box cryptography algorithm. The white-box cryptography bidirectional identity authentication method, the terminal, the server side and the system which are provided by the invention ensures safety of the identity authentication process in a white-box attack environment.

Description

technical field [0001] The application relates to the technical field of security encryption, in particular to a white-box cipher two-way identity authentication method, a terminal, a server and a system. Background technique [0002] The traditional network identity authentication method based on the symmetric cryptography system is to use computer, password and network technology to set up a pair of identical symmetric cipher algorithms at both ends of the client and the network server, and use the encryption algorithm of the client to authenticate a group of The finite-length plaintext is encrypted to generate a ciphertext, and the ciphertext is used as an authentication code, which is sent to the server via the network together with the user number, time stamp and random code for authentication. [0003] In the white-box attack environment, in the current attack methods, it is easy to obtain passwords through disassembly of binary files, static analysis, and control of t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/08H04L9/06
CPCH04L9/0656H04L9/0861H04L9/3273H04L63/0869
Inventor 阚志刚彭建芬卢佐华陈彪
Owner BEIJING BANGCLE TECH CO LTD