Virtual key mutual authentication system and method

A two-way authentication and virtual key technology, applied in the transmission system, digital transmission system, user identity/authority verification, etc., can solve the problem of low security, to ensure security, reduce interaction steps, improve security and reliability Effect

Active Publication Date: 2018-12-21
北京信长城科技发展有限公司
View PDF5 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The present invention provides a virtual key two-way authentication system and method to solve the problems in the prior art that virtual keys must be used online and have low security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Virtual key mutual authentication system and method
  • Virtual key mutual authentication system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0054] Those skilled in the art can understand that, unless otherwise defined, all terms (including technical terms and scientific terms) used herein have the same meaning as commonly understood by those of ordinary skill in the art to which this invention belongs. It should also be understood that terms, such as those defined in commonly used dictionaries, should be understood to have meanings consistent with the meanings in the co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of communication, in particular to a virtual key two-way authentication system and method. The system comprises a terminal, which is used for generating terminal authentication request information and sending it to the locked end for authentication. If the authentication passes, the generated terminal session key is sent to the locked end for authentication. If the authentication passes, the session key editing and unlocking instruction is sent to the locked end. The locked end is used for generating the authentication request information of the locked end and sending it to the terminal for authentication. If the authentication passes, the locked end session key is generated and sent to the terminal for authentication. If the authentication passes, the locked end session key is unlocked according to the unlocking instruction sent by the terminal. An offline communication module is used for transmitting information between the terminal and the locked end. The invention does not require on-line authentication of a third party when unlocking, but directly carries out information interaction between the terminal and the locked end, reduces the sensitivity of the whole system and the method to the network, and improves the safety and reliability in the use process.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a virtual key two-way authentication system and method. Background technique [0002] The Internet of Things is regarded as the third revolution in the development of the information technology industry after computers and the Internet. Its ubiquitous network characteristics make the Internet of Everything possible. Behind all these smart homes, Internet of Vehicles, and artificial intelligence is the accelerated landing and rapid maturity of the Internet of Things. The arrival of the Internet of Things era is beyond doubt. The foundation and core of the Internet of Things is still the Internet, which is an extension and expansion based on the Internet, while cloud computing, mobile Internet, and smart terminals are helping the system architecture of the Internet of Things to become more and more full. The Internet of Things has become one of the strategic commanding heig...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04W4/80G07C9/00
CPCG07C9/00309G07C9/00571G07C2009/00412H04L9/3247H04L9/3273H04L2209/84H04W4/80
Inventor 罗燕京
Owner 北京信长城科技发展有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products