CN102195983A - Network terminal encryption authentication method and server - Google Patents

Network terminal encryption authentication method and server Download PDF

Info

Publication number
CN102195983A
CN102195983A CN2011101223573A CN201110122357A CN102195983A CN 102195983 A CN102195983 A CN 102195983A CN 2011101223573 A CN2011101223573 A CN 2011101223573A CN 201110122357 A CN201110122357 A CN 201110122357A CN 102195983 A CN102195983 A CN 102195983A
Authority
CN
China
Prior art keywords
dynamic key
network terminal
key
dynamic
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2011101223573A
Other languages
Chinese (zh)
Other versions
CN102195983B (en
Inventor
吴博远
张海
李剑
魏含寒
陈贻斌
周青海
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen TCL New Technology Co Ltd
Original Assignee
Shenzhen TCL New Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen TCL New Technology Co Ltd filed Critical Shenzhen TCL New Technology Co Ltd
Priority to CN201110122357.3A priority Critical patent/CN102195983B/en
Publication of CN102195983A publication Critical patent/CN102195983A/en
Application granted granted Critical
Publication of CN102195983B publication Critical patent/CN102195983B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention relates to a network terminal encryption authentication method and a server. The method comprises the following steps of: acquiring a first ID (Identifier) and a first dynamic key when a network terminal logs on by using a server; authenticating the first dynamic key according to the first ID, a dynamic key pre-generation table and an ID corresponding relation table; when the authentication is successful, randomly acquiring a second dynamic key from the dynamic key pre-generation table and storing a second ID corresponding to the second dynamic key into the ID corresponding relation table; and transmitting the second dynamic key to the network terminal, wherein the second dynamic key is taken as a new first dynamic key, and the second ID corresponding to the second dynamic key is taken as an authentication key for the next log-on of the network terminal. According to the method disclosed by the invention, the dynamic keys are pre-generated, so that the quantity of the dynamic keys is controlled, the frequencies of generating the dynamic keys and storing the dynamic keys to hard disks are lowered for the server, and the resource consumption of the server is lowered.

