Unlock instant, AI-driven research and patent intelligence for your innovation.

Portal authentication method based on SM algorithm

An authentication method and algorithm technology, applied in digital data authentication, computing, computer security devices, etc., can solve problems such as user identity authentication login trouble, login information risk, etc.

Inactive Publication Date: 2021-09-07
黑龙江头雁科技有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] For the weak point of current Portal authentication, the object of the present invention is that the present invention provides a kind of Portal authentication method based on SM algorithm, the proposed method makes Portal authentication more secure, solves user identity authentication login trouble, login information has risk The problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Portal authentication method based on SM algorithm
  • Portal authentication method based on SM algorithm
  • Portal authentication method based on SM algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] specific implementation plan

[0015] After step S101 starts, after the user sends a login request in step S102, the BRAS acts as a DHCP function to allocate a dynamic IP at step S103, and the user can obtain an IP. In step S104, the user's MAC address will be passed to the BRAS The server also encrypts the block cipher SM4 algorithm. In step S105, the BRAS transmits the encrypted information of the MAC address to the Radius server, and the Radius server will decrypt it and compare the MAC address information with the background database. When the matching is successful, step S106 will be performed, and the Radius server will return the information of allowing login to the Portal end. Then proceed to step S108, and the Portal terminal displays login. Enter step S116 at last, end process. If authentication fails at step S105 place, will enter step S107, pass back the Portal end login failure information, then step S109 is displayed by Portal end and needs to carry out ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a non-perceptual authentication method based on an SM algorithm, and the method comprises the steps: firstly distributing a dynamic IP, then carrying out SM4 algorithm encryption on an MAC address, transmitting the encrypted information to a background, comparing the encrypted information with a database, and notifying Portal and allowing a user to log in after success; If the user logs in for the first time, the MAC address of the user is recorded and encrypted to bind the user information;.

Description

technical field [0001] The invention relates to a Portal authentication method, based on the block cipher SM4 algorithm, and the Portal authentication is characterized in that the non-perceptual authentication is completed in combination with a MAC address. Background technique [0002] In the current society, the Internet has spread all over the world and has become a part of everyone's life. People use browsers to log in to web pages to meet their personal needs, but for websites that are frequently logged in, it is necessary to fill in the information completely every time they log in. It is particularly troublesome, so we adopted Portal authentication to satisfy the distress of users who do not want to enter repeatedly. However, because the Portal authentication method does not have confidentiality, there is a risk that the MAC address of the user will be intercepted and recorded during the use process, and the user will be redirected to log in when the user logs out. At...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04L29/06H04L12/28G06F21/44G06F21/45G06F21/60
CPCH04L9/0618H04L63/083H04L12/287G06F21/44G06F21/45G06F21/602
Inventor 刘清源徐龙付文香董潍赫黄逸群张心雨陈伟良赵瑞
Owner 黑龙江头雁科技有限公司