Two-way authentication method and system

A two-way authentication and authenticated technology, applied in the field of communication, can solve problems such as hidden safety hazards and imperfect authentication methods, and achieve the effect of improving security

Active Publication Date: 2018-08-03
北京赛博兴安科技有限公司
View PDF5 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This has brought many security risks, such as authentication equipment being maliciously modified to use
[0004] Therefore, the authentication method in the prior art is not perfect, and there are still security problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-way authentication method and system
  • Two-way authentication method and system
  • Two-way authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] Preferred embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings, wherein the accompanying drawings constitute a part of the application and together with the embodiments of the present invention are used to explain the principle of the present invention and are not intended to limit the scope of the present invention.

[0062] figure 1 A schematic diagram of a two-way authentication method provided by an embodiment of this application, such as figure 1 shown, including the following steps:

[0063] Step S11, the authenticating device generates a first digital signature; sends the first digital signature and the temporary public key of the authenticating device to the authenticated device, and is verified by the authenticated device;

[0064] Step S12, receiving the second digital signature and the temporary public key of the certified device generated after the certified device passes the verification of th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a two-way authentication method and system. The method comprises the following steps: forming, by an authentication device, a first digital signature of the key attribute information of an authenticated device; transmitting the first digital signature and a temporary public key of the authentication device to the authenticated device to be verified by the authenticated device; after the authenticated device verifies the received first digital signature, sending, by authenticated device, a second digital signature of the key attribute information of the authentication device and the temporary public key of the authenticated device to the authentication device to be verified by the authentication device; receiving and verifying, by the authentication device, the second digital signature; and sending, by the authenticated device, authentication success information, and performing encrypted data transmission by using the temporary public keys of the two parties. The authentication device and the authenticated device correctly the key attribute information of the opposite party and perform signature verification so as to achieve two-way authentication. The encrypted transmission of data interaction is realized, and the security of identity verification is further improved.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a two-way authentication method and system. Background technique [0002] With the advancement of technology, more and more occasions and units such as office environment, personnel scheduling, and information sharing have entered the automation system management mode. Following this, the need for verification of the identity and legitimacy of personnel and equipment entering the system also arises from time to time. [0003] The authentication method adopted by the identity authentication devices existing in the market is one-way authentication, that is, it is only necessary to verify the legitimacy of the authenticated device, without verifying the legitimacy of the authentication device, such as a cryptographic key. When the user needs identity verification to enter the system, he only needs to insert the password key, and the user's identity verification process is co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/08
CPCH04L9/083H04L9/3226H04L9/3247H04L63/083H04L63/0869
Inventor 郑重
Owner 北京赛博兴安科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products