Description

Network terminal encryption and authentication method and server
Technical field
The present invention relates to Internet technical field, relate in particular to a kind of network terminal encryption and authentication method and server.
Background technology
In daily life, along with the rise of internet television, the fail safe of internet television becomes more and more important.
At present, for preventing to clone, palm off the appearance of Web TV, the webserver has used dynamic key that Web TV is carried out encrypting and authenticating.That is: Web TV need be with one " dynamically key " as the certified information of secret key encryption, and after each server authentication success, server generates a new dynamic key in real time and returns to this Web TV, after Web TV is preserved new dynamic key success, server is preserved this new dynamic key simultaneously to database, uses when authenticating for this Web TV is next as new key.Like this, can not can think the Web TV cloning, palm off by the Web TV of new key authentication.
But, the method of the dynamic key of above-mentioned real-time generation need be transferred random number functions at server end, generates the new dynamic key with certain-length scale, and checking that dynamic key and already present dynamic key that this is new do not repeat, then that this is new dynamic key writes database.And when the Web TV quantity size was big, server need frequently repeat hard disk write operation, and was excessive when the hard disk resource consumption, and when becoming bottleneck, whole authentication process then can slow down, thereby influences user's operating experience.
Summary of the invention
Main purpose of the present invention is to provide a kind of network terminal encryption and authentication method and server, frequently writes hard disk with server in the solution network terminal verification process and causes the too much problem of network resource consumption.
In order to achieve the above object, the present invention proposes a kind of network terminal encryption and authentication method, may further comprise the steps:
An ID and the first dynamic key when server obtains network terminal login;
According to a described ID, dynamically key generation table and ID mapping table authenticate the described first dynamic key in advance;
When authentication success, obtain the second dynamic key at random the generation table in advance from described dynamic key, and deposit the 2nd ID of the described second dynamic key correspondence in described ID mapping table;
The described second dynamic key is sent to the described network terminal, as the first new dynamic key of this network terminal, and with the 2nd ID of the described second dynamic key correspondence authenticate key as this network terminal login next time.
Preferably, described dynamic key in advance the generation table comprise corresponding relation between the described second dynamic key and described the 2nd ID; Described ID mapping table comprises an ID of the described network terminal and the corresponding relation between described the 2nd ID.
Preferably, described according to an ID, dynamically key in advance generation table and ID mapping table the step that the described first dynamic key authenticates is comprised:
From described ID mapping table, obtain two ID corresponding with a described ID;
Obtain the second dynamic key corresponding the generation table in advance from described dynamic key with described the 2nd ID;
If the second dynamic key of more described correspondence and the described first dynamic key are both unanimities, then authentication success; Otherwise, authentification failure.
Preferably, described server also comprised obtain the step of the ID of the described network terminal and the first dynamic key when the network terminal is logined before:
Generate the second dynamic key of predetermined quantity and deposit described dynamic key in advance in the generation table, and make one the 2nd ID of each second dynamic key correspondence.
Preferably, also comprise: upgrade described dynamic key according to the predetermined refresh time interval and generate table in advance.
Preferably, also comprise: the transmission number of times that the described second dynamic key is sent to the described network terminal at server surpasses pre-determined number and this network terminal when successfully not preserving the described second dynamic key, does not upgrade the first dynamic key of the described network terminal.
The present invention also proposes a kind of network terminal encrypting and authenticating server, comprising:
First acquisition module, an ID and the first dynamic key when being used to obtain network terminal login;
Authentication module, be used for according to a described ID, dynamically key generation table and ID mapping table authenticate the described first dynamic key in advance;
First update module is used for when authentication success, obtains the second dynamic key at random the generation table in advance from described dynamic key, and deposits the 2nd ID of the described second dynamic key correspondence in described ID mapping table;
Second update module is used for the described second dynamic key is sent to the described network terminal, as the first new dynamic key of this network terminal, and with the 2nd ID of the described second dynamic key correspondence authenticate key as this network terminal login next time.
Preferably, described authentication module comprises:
The 2nd ID acquiring unit is used for obtaining two ID corresponding with a described ID from described ID mapping table;
The second dynamic key acquiring unit, be used for from described dynamic key in advance the generation table obtain the second dynamic key corresponding with described the 2nd ID;
Authentication ' unit is used for the second dynamic key and the described first dynamic key of more described correspondence, if both unanimities, then authentication success; Otherwise, authentification failure.
Preferably, also comprise:
Generation module is used for generating the second dynamic key of predetermined quantity and depositing described dynamic key generation table in advance in, and makes corresponding one the 2nd ID of each second dynamic key.
Preferably, described generation module also is used for upgrading described dynamic key generation table in advance according to the predetermined refresh time interval.
