Unlock instant, AI-driven research and patent intelligence for your innovation.

A network security certification method and device

A network security and authentication method technology, applied to secure communication devices and key distribution, can solve problems such as easy forgery and theft, and achieve the effect of enhancing security

Active Publication Date: 2021-11-26
INSPUR SUZHOU INTELLIGENT TECH CO LTD
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Traditional identity authentication The traditional authentication method is through the private key and the public key. The public key and the private key are easy to forge and steal because this encryption method is a symmetric encryption, and the key will be issued at the same time when it is distributed. Public key and private key. At this time, it is easy to intercept the two keys. Once you have both the public key and the private key, you can forge information, which has the disadvantage of being easy to forge and steal.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A network security certification method and device
  • A network security certification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] In order to make the purpose, technical solution and advantages of the present invention more clear, the embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined arbitrarily with each other.

[0040] The steps shown in the flowcharts of the figures may be performed in a computer system, such as a set of computer-executable instructions. Also, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0041] In order to solve the above technical problems, on the one hand, an embodiment of the present invention provides a network security authentication method, which is applied to a network security authentication system. The network security authenticat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network security authentication method, which is applied to a system including a client identifier, a two-way encryptor and a server parser. The method includes: using a client identifier to judge whether the random code decrypted by the client that initiates the identification request is the same as the random code before the client's long-term invariant password encryption; The client attribute information encrypted by the long-term invariant password of the client is sent to the client; the server-side parser uses the long-term invariable password of the server and the long-term invariant password of the client to parse the encrypted client-side information sent by the client Client attribute information to determine the identity of the client. Since the long-term invariable passwords of the client and the server are preset, the distribution of the long-term invariant passwords of the client and the server is unidirectional, which enhances the security of authentication. The corresponding network security authentication device is also disclosed.

Description

technical field [0001] The invention relates to security authentication technology, in particular to a network security authentication method and device. Background technique [0002] With the rapid development of today's computer information network, network security is facing severe challenges, the network security situation has become more and more complex, data leakage, DDOS attacks and other incidents have intensified, and network security certification has become a top priority. Traditional identity authentication The traditional authentication method is through the private key and the public key. The public key and the private key are easy to forge and steal because this encryption method is a symmetric encryption, and the key will be issued at the same time when it is distributed. Public key and private key. At this time, it is easy to intercept the two keys. Once you have both the public key and the private key, you can forge information, which has the disadvantages...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/0869H04L63/083
Inventor 丁增强
Owner INSPUR SUZHOU INTELLIGENT TECH CO LTD