A two-way communication authentication method and system
A two-way communication and authentication method technology, applied in the field of two-way communication authentication method and system, can solve the problems of insufficient information security monitoring mechanism, weak security network equipment security, lack of access control, etc. Maintenance and upgrades, the effect of facilitating confidentiality
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0029] like figure 1 As shown, the present embodiment provides a two-way communication authentication method, which can be applied in the field of rail transit. In the urban rail transit integrated monitoring system, the two-way authentication between the integrated monitoring system server and the subsystem server, the subsystem includes multiple , such as power system, environment and equipment monitoring system, FAS system, screen door system, signal system or fire alarm equipment, etc.;
[0030] In this embodiment, in the authentication process of both communication parties, a third-party device, that is, a safety supervision device, is added to authenticate both communication parties. The method of this embodiment is completed in the safety supervision device, specifically including:
[0031] Receive the first authentication request, generate and encrypt the first random number R1, and send the obtained first encrypted random number R1tp to the first server, so that the f...
Embodiment 2
[0056] This embodiment provides a communication authentication system for a comprehensive subway monitoring system. The system adopts modular programming and includes a safety monitoring device, an integrated monitoring system server and a subsystem server, such as figure 2 shown;
[0057] The safety supervision device realizes the management and maintenance of the internal organization of the system. Any data connected to the integrated monitoring system and equipment in the communication network must first obtain the permission of the key management center before accessing the resources of the communication system. Identity authentication is The premise of secure data transmission is that the corresponding data transmission can only be carried out after the identities of the communication parties have been legally authenticated. The identity authentication unit is based on cryptographic services, which can generate random numbers and carry time stamps for encryption, decrypt...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com