Preferably, when described second update module also is used for the transmission number of times that the described second dynamic key sends to the described network terminal surpassed pre-determined number and this network terminal and successfully do not preserve the described second dynamic key, do not upgrade the first dynamic key of the described network terminal.
A kind of network terminal encryption and authentication method and server that the present invention proposes, by the dynamic key of pre-generation and deposit dynamic key generation table in advance in, dynamically the quantity of key and the quantity of the network terminal no longer are man-to-man relations, make that the quantity of dynamic key is controlled, behind authentication success, server obtains a dynamic key at random the generation table in advance from dynamic key and returns to the network terminal, with the 2nd ID of this dynamic key correspondence of returning key as network terminal authentication next time, thereby alleviated the server generation and preserved the frequent degree of dynamic key, reduced the resource consumption of server to hard disk.
Description of drawings
Fig. 1 is network terminal encryption and authentication method one an embodiment schematic flow sheet of the present invention;
Fig. 2 is according to an ID, dynamic key generation table and ID mapping table schematic flow sheet that the first dynamic key is authenticated in advance among network terminal encryption and authentication method one embodiment of the present invention;
Fig. 3 is another embodiment schematic flow sheet of network terminal encryption and authentication method of the present invention;
Fig. 4 is network terminal encrypting and authenticating server one an example structure schematic diagram of the present invention;
Fig. 5 is the structural representation of authentication module among network terminal encrypting and authenticating server one embodiment of the present invention;
Fig. 6 is another example structure schematic diagram of network terminal encrypting and authenticating server of the present invention.
In order to make technical scheme of the present invention clearer, clear, be described in further detail below in conjunction with accompanying drawing.
Embodiment
Solution for embodiment of the invention mainly is by the dynamic key of pre-generation and deposits dynamic key generation table in advance in, behind authentication success, server obtains a dynamic key at random the generation table in advance from dynamic key and returns to the network terminal, with the 2nd ID of this dynamic key correspondence of returning key as network terminal authentication next time, generate and preserve the frequent degree of dynamic key to alleviate server, reduce the resource consumption of server to hard disk.
Authentication mode when the embodiment of the invention relates to network terminal logon server in the Internet, this network terminal can be Web TV etc.
As shown in Figure 1, one embodiment of the invention proposes a kind of network terminal encryption and authentication method, comprising:
An ID and the first dynamic key when step S101, server obtain network terminal login;
When network terminal logon server, send log-on message to server, include the ID (being the alleged ID of present embodiment) of the network terminal and the dynamic key (being the present embodiment alleged first dynamic key) that preserves thereof in this log-on message.Each network terminal all has unique identify label the one ID, when the network terminal logon server first time, and the initial dynamically key that presets when the first dynamic key that the network terminal is preserved dispatches from the factory for this network terminal.
The log-on message that server sends according to the network terminal gets access to an ID and the first dynamic key of this network terminal.
Step S102, according to an ID, dynamically key generation table and ID mapping table authenticate this first dynamic key in advance;
Server generates before network terminal login in advance N the second dynamic key, and N is a natural number.Corresponding one the 2nd ID of each second dynamic key, the 2nd ID be as the unique identification of the second dynamic key, and the corresponding relation of the second dynamic key and the 2nd ID is kept at dynamic key in advance in the generation table; Simultaneously, server also is provided with the ID that comprises the network terminal and the ID mapping table of the corresponding relation between the 2nd ID.The one ID of each network terminal corresponding one with the 2nd corresponding ID of the second dynamic key, after the first dynamic key renewal of the follow-up preservation of the network terminal, also can in the ID mapping table, preserve the 2nd ID of the renewal front and back second dynamic key correspondence.
Wherein, N can examine the weighing apparatus value according to system safety requirement and performance.For example: N=10, and suppose that the pregenerated second dynamic key does not upgrade, then Ke Long the network terminal has 1/10 probability successfully to login.If N reaches certain numerical value, can think that then clone's the network terminal can not successfully be logined.
In the present embodiment, server is searched the ID mapping table according to an ID of the network terminal that obtains, obtain two ID corresponding from the ID mapping table, then, search dynamic key generation table in advance according to the 2nd ID with an ID, from dynamic key in advance the generation table obtain the second dynamic key corresponding with the 2nd ID, the first dynamic key of the second dynamic key and network terminal preservation is compared, if both unanimities, then authentication success, otherwise, authentification failure.
Step S103 when authentication success, obtains the second dynamic key at random the generation table in advance from this dynamic key, and deposits the 2nd ID of this second dynamic key correspondence in this ID mapping table;
When authentication success, server generates among N the second dynamic key the table one second dynamic key of picking at random in advance from dynamic key, and with dynamic key in advance in the generation table two ID corresponding with the second dynamic key of picking be kept in the ID mapping table.In the ID mapping table, the 2nd ID of the second dynamic key correspondence of picking is corresponding with an ID of the network terminal of above-mentioned login at random for this.
Step S104 sends to this network terminal with this second dynamic key, as the first new dynamic key of this network terminal, and with the 2nd ID of this second dynamic key correspondence authenticate key as this network terminal login next time.
