Unlock instant, AI-driven research and patent intelligence for your innovation.

A server verification method, system, user terminal and readable storage medium

A verification method and user terminal technology, applied in transmission systems, digital transmission systems, user identity/authority verification, etc., can solve problems such as insecure HTTPS data transmission, achieve security guarantees, and improve security effects

Active Publication Date: 2022-04-01
SHENZHEN ONETHING TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The main purpose of this application is to provide a server verification method, system, user terminal and computer-readable storage medium, aiming to solve the problem of insecure HTTPS data transmission caused by malicious tampering of the root certificate in the prior art, and to improve data based on HTTPS Security during protocol transmission

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A server verification method, system, user terminal and readable storage medium
  • A server verification method, system, user terminal and readable storage medium
  • A server verification method, system, user terminal and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0084] See figure 1 , figure 1 It is a flow chart of a server verification method provided in the embodiment of this application. It should be noted that the execution subject of each step in this embodiment is the client, that is, before the client establishes an HTTPS connection with a server to transmit encrypted data, It is necessary to verify the legitimacy of its identity. This embodiment aims to explain the invention point of this application and the various operations performed to achieve the purpose from the perspective of the client. It includes the following steps:

[0085] S101: Initiate an access request to the target server;

[0086] First, an access request is initiated to the target server, and this step exists as the first step of establishing an HTTPS connection with the target server. Among them, the access request usually includes some client parameters, such as client type, version, supported encryption algorithm candidate list, supported compression alg...

Embodiment 2

[0102] See figure 2 , figure 2 It is a flow chart of another server verification method provided by the embodiment of this application. This embodiment provides a method that can further verify whether the server public key is a real server public key on the basis of the first embodiment, so that the server The consideration of legality verification is more thoughtful to prevent various unexpected tampering situations in complex situations, including the following steps:

[0103] S201: Initiate an access request to the target server;

[0104] S202: Receive the fake server certificate generated by the target server after encrypting the server public key with the preset root private key;

[0105] S203: Receive the server signature generated after the target server signs the authentication string with the server private key;

[0106] In addition to step S202, this embodiment will also receive the server signature generated by the target server after signing the authenticatio...

Embodiment 3

[0120] See image 3 , image 3 The flowchart of another server verification method provided by the embodiment of this application. On the basis of the above-mentioned embodiments, this embodiment also provides a legality verification method based on the traditional root certificate and based on the preset root certificate at the same time. The preferred legality verification method of the public key legality verification method. It should be noted that since the traditional root certificate-based legality verification method has been proven to be unreliable, the verification result will only be used as another method to start this application. The prerequisite for the verification method, that is, the final result of the legality verification method based on the preset root public key provided by this application shall prevail, including the following steps:

[0121] S301: Initiate an access request to the target server;

[0122] S302: Receive the real server certificate iss...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This application discloses a server verification method. This method no longer uses the verification result of the root certificate as the basis for judging whether the server is legal. The root public key generated by the server. When responding to the access request sent by the client, the server will use the root private key corresponding to the root public key to encrypt the server public key to obtain a fake server certificate. Whether the client can pass the built-in The root public key decrypts the fake server certificate to verify whether the server that sent the server certificate is the real target server. Since the root private key is only stored in the server itself after generation, the security is guaranteed, thereby improving the security of data transmission. safety. The present application also discloses a server verification system, a user terminal and a computer-readable storage medium at the same time, which have the above beneficial effects.

Description

technical field [0001] The present application relates to the technical field of HTTPS, and in particular to a server verification method, system, user terminal and computer-readable storage medium. Background technique [0002] The HTTPS protocol is a new type of network data transmission protocol developed by adding an SSL encryption layer on the basis of the HTTP protocol. Based on this protocol, the data can be transmitted in the form of cipher text between the client and the server to ensure the security of data transmission in the network. safety. [0003] Before the client and server establish an encrypted data transmission path based on the HTTPS protocol, the client first sends an access request to the server, and the server returns a server certificate issued by an authoritative certification authority (Certificate Authority, CA) to the client in response to the access request. , the client also uses the preset root certificate issued by the same authoritative cer...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/40
Inventor 朱秀军陶胜
Owner SHENZHEN ONETHING TECH CO LTD