Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for realizing network accreditation by encipher clobber generating

A network identity and authentication method technology, which is applied in the field of network identity authentication by encryption system, which can solve the problems of short user passwords, infrequent replacement, and insecure identity authentication methods.

Inactive Publication Date: 2002-07-17
胡祥义
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, the network identity authentication products produced by some information security manufacturers at home and abroad all use the method of comparing user numbers and passwords to achieve identity authentication. What is transmitted is "clear information", and "hackers" can steal the "clear information" on the line to enter the server. At the same time, the user password is relatively short, and the password consists of 6 to 10 digits, and most users generally do not use it frequently for convenience. This also provides favorable conditions for "hackers" to break through the protection system of the network server

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing network accreditation by encipher clobber generating
  • Method for realizing network accreditation by encipher clobber generating
  • Method for realizing network accreditation by encipher clobber generating

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] The implementation steps of the identity authentication method are illustrated below in conjunction with the accompanying drawings:

[0014] figure 1 : It shows that the user computer uses the cipher machine at this end to encrypt the scramble, and transmits the user number, the index code of the basic key BK and the random number to the network server through the network, and the network server uses the same key to decrypt the scramble through the cipher machine at this end. Random, compare the random numbers generated at both ends to achieve identity authentication.

[0015] figure 2 : Explain that the user computer controls the cipher machine at this end to input the user key UK into the scrambling system of the cipher machine, and then generate the index code of the basic key BK through the encryption control system, then select BK from the index code, and input it into the scrambling system System, UK and BK are combined to generate the initial state in the chao...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention utilizes computer, information code and network technology to design a pair of identical cipher machines, they are respectively placed on user computer terminal and network server terminal, it utilizes user terminal cipher machine to make encryption and produce linite length disorder number, and transfer said disorder number into network server by means of network, so that on the network line a train of linite length disorder number, a group of key marking codes and user number can be transmitted, the server terminal cipher machine uses identical key to produce disorder number with identical length, said two groups of disorder numbers can be compared so as to implement network accreditation.

Description

[0001] technology field. [0002] The present invention relates to the field of information security. Specifically, a cipher machine of the same establishment is placed at both ends of the user computer and the network server, and the user number and the index code of the basic key BK are encrypted by the cipher machine at the user end. It is transmitted to the network server together with the random number, and the cipher machine at this end uses the same key to decrypt the random number, and realizes identity authentication by comparing the random numbers at both ends. At the same time, the index code of the basic key BK is randomly changed to ensure that each One-time encryption can achieve one-time encryption. The network identity authentication products manufactured by this technology can be used in fields such as government departments, banks, securities, insurance and other business websites. Background technique: [0003] At present, the network identity authenticatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/00H04L9/32
Inventor 胡祥义
Owner 胡祥义
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products