Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Safety protection system and method based on challenge response and storage medium

A technology of security protection and response code, applied in the field of security protection system based on challenge response, can solve problems such as loss, threat to network security, and routers being easily hacked, and achieve high network stability and security. Effect

Active Publication Date: 2020-05-08
SHENZHEN Y& D ELECTRONICS CO LTD
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Therefore, the problem of network security should be like the problem of fire prevention and theft in every household. It should be prevented before it happens. When you don’t even think that you will become the target, the threat has already appeared. big loss
[0005] In the existing technology, the router is easy to be hacked, which affects the stability of the network on the one hand, and threatens the security of the network on the other hand.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety protection system and method based on challenge response and storage medium
  • Safety protection system and method based on challenge response and storage medium
  • Safety protection system and method based on challenge response and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0055] Embodiment 1: as figure 1 As shown, a security protection system based on a challenge response includes a client, a router, and a cloud platform connected in sequence, and the client is used to send an application KEY, an application challenge response code, and initiate a challenge response to the router, and display the response result. The router is used to select and / or set routes, process network requests and / or responses, and process data; the cloud platform is connected to routers, used to receive network requests and / or send response results, and The data is processed.

[0056] Among them, first of all, the cloud platform has the advantages of large scale, virtualization, high reliability and good scalability, and has good flexibility, adaptability and scalability. Secondly, the cloud platform is based on the high-efficiency computing mode of cloud computing. , can provide a good application foundation for network communication.

[0057] Wherein, the client ca...

Embodiment 2

[0059] Embodiment 2: as figure 2 As shown, a security protection method based on challenge response is provided, including steps:

[0060] Step S1: the router verifies the application KEY request sent by the client, and the verification succeeds in encrypting the KEY and sending it to the client for storage;

[0061] Step S2: the router receives and verifies the application challenge response code request sent by the client and forwards it to the cloud platform, and the cloud platform passes the identity verification and sends the challenge response code to the client through the router for storage;

[0062] Step S3: The router receives the first application challenge response request sent by the client and verifies the data, generates a second application challenge response request after processing and sends it to the client, and the client responds to the second application challenge response request according to the preset After the rule is processed, it sends a challenge r...

Embodiment 3

[0065] Embodiment 3: This embodiment is a further optimization done on the basis of the above-mentioned embodiments, as image 3 As shown, the client sends a KEY application request, and the router receives the KEY application request. If the verification passes, the KEY is generated according to the seed input by the client, and the plaintext data is encrypted according to the KEY to form ciphertext data, which is sent to the client for storage.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security protection system and method based on challenge response and a storage medium. The security protection system based on the challenge response comprises a client, a router and a cloud platform which are connected in sequence; the client is used for sending an application KEY and an application challenge response code to the router, initiating the challenge response and displaying a response result. The router is used for selecting and / or setting a route, processing a network request and / or response and processing data; and the cloud platform is connected withthe router and is used for receiving the network request and / or sending a response result and processing the data. In the system disclosed in the invention, through the technical means of carrying outsecurity verification by adopting a challenge response mode, the technical problem that the router in the prior art is easy to be stolen and the network stability and security are low is overcome, and the beneficial effects that the router can prevent the network from being stolen and the network stability and security are high are realized.

Description

technical field [0001] The present invention relates to the technical field of data encryption and decryption, in particular to a challenge-response-based security protection system, method and storage medium. Background technique [0002] With the development of network technology, for network operators and managers, it is increasingly hoped that the access, read and write operations of local network information can be more protected and controlled to avoid viruses, illegal access, and denial of service and threats of illegal occupation and control of network resources, to stop and defend against attacks by network hackers; for security and confidentiality departments, they prefer to filter and prevent illegal, harmful, or information involving state secrets to avoid confidentiality. Information leakage, avoiding harm to society and causing huge losses to the country. [0003] Therefore, the problem of network security should be like the problem of fire protection and anti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08H04L29/06
CPCH04L9/3271H04L9/3236H04L9/3234H04L9/0869H04L63/10
Inventor 戚建淮张少华刘建辉郑伟范胡金华宋晶彭华
Owner SHENZHEN Y& D ELECTRONICS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products