In this step, the server second dynamic key of picking at random sends to the network terminal, preserve by the network terminal, the original first dynamic key that preserves of alternate network terminal, promptly use this second dynamic key as the first new dynamic key of this network terminal, so that authenticate during next network terminal logon server.This verification process is with step S102.
If the network terminal is not the network terminal of clone or personation, then when next network terminal logon server, the first dynamic key that the network terminal is preserved is consistent in the value that dynamic key generates second corresponding in the table dynamic key in advance with server.
As shown in Figure 2, above-mentioned steps S102 comprises:
Step S1021 obtains two ID corresponding with an ID from this ID mapping table;
Step S1022 obtains the second dynamic key corresponding with the 2nd ID the generation table in advance from this dynamic key;
Step S1023, if the second dynamic key and this first dynamic key that relatively should correspondence be both unanimities, then authentication success; Otherwise, authentification failure.
Compared to existing technology, the dynamic key of present embodiment by preserving in advance the second dynamic key that generates be the generation table in advance, make that the quantity of dynamic key is controlled, behind authentication success, server obtains one second dynamic key at random the generation table in advance from dynamic key and returns to the network terminal, and with the 2nd ID of this second dynamic key correspondence of returning key as network terminal authentication next time, thereby alleviated the server generation and preserved the frequent degree of dynamic key, alleviated the resource consumption of server greatly to hard disk.
With the Web TV is example, if total M platform Web TV access server, and the dynamic key of server generates the storehouse in advance and only generates the dynamic key of N bar (General N<M).When certain Web TV A access server, server 1 of picking at random from the dynamic key of N bar returns to Web TV A.Adopt this mode, alleviated server and generated and preserve the frequency of dynamic key, therefore alleviated the resource consumption of server greatly to hard disk.
As shown in Figure 3, another embodiment of the present invention proposes a kind of network terminal encryption and authentication method, on the basis of the foregoing description, also comprises before step S101:
Step S100, server generate the second dynamic key of predetermined quantity and deposit dynamic key in advance in the generation table, and make one the 2nd ID of each second dynamic key correspondence.
The difference of present embodiment and the foregoing description is: second of the predetermined quantity dynamic key is generated by server self in the present embodiment, and is kept at dynamic key generation table in advance, corresponding one the 2nd ID of each second dynamic key.
In a further embodiment, server can also upgrade dynamic key according to the predetermined refresh time interval and generates table in advance.Dynamic key is generated the authenticated used second dynamic key deletion in the table in advance, to increase network terminal authenticating safety.
Further, Web TV sends a notification message to server after receiving and also successfully preserving this second dynamic key.Simultaneously, the transmission number of times that server sends to the second dynamic key network terminal can also be set, to confirm whether the network terminal successfully receives and preserve this second dynamic key, such as, setting and sending number of times is three times, if surpass three times, the network terminal does not successfully receive and preserve this second dynamic key yet, then server does not upgrade the first dynamic key of the network terminal, and promptly the network terminal still keeps the first original dynamic key for next login authentication.
Present embodiment uses the mode of the pre-dynamic key of generation, has alleviated the number of times of writing hard disk, reduces the resource consumption of server write hard disk with this; Use the mode of the corresponding ID of dynamic key simultaneously, encryption key by the ID corresponding with dynamic key that the dynamic key of long data becomes short data, is further reduced the resource consumption of writing hard disk.
As shown in Figure 4, one embodiment of the invention proposes a kind of network terminal encrypting and authenticating server, comprising: first acquisition module 401, authentication module 402, first update module 403 and second update module 404;
Wherein:
First acquisition module 401, an ID and the first dynamic key when being used to obtain network terminal login;
Authentication module 402, be used for according to an ID, dynamically key generation table and ID mapping table authenticate the first dynamic key in advance;
First update module 403 is used for when authentication success, obtains the second dynamic key at random the generation table in advance from dynamic key, and deposits the 2nd ID of the second dynamic key correspondence in the ID mapping table;
Second update module 404 is used for the second dynamic key is sent to the network terminal, as the first new dynamic key of this network terminal, and with the 2nd ID of the second dynamic key correspondence authenticate key as this network terminal login next time.
In the present embodiment, when network terminal logon server, send log-on message, include the ID (being the alleged ID of present embodiment) of the network terminal and the dynamic key (being the present embodiment alleged first dynamic key) that preserves thereof in this log-on message to server.Each network terminal all has unique identify label the one ID, when the network terminal logon server first time, and the initial dynamically key that presets when the first dynamic key that the network terminal is preserved dispatches from the factory for this network terminal.
The log-on message that server first acquisition module 401 sends according to the network terminal gets access to an ID and the first dynamic key of this network terminal.
