Check patentability & draft patents in minutes with Patsnap Eureka AI!

A two-way communication authentication method and system

A two-way communication and authentication method technology, applied in the field of two-way communication authentication method and system, can solve the problems of insufficient information security monitoring mechanism, weak security network equipment security, lack of access control, etc. Maintenance and upgrades, the effect of facilitating confidentiality

Active Publication Date: 2021-08-03
SHANDONG UNIV
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, the inventors have found that the focus of the system is on normal communication between devices rather than network security, so the security of communication between network devices and the security of network devices themselves are relatively weak
The lack of access control between the system and each subsystem, security monitoring and intrusion prevention measures are still blank. During the operation of the system, the security configuration is insufficient, the information security monitoring mechanism is not perfect, and information security problems such as intrusion are prone to occur.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A two-way communication authentication method and system
  • A two-way communication authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029] like figure 1 As shown, the present embodiment provides a two-way communication authentication method, which can be applied in the field of rail transit. In the urban rail transit integrated monitoring system, the two-way authentication between the integrated monitoring system server and the subsystem server, the subsystem includes multiple , such as power system, environment and equipment monitoring system, FAS system, screen door system, signal system or fire alarm equipment, etc.;

[0030] In this embodiment, in the authentication process of both communication parties, a third-party device, that is, a safety supervision device, is added to authenticate both communication parties. The method of this embodiment is completed in the safety supervision device, specifically including:

[0031] Receive the first authentication request, generate and encrypt the first random number R1, and send the obtained first encrypted random number R1tp to the first server, so that the f...

Embodiment 2

[0056] This embodiment provides a communication authentication system for a comprehensive subway monitoring system. The system adopts modular programming and includes a safety monitoring device, an integrated monitoring system server and a subsystem server, such as figure 2 shown;

[0057] The safety supervision device realizes the management and maintenance of the internal organization of the system. Any data connected to the integrated monitoring system and equipment in the communication network must first obtain the permission of the key management center before accessing the resources of the communication system. Identity authentication is The premise of secure data transmission is that the corresponding data transmission can only be carried out after the identities of the communication parties have been legally authenticated. The identity authentication unit is based on cryptographic services, which can generate random numbers and carry time stamps for encryption, decrypt...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present disclosure discloses a two-way communication authentication method and system, including receiving a first authentication request, generating and encrypting a first random number, and sending the first encrypted random number to a first server so that the first server can decrypt it; receiving The second authentication request generates a second random number, encrypts the second random number and the third random number decrypted by the first server, and sends the second encrypted random number to the second server, so that the second server can Decrypt the encrypted random number and verify the third random number; receive the second server to decrypt the fourth random number, encrypt the fourth random number, and send the obtained third encrypted random number to the first server, so that the first The server decrypts the third encrypted random number and verifies the fourth random number. Use random numbers and encryption technology to verify the correctness of the identities of both parties, solve the problem of identity impersonation, and realize the two-way authentication of communication between the integrated monitoring system and its subsystems.

Description

technical field [0001] The present disclosure relates to the technical field of rail transit, in particular to a two-way communication authentication method and system. Background technique [0002] The statements in this section merely provide background information related to the present disclosure and do not necessarily constitute prior art. [0003] The urban rail transit comprehensive monitoring system is a large-scale layered distributed monitoring system, which is composed of professional automation subsystems integrated in it, and at the same time interconnected with independent professional systems for information interaction. The main functions of the comprehensive subway monitoring system include the real-time centralized monitoring of equipment and the coordination and linkage function between various systems. Through the comprehensive monitoring system, real-time centralized monitoring and control of power system, environment and equipment monitoring system, FA...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3297H04L63/0442H04L63/0823H04L63/0838H04L63/0869
Inventor 郑雷张承慧孙波张立志
Owner SHANDONG UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More