SIP security authentication method and system based on on-loop error learning problem
A technology of error learning and security authentication, which is applied in the field of secure communication, can solve the problems of SIP protocol authentication, such as vulnerability to attack, errors, and poor security, and achieve good anti-attack effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0033] This embodiment provides a SIP security authentication method based on the learning problem with errors on the ring;
[0034] Such as figure 1 As shown, the SIP security authentication method based on the error learning problem on the ring includes:
[0035] S101: The user client U selects its own user name ID and password PW, encrypts the password PW to obtain encrypted data PWE, and the user client U sends the user name ID, encrypted data PWE and verification key to the server S;
[0036] S102: The server S receives the username ID and encrypted data PWE sent by the user client U, and the server S encrypts the received username ID and encrypted data PWE to obtain encrypted data VPW;
[0037] S103: The user client U sends a verification request to the server S; the server S uses the verification key to process the encrypted data VPW to obtain a first verification message, and the server sends the first verification message to the user client U;
[0038] S104: After t...
Embodiment 2
[0085] This embodiment provides a SIP security authentication system based on the learning problem with errors on the ring;
[0086] A SIP security authentication system based on learning problems with errors on the ring, including: user client U and server S;
[0087] User client U selects its own username ID and password PW, encrypts password PW to obtain encrypted data PWE, user client U sends username ID, encrypted data PWE and verification key to server S;
[0088] The server S receives the username ID and the encrypted data PWE sent by the user client U, and the server S encrypts the received username ID and the encrypted data PWE to obtain the encrypted data VPW;
[0089] The user client U sends a verification request to the server S; the server S uses the verification key to process the encrypted data VPW to obtain a first verification message, and the server sends the first verification message to the user client U;
[0090] After the user client U receives the first...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com