Server generates before network terminal login in advance in the present embodiment N the second dynamic key, and N is a natural number.Corresponding one the 2nd ID of each second dynamic key, the 2nd ID be as the unique identification of the second dynamic key, and the corresponding relation of the second dynamic key and the 2nd ID is kept at dynamic key in advance in the generation table; Simultaneously, server also is provided with the ID that comprises the network terminal and the ID mapping table of the corresponding relation between the 2nd ID.The one ID of each network terminal corresponding one with the 2nd corresponding ID of the second dynamic key, after the first dynamic key renewal of the follow-up preservation of the network terminal, also can in the ID mapping table, preserve the 2nd ID of the renewal front and back second dynamic key correspondence.
Wherein, N can examine the weighing apparatus value according to system safety requirement and performance.For example: N=10, and suppose that the pregenerated second dynamic key does not upgrade, then Ke Long the network terminal has 1/10 probability successfully to login.If N reaches certain numerical value, can think that then clone's the network terminal can not successfully be logined.
Authentication module 402 is searched the ID mapping table according to an ID of the network terminal that first acquisition module 401 obtains, obtain two ID corresponding from the ID mapping table with an ID, then, search dynamic key generation table in advance according to the 2nd ID, from dynamic key in advance the generation table obtain the second dynamic key corresponding with the 2nd ID, the first dynamic key that the second dynamic key and the network terminal are preserved compares, if both unanimities, authentication success then, otherwise, authentification failure.
When authentication success, first update module 403 generates among N the second dynamic key the table one second dynamic key of picking at random in advance from dynamic key, and with dynamic key in advance in the generation table two ID corresponding with the second dynamic key of picking be kept in the ID mapping table.In the ID mapping table, the 2nd ID of the second dynamic key correspondence of picking is corresponding with an ID of the network terminal of above-mentioned login at random for this.
Second update module 404, the second dynamic key of picking at random sends to the network terminal, preserve by the network terminal, the original first dynamic key that preserves of alternate network terminal, promptly use this second dynamic key as the first new dynamic key of this network terminal, so that authenticate during next network terminal logon server.This verification process is with step S102.
If the network terminal is not the network terminal of clone or personation, then when next network terminal logon server, the first dynamic key that the network terminal is preserved is consistent in the value that dynamic key generates second corresponding in the table dynamic key in advance with server.
Further, when second update module 404 also is used for the transmission number of times that the second dynamic key sends to the network terminal surpassed pre-determined number and this network terminal and successfully do not preserve the second dynamic key, do not upgrade the first dynamic key of the network terminal.
As shown in Figure 5, authentication module 402 comprises: the 2nd ID acquiring unit 4021, second dynamic key acquiring unit 4022 and the authentication ' unit 4023, wherein:
The 2nd ID acquiring unit 4021 is used for obtaining two ID corresponding with an ID from the ID mapping table;
The second dynamic key acquiring unit 4022, be used for from dynamic key in advance the generation table obtain the second dynamic key corresponding with the 2nd ID;
Authentication ' unit 4023 is used for the second dynamic key and the described first dynamic key of comparison correspondence, if both unanimities, then authentication success; Otherwise, authentification failure.
As shown in Figure 6, another embodiment of the present invention proposes a kind of network terminal encrypting and authenticating server, on the basis of the foregoing description, also comprises:
Generation module 400 is connected with first acquisition module 401, is used for generating the second dynamic key of predetermined quantity and depositing described dynamic key generation table in advance in, and makes corresponding one the 2nd ID of each second dynamic key.
Further, generation module 400 also is used for upgrading dynamic key generation table in advance according to the predetermined refresh time interval.
The difference of present embodiment and the foregoing description is: second of the predetermined quantity dynamic key is generated by server generation module 400 in the present embodiment, and is kept at dynamic key generation table in advance, corresponding one the 2nd ID of each second dynamic key.
In a further embodiment, server generation module 400 can also upgrade dynamic key according to the predetermined refresh time interval and generates table in advance.Dynamic key is generated the authenticated used second dynamic key deletion in the table in advance, to increase network terminal authenticating safety.
Further, Web TV sends a notification message to server after receiving and also successfully preserving this second dynamic key.Simultaneously, the transmission number of times that server sends to the second dynamic key network terminal can also be set, to confirm whether the network terminal successfully receives and preserve this second dynamic key, such as, setting and sending number of times is three times, if surpass three times, the network terminal does not successfully receive and preserve this second dynamic key yet, then server second update module 404 is not upgraded the first dynamic key of the network terminal, and promptly the network terminal still keeps the first original dynamic key for next login authentication.
Present embodiment uses the mode of the pre-dynamic key of generation, has alleviated the number of times of writing hard disk, reduces the resource consumption of server write hard disk with this; Use the mode of the corresponding ID of dynamic key simultaneously, encryption key by the ID corresponding with dynamic key that the dynamic key of long data becomes short data, is further reduced the resource consumption of writing hard disk.
The above only is the preferred embodiments of the present invention; be not so limit claim of the present invention; every equivalent structure or flow process conversion that utilizes specification of the present invention and accompanying drawing content to be done; or directly or indirectly be used in other relevant technical field, all in like manner be included in the scope of patent protection of the present invention.

