Unlock instant, AI-driven research and patent intelligence for your innovation.

Bidirectional authentication method and system based on shared key, and terminal

A shared key, two-way authentication technology, applied in the field of terminal, shared key-based two-way authentication method and system, can solve the problems of slow operation speed of public key algorithm, complex configuration and high requirements, and achieve strong configurability and configuration. Simple and safe effect

Active Publication Date: 2020-04-03
QUANTUMCTEK GUANGDONG CO LTD
View PDF10 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] (1) Public key-based authentication methods rely on public key infrastructure, such as digital certificate certification bodies, resulting in complex configuration and high requirements;
[0006] (2) Compared with the symmetric key algorithm, the operation speed of the existing public key algorithm is slower

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Bidirectional authentication method and system based on shared key, and terminal
  • Bidirectional authentication method and system based on shared key, and terminal
  • Bidirectional authentication method and system based on shared key, and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0069] Embodiments of the present invention are described below through specific examples, and those skilled in the art can easily understand other advantages and effects of the present invention from the content disclosed in this specification. The present invention can also be implemented or applied through other different specific implementation modes, and various modifications or changes can be made to the details in this specification based on different viewpoints and applications without departing from the spirit of the present invention. It should be noted that, in the case of no conflict, the following embodiments and features in the embodiments can be combined with each other.

[0070] It should be noted that the diagrams provided in the following embodiments are only schematically illustrating the basic ideas of the present invention, and only the components related to the present invention are shown in the diagrams rather than the number, shape and number of componen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a bidirectional authentication method and system based on a shared key, and a terminal. The first terminal sends an authentication request to a second terminal, the second terminal sends an authentication request response to the first terminal, and the first terminal generates a second random number and sends a verification request comprising a first encryption result obtained by encrypting the first random number and the second random number according to the selected algorithm kit and a first shared key index to the second terminal; the second terminal sends a verification request response comprising a second encryption result and a second shared key index to the first terminal, decrypts the first encryption result, and authenticates the first terminal as a valid user if the decryption result is consistent with the first random number; and the first terminal decrypts the second encryption result, and if the decryption result is consistent with the second randomnumber, the second terminal is authenticated to be a valid user. According to the bidirectional authentication method and system based on the shared key, and the terminal, bidirectional authenticationbetween users is realized, and the security is high.

Description

technical field [0001] The invention relates to the technical field of network authentication, in particular to a shared key-based bidirectional authentication method, system, and terminal. Background technique [0002] In the prior art, the most widely used authentication method when accessing network services is identity authentication based on public key encryption algorithms. Both parties in the communication hold a pair of public key and private key respectively, one of them uses the private key to encrypt specific data, and the other party uses the public key to decrypt the data; if the decryption is successful, the user is considered to be a legitimate user, such as SSL, digital signature etc. [0003] In practice, the user usually has an electronic certificate file, which contains the public key information, the user subject, and the digital signature of the digital certificate certification authority on the file. Other users judge whether the certificate is credib...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/08
CPCH04L63/0869H04L63/083H04L63/0428H04L9/0869H04L9/085
Inventor 詹俊锐梁少峰陈洁容游耀祥
Owner QUANTUMCTEK GUANGDONG CO LTD