Method and device for security authentication

A security authentication and password authentication technology, applied in the field of network security, can solve the problems of lack of practicability, increasing the use cost of the authentication system, and wasting the resources of the authentication system.

Active Publication Date: 2019-02-05
CHINA MOBILE COMM LTD RES INST +1
View PDF11 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] However, in this way, the already deployed password authentication system needs to be completely replaced and modified, whic...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for security authentication
  • Method and device for security authentication
  • Method and device for security authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0086] The technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present application. Obviously, the described embodiments are only some of the embodiments of the present application, not all of them. Based on the embodiments of the present application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present application.

[0087] In order to ensure the correctness of the identities of both parties in the communication, avoid network attacks such as message leakage and malicious information tampering during the communication process, improve the reliability of network authentication, and ensure the communication security of users, in the embodiment of this application, a security authentication is designed. The method is to carry out security authentication throug...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiments of the invention disclose a method and device for security authentication. The method comprises the following steps: performing password authentication with a server based on a transmittedpassword authentication message to obtain a password authentication result; sending an authentication request message to the server when determining that the password authentication result characterizes password authentication success; and performing security authentication by the way of digitally signing all interaction messages through the server, and performing digital signature verification through the client, or by way of performing public key encryption by the client on the local random numbers and all the interaction messages, and verifying the random numbers returned by the server. Thus, the identity correctness of both communication parties is ensured by the way of combining the password authentication with digital signature, or combining the password authentication with public key encryption, thereby avoiding network attacks such as message leakage and malicious information tampering during the communication, improving the reliability of network authentication, and guaranteeing the user's communication security.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to a security authentication method and device. Background technique [0002] With the development of Internet technology, network attacks are becoming more and more serious. When users use the Internet for communication and transactions, there are problems such as information leakage and malicious tampering of transaction information. The user's network security is greatly threatened, which brings great inconvenience to the user. [0003] In the prior art, communication security is usually guaranteed through security authentication. Among them, security authentication mainly adopts the following two methods: [0004] The first method is: the client and the server use the shared password as a security authentication credential, so as to perform security authentication through the shared password. [0005] Specifically, when the client receives the response mess...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/32H04L29/06
CPCH04L9/0866H04L9/3247H04L63/083H04L63/0869H04L9/0825H04L9/3226H04L63/0823H04L9/0643H04L9/30
Inventor 刘福文左敏
Owner CHINA MOBILE COMM LTD RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products