Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Strong discrimination method of enciphered mode by public key cryptographic algorithm

A technology of public key and encryption mode, applied in the direction of public key of secure communication, user identity/authority verification, etc., can solve problems such as dictionary attack, large management load, security vulnerability, etc., to resist dictionary attack and prevent replay Attack, manage easy effects

Inactive Publication Date: 2005-08-24
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF0 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0032] Error recovery problem: RADIUS protocol does not support error recovery failover mechanism, the result is that different implementations have different failover
[0034] Reliable transport issues: RADIUS runs over UDP and does not define retransmission behavior; as a result, reliability varies from implementation to implementation
This is difficult to achieve with things like unsolicited disconnection or on-demand re-authentication / re-authorization across heterogeneous networks
[0037] Auditability issues: RADIUS does not define data object security mechanisms, the result is that untrusted proxies can modify attributes or packet headers without being discovered
Along with support for ability negotiation, which can be difficult to determine in the event of a dispute
[0038] Capability negotiation issues: RADIUS does not support error handling, capability negotiation, or required / non-required flags for attributes
This would result in a large administrative load, and create templates to reuse RADIUS shared secrets, which would lead to security vulnerabilities
[0040] In summary, simply using the CHAP protocol for identity authentication and the RADIUS protocol for information transmission cannot solve the problem of two-way authentication between users and the network in mobile communications, and cannot effectively prevent physical layer eavesdropping, replay attacks, and dictionary attacks. There are hidden dangers in communication security between users and the access server NAS

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Strong discrimination method of enciphered mode by public key cryptographic algorithm
  • Strong discrimination method of enciphered mode by public key cryptographic algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] The content in this section mainly describes the specific application of the authentication method of the present invention in the PPP protocol.

[0063] In order to establish communication over a point-to-point link, each end of the PPP link must first send LCP packets to set up and test the data link. After the link is established, the peer can be identified. PPP must then send NCP packets to select and configure one or more network layer protocols. Once each selected network layer protocol is configured, packets from each network layer protocol can be sent on the link. The link will remain in the communication configuration until direct LCP and NCP packets close the link, or when some external event occurs (inactivity timer expires or network administrator intervenes). In the process of setting up, maintaining and terminating a point-to-point link, a PPP link goes through several distinct stages, such as figure 2 shown. This diagram does not show all state trans...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention discloses a strong distinguishing method adopting open code key calculation encryption mode. The process is:found wireless chain-channel, the identifier sends the identification request to the user, and return the identification information to the server, the server find the user open code key and the information integrality code key from the database to found the dialog with the user, the server and the user produce the random numbers, encode the open code key for each other, decode the code key through the identifier, compare self random number with the random number changed by the opposite side and judge whether the identification is successful. Repeat this process for three times, and the server and the user calculate the whole identification and exchange integrality value through encoding and decoding code key and the information integrality code key and the relative information. The identifier judges whether the identification is successful, decides whether the user can get into the network and realizes the online communication of users and the broadcasting of the base station. The strong points are that it realizes the insurance of the identification of the user and the server and the safety of the communication.

Description

technical field [0001] The invention relates to an authentication method for verifying the legal identities of both the user and the server to ensure that legal users access network resources and prevent them from being deceived by false servers in a communication network. Background technique [0002] In the field of network communication, the most common use is to transmit data through point-to-point links through the PPP protocol, and use the CHAP protocol (Challenge Handshake Authentication Protocol) to complete the identity authentication of the PPP link. This CHAP protocol is a challenge-handshake authentication protocol. Both parties of the link configure and test the PPP link through negotiation of the point-to-point scalable link control protocol, PPPLCP for short. After the PPP link is established, the identity of the connecter must be authenticated first, and then based on the authentication result, it is decided whether to allow the link to enter the NCP (Network...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30H04L9/32
Inventor 罗超
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products