Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication method and device, electronic equipment and storage medium

An authentication method and authentication device technology, applied in the field of communications, can solve the problems of heavy computing load, large network overhead, easy interception of user passwords, etc., and achieve the effects of reducing computing load, reducing network overhead, and protecting security.

Pending Publication Date: 2022-07-08
AEROSPACE INFORMATION
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, user passwords are often used for authentication in early application systems. Although this authentication method is simple and easy to use, and will not increase network overhead and computing load, there are the following problems in the authentication communication process: user passwords are easily intercepted, And the negotiation of the session key cannot be realized
However, the SSL protocol requires a third-party certificate authority (Certificate Authority, CA) to participate in issuing digital certificates representing their respective identities for the server and client. At the same time, the SSL protocol uses asymmetric encryption algorithms in the process of authentication and session key negotiation. Perform operations such as signing, verifying signatures, encryption and decryption, etc., the calculation load is heavy, the network overhead is large, and the burden on the application system is increased

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and device, electronic equipment and storage medium
  • Authentication method and device, electronic equipment and storage medium
  • Authentication method and device, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] In order to make the objectives, technical solutions and advantages of the present application clearer, the present application will be further described in detail below with reference to the accompanying drawings. Obviously, the described embodiments are only a part of the embodiments of the present application, not all of the embodiments. Based on the embodiments in this application, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of this application.

[0052] As used hereinafter, the word "exemplary" means "serving as an example, embodiment, or illustration." Any embodiment described as "exemplary" is not necessarily to be construed as preferred or advantageous over other embodiments.

[0053] The terms "first" and "second" in the text are only used for the purpose of description, and should not be understood as expressing or implying relative importance or implying the number of ind...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an authentication method and device, electronic equipment and a storage medium, and relates to the technical field of communication, a client sends a first random number to a server, so that the server determines first authentication comparison information according to the first random number, a second random number generated by the server and a user password; receiving a second random number sent by the server, determining first authentication information according to the first random number, the second random number and the user password, and determining a second session key according to the first authentication information and the user password; sending the first authentication information to the server, so that the server generates authentication passing information when determining that the first authentication comparison information is the same as the first authentication information; and if authentication passing information sent by the server is received, performing encrypted communication with the server through the second session key. According to the application, the security of the user password can be fully protected, the negotiation of the session key can be realized, and the calculation load and the network overhead can be reduced, so that the burden of an application system is reduced.

Description

technical field [0001] The present application relates to the field of communication technologies, and more particularly, to an authentication method, apparatus, electronic device and storage medium. Background technique [0002] In an Internet application system, a server and a client usually require one-way or two-way authentication before communication. One-way authentication means that the server needs to authenticate the client to prevent illegal users from accessing the system; while two-way authentication means that in addition to the server that needs to authenticate the client, the client also needs to authenticate the server to prevent users from accessing the system. Access illegal phishing websites. [0003] At present, in the early application systems, user passwords are often used for authentication. Although this authentication method is simple and easy to use, it will not increase network overhead and computing load, but there are the following problems in t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L9/32H04L9/08
CPCH04L63/08H04L63/083H04L9/3226H04L9/0869H04L63/168
Inventor 宁红宙
Owner AEROSPACE INFORMATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products