A server verification method, system, user terminal and readable storage medium
A verification method and user terminal technology, applied in transmission systems, digital transmission systems, user identity/authority verification, etc., can solve problems such as insecure HTTPS data transmission, achieve security guarantees, and improve security effects
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0084] See figure 1 , figure 1 It is a flow chart of a server verification method provided in the embodiment of this application. It should be noted that the execution subject of each step in this embodiment is the client, that is, before the client establishes an HTTPS connection with a server to transmit encrypted data, It is necessary to verify the legitimacy of its identity. This embodiment aims to explain the invention point of this application and the various operations performed to achieve the purpose from the perspective of the client. It includes the following steps:
[0085] S101: Initiate an access request to the target server;
[0086] First, an access request is initiated to the target server, and this step exists as the first step of establishing an HTTPS connection with the target server. Among them, the access request usually includes some client parameters, such as client type, version, supported encryption algorithm candidate list, supported compression alg...
Embodiment 2
[0102] See figure 2 , figure 2 It is a flow chart of another server verification method provided by the embodiment of this application. This embodiment provides a method that can further verify whether the server public key is a real server public key on the basis of the first embodiment, so that the server The consideration of legality verification is more thoughtful to prevent various unexpected tampering situations in complex situations, including the following steps:
[0103] S201: Initiate an access request to the target server;
[0104] S202: Receive the fake server certificate generated by the target server after encrypting the server public key with the preset root private key;
[0105] S203: Receive the server signature generated after the target server signs the authentication string with the server private key;
[0106] In addition to step S202, this embodiment will also receive the server signature generated by the target server after signing the authenticatio...
Embodiment 3
[0120] See image 3 , image 3 The flowchart of another server verification method provided by the embodiment of this application. On the basis of the above-mentioned embodiments, this embodiment also provides a legality verification method based on the traditional root certificate and based on the preset root certificate at the same time. The preferred legality verification method of the public key legality verification method. It should be noted that since the traditional root certificate-based legality verification method has been proven to be unreliable, the verification result will only be used as another method to start this application. The prerequisite for the verification method, that is, the final result of the legality verification method based on the preset root public key provided by this application shall prevail, including the following steps:
[0121] S301: Initiate an access request to the target server;
[0122] S302: Receive the real server certificate iss...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


