Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

SIP security authentication method and system based on on-loop error learning problem

A technology of error learning and security authentication, which is applied in the field of secure communication, can solve the problems of SIP protocol authentication, such as vulnerability to attack, errors, and poor security, and achieve good anti-attack effect

Active Publication Date: 2020-11-20
SHANDONG COMP SCI CENTNAT SUPERCOMP CENT IN JINAN
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In order to solve the deficiencies in the prior art, this application provides a SIP security authentication method and system based on the error learning problem on the ring; it solves the problem of being vulnerable to attacks and poor security in the SIP protocol authentication process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SIP security authentication method and system based on on-loop error learning problem

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0033] This embodiment provides a SIP security authentication method based on the learning problem with errors on the ring;

[0034] Such as figure 1 As shown, the SIP security authentication method based on the error learning problem on the ring includes:

[0035] S101: The user client U selects its own user name ID and password PW, encrypts the password PW to obtain encrypted data PWE, and the user client U sends the user name ID, encrypted data PWE and verification key to the server S;

[0036] S102: The server S receives the username ID and encrypted data PWE sent by the user client U, and the server S encrypts the received username ID and encrypted data PWE to obtain encrypted data VPW;

[0037] S103: The user client U sends a verification request to the server S; the server S uses the verification key to process the encrypted data VPW to obtain a first verification message, and the server sends the first verification message to the user client U;

[0038] S104: After t...

Embodiment 2

[0085] This embodiment provides a SIP security authentication system based on the learning problem with errors on the ring;

[0086] A SIP security authentication system based on learning problems with errors on the ring, including: user client U and server S;

[0087] User client U selects its own username ID and password PW, encrypts password PW to obtain encrypted data PWE, user client U sends username ID, encrypted data PWE and verification key to server S;

[0088] The server S receives the username ID and the encrypted data PWE sent by the user client U, and the server S encrypts the received username ID and the encrypted data PWE to obtain the encrypted data VPW;

[0089] The user client U sends a verification request to the server S; the server S uses the verification key to process the encrypted data VPW to obtain a first verification message, and the server sends the first verification message to the user client U;

[0090] After the user client U receives the first...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an SIP security authentication method and system based on an on-loop error learning problem, and the method comprises the steps: a user client U encrypts a password PW to obtain encrypted data PWE, and transmits a user name ID, the encrypted data PWE and a verification key to a server S; the server S receives the user name ID and the encrypted data PWE sent by the user client U, and encrypts the received data to obtain encrypted data VPW; the U sends a verification request to the S; the S uses the verification key to process the encrypted data VPW to obtain a first verification message; and the server sends the first verification message to the U; after the U receives the first verification message, the user client verifies the first verification message, and if theverification is passed, the client returns a second verification message to the server S; and the server S verifies the second verification message, and if the second verification message passes theverification, the client U and the server S use a common session key to encrypt the communication information.

Description

technical field [0001] The present application relates to the technical field of secure communication, in particular to a SIP security authentication method and system based on a learning problem with errors on a ring. Background technique [0002] The statements in this section merely mention the background art related to this application, and do not necessarily constitute the prior art. [0003] Authentication protocol is one of the important means to ensure the secure exchange of information between communicating entities in an untrusted environment. Session Initiation Protocol (SIP) has become the most widely accepted signaling protocol for Internet telephony due to its simplicity, openness, publicity, standardization and personalization. It is a signaling protocol for multimedia conferences and telephones developed by the Internet Engineering Project Group, and is used to create, modify and terminate two-party or multi-party multimedia session processes. When a remote...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/06H04L9/00
CPCH04L63/0869H04L9/0643H04L9/002H04L63/1441H04L65/1104
Inventor 王金鹏王连海邹丰义徐淑奖王维张佩君于菲菲
Owner SHANDONG COMP SCI CENTNAT SUPERCOMP CENT IN JINAN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products