Unlock instant, AI-driven research and patent intelligence for your innovation.

Request message authentication and data transmission method

A technology of request message and authentication method, which is applied in the field of network security, can solve the problems of affecting efficiency, easy intranet loss of confidentiality, client and server access data loss of confidentiality, etc., to achieve the effect of improving efficiency and increasing security

Active Publication Date: 2020-08-07
神州数码融信软件有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] (1) The encrypted data is converted into plain text between the access point and the server, and the data transmission process is easy to lose confidentiality on the intranet;
[0006] (2) The TLS protocol transmission continues to be deployed between the access point and the server, and the data transmission process needs to be encrypted, which affects efficiency;
[0007] (3) Once the access point is attacked, the access data in the client and server will be lost

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The present invention will be specifically introduced below in conjunction with specific embodiments.

[0032] The request message authentication method provided by the embodiment of the present invention is suitable for a server and includes the following steps:

[0033] S101. Receive a request packet sent by a client and acquire a timestamp in the request packet.

[0034] S102. Calculate the difference Δtimestemp between the current timestamp and the timestamp.

[0035] S103, judging whether the difference Δtimestemp is in the preset time window

[0036] [-Δtimestemp, Δtimestemp′], if yes, obtain the first signature data sigc from the request message 1 And judge the first signature data sigc 1 Whether this time window has been used.

[0037] in,

[0038] sigc 1 =Sig{(timestempc,noisec,SigAlg,DataAlg,Idc,Typec),PKey}, Sig represents the signature calculation function, Timestempc represents the timestamp sent by the client, noisec represents the random value gener...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a request message authentication method, relating to the technical field of network security. The request message authentication method comprises the following steps of: receiving a request message transmitted by a client and acquiring a timestamp in the request message; calculating a difference value between a current timestamp and the timestamp and judging whether the difference value is in a preset time window or not; acquiring an authentication key matched with the request message, generating second signature data and judging whether first signature data is the sameas the second signature data or not according to the authentication key; acquiring first authentication data from the request message, judging whether the first authentication data is the same as second authentication data or not; acquiring a data encryption protection protocol and an encryption key matched with the request message, and generating a request message corresponding to the first authentication data according to the data encryption protection protocol and the encryption key; and judging whether the request message is the same as the request message transmitted by the client or not. Therefore, each server does not need to respectively agree with an access object, and the security in the data transmission process is improved.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a request message authentication and data transmission method. Background technique [0002] In recent years, network security issues have become increasingly prominent, and hacker intrusions and network attacks are increasing. Conventional security defense concepts are often limited to the defense of access units such as gateways, SSL / TLS access points, and VPN access points. Important security facilities Roughly concentrated in the computer room or network entrance, under the strict monitoring of these devices, the security threats from outside the network are greatly reduced. However, the security threats from inside the network cannot be protected in this way, and now it has become the focus of attention of many security managers. [0003] The existing common authentication method usually encrypts the user's authentication key and transmits it to the server for veri...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/08H04L63/083H04L9/3297H04L9/3247H04L63/0807H04L63/0435H04L63/0442H04L9/3213
Inventor 王磊
Owner 神州数码融信软件有限公司