Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

SIP security authentication method and system based on learning problem with errors on the loop

An error learning and problem technology, applied in the field of SIP security authentication methods and systems, can solve the problems of SIP protocol authentication vulnerable to attacks, poor security, and errors, and achieve good anti-attack effect.

Active Publication Date: 2022-08-02
SHANDONG COMP SCI CENTNAT SUPERCOMP CENT IN JINAN
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In order to solve the deficiencies in the prior art, this application provides a SIP security authentication method and system based on the error learning problem on the ring; it solves the problem of being vulnerable to attacks and poor security in the SIP protocol authentication process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SIP security authentication method and system based on learning problem with errors on the loop

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0033] The present embodiment provides a SIP security authentication method based on the learning problem with errors on the ring;

[0034] like figure 1 As shown, the SIP security authentication method based on the learning problem with error on the ring includes:

[0035] S101: the user client U selects its own user name ID and password PW, encrypts the password PW to obtain encrypted data PWE, and the user client U sends the user name ID, encrypted data PWE and verification key to the server S;

[0036] S102: The server S receives the username ID and encrypted data PWE sent by the user client U, and the server S encrypts the received username ID and encrypted data PWE to obtain encrypted data VPW;

[0037] S103: the user client U sends a verification request to the server S; the server S uses the verification key to process the encrypted data VPW to obtain a first verification message, and the server sends the first verification message to the user client U;

[0038] S104...

Embodiment 2

[0085] The present embodiment provides a SIP security authentication system based on the learning problem with errors on the ring;

[0086] The SIP security authentication system based on the error learning problem on the loop, including: user client U and server S;

[0087] The user client U selects its own user name ID and password PW, encrypts the password PW to obtain encrypted data PWE, and the user client U sends the user name ID, encrypted data PWE and verification key to the server S;

[0088] The server S receives the username ID and the encrypted data PWE sent by the user client U, and the server S encrypts the received username ID and encrypted data PWE to obtain the encrypted data VPW;

[0089] The user client U sends a verification request to the server S; the server S uses the verification key to process the encrypted data VPW to obtain a first verification message, and the server sends the first verification message to the user client U;

[0090] After the user...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application discloses a SIP security authentication method and system based on the learning problem with errors on the ring. The user client U encrypts the password PW to obtain the encrypted data PWE, and sends the user name ID, the encrypted data PWE and the verification key to the server S The server S receives the username ID and the encrypted data PWE sent by the user client U, encrypts the received data, and obtains the encrypted data VPW; U sends a verification request to S; S uses the verification key to process the encrypted data VPW, After obtaining the first verification message, the server sends the first verification message to U; after U receives the first verification message, the user client verifies the first verification message, and if the verification passes, the client returns the second verification message to the server S; the server S verifies the second verification message, and if the verification passes, the client U and the server S use a common session key to encrypt subsequent communication information.

Description

technical field [0001] The present application relates to the technical field of secure communication, in particular to a SIP security authentication method and system based on the learning problem with errors on the loop. Background technique [0002] The statements in this section merely mention the background art related to the present application and do not necessarily constitute prior art. [0003] Authentication protocol is one of the important means to ensure the secure exchange of information between communication entities in an untrusted environment. Session Initiation Protocol (SIP) has become the most widely accepted VoIP signaling protocol with the characteristics of simplicity, openness, publicity, standardization and individualization. It is a signaling protocol for multimedia conferences and telephony developed by the Internet Engineering Project Group, which is used to create, modify and terminate two-party or multi-party multimedia session processes. When ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L9/06H04L9/00H04L65/1104
CPCH04L63/0869H04L9/0643H04L9/002H04L63/1441H04L65/1104
Inventor 王金鹏王连海邹丰义徐淑奖王维张佩君于菲菲
Owner SHANDONG COMP SCI CENTNAT SUPERCOMP CENT IN JINAN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products