Claims (11)

1. a network terminal encryption and authentication method is characterized in that, may further comprise the steps:
An ID and the first dynamic key when server obtains network terminal login;
According to a described ID, dynamically key generation table and ID mapping table authenticate the described first dynamic key in advance;
When authentication success, obtain the second dynamic key at random the generation table in advance from described dynamic key, and deposit the 2nd ID of the described second dynamic key correspondence in described ID mapping table;
The described second dynamic key is sent to the described network terminal, as the first new dynamic key of this network terminal, and with the 2nd ID of the described second dynamic key correspondence authenticate key as this network terminal login next time.
2. method according to claim 1 is characterized in that, described dynamic key generation table in advance comprises corresponding relation between the described second dynamic key and described the 2nd ID; Described ID mapping table comprises an ID of the described network terminal and the corresponding relation between described the 2nd ID.
3. method according to claim 2 is characterized in that, described according to an ID, dynamically key in advance generation table and ID mapping table the step that the described first dynamic key authenticates is comprised:
From described ID mapping table, obtain two ID corresponding with a described ID;
Obtain the second dynamic key corresponding the generation table in advance from described dynamic key with described the 2nd ID;
If the second dynamic key of more described correspondence and the described first dynamic key are both unanimities, then authentication success; Otherwise, authentification failure.
4. according to claim 1,2 or 3 described methods, it is characterized in that described server also comprised obtain the step of the ID of the described network terminal and the first dynamic key when the network terminal is logined before:
Generate the second dynamic key of predetermined quantity and deposit described dynamic key in advance in the generation table, and make one the 2nd ID of each second dynamic key correspondence.
5. method according to claim 4 is characterized in that, also comprises: upgrade described dynamic key according to the predetermined refresh time interval and generate table in advance.
6. method according to claim 1 is characterized in that, also comprises:
The transmission number of times that the described second dynamic key is sent to the described network terminal at server surpasses pre-determined number and this network terminal when successfully not preserving the described second dynamic key, does not upgrade the first dynamic key of the described network terminal.
7. a network terminal encrypting and authenticating server is characterized in that, comprising:
First acquisition module, an ID and the first dynamic key when being used to obtain network terminal login;
Authentication module, be used for according to a described ID, dynamically key generation table and ID mapping table authenticate the described first dynamic key in advance;
First update module is used for when authentication success, obtains the second dynamic key at random the generation table in advance from described dynamic key, and deposits the 2nd ID of the described second dynamic key correspondence in described ID mapping table;
Second update module is used for the described second dynamic key is sent to the described network terminal, as the first new dynamic key of this network terminal, and with the 2nd ID of the described second dynamic key correspondence authenticate key as this network terminal login next time.
8. server according to claim 7 is characterized in that, described authentication module comprises:
The 2nd ID acquiring unit is used for obtaining two ID corresponding with a described ID from described ID mapping table;
The second dynamic key acquiring unit, be used for from described dynamic key in advance the generation table obtain the second dynamic key corresponding with described the 2nd ID;
Authentication ' unit is used for the second dynamic key and the described first dynamic key of more described correspondence, if both unanimities, then authentication success; Otherwise, authentification failure.
9. according to claim 7 or 8 described servers, it is characterized in that, also comprise:
Generation module is used for generating the second dynamic key of predetermined quantity and depositing described dynamic key generation table in advance in, and makes corresponding one the 2nd ID of each second dynamic key.
10. server according to claim 9 is characterized in that, described generation module also is used for upgrading described dynamic key generation table in advance according to the predetermined refresh time interval.
11. server according to claim 7, it is characterized in that, when described second update module also is used for the transmission number of times that the described second dynamic key sends to the described network terminal surpassed pre-determined number and this network terminal and successfully do not preserve the described second dynamic key, do not upgrade the first dynamic key of the described network terminal.
CN201110122357.3A 2011-05-12 2011-05-12 network terminal encryption authentication method and server Expired - Fee Related CN102195983B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110122357.3A CN102195983B (en) 2011-05-12 2011-05-12 network terminal encryption authentication method and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110122357.3A CN102195983B (en) 2011-05-12 2011-05-12 network terminal encryption authentication method and server

Publications (2)

Publication Number Publication Date
CN102195983A true CN102195983A (en) 2011-09-21
CN102195983B CN102195983B (en) 2015-08-19

Family

ID=44603370

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110122357.3A Expired - Fee Related CN102195983B (en) 2011-05-12 2011-05-12 network terminal encryption authentication method and server

Country Status (1)

Country Link
CN (1) CN102195983B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102882848A (en) * 2012-08-28 2013-01-16 深圳Tcl新技术有限公司 Login system and method
CN109600354A (en) * 2017-09-30 2019-04-09 优仕达资讯股份有限公司 Network identity validation System and method for
CN112601219A (en) * 2021-03-03 2021-04-02 四川微巨芯科技有限公司 Data encryption and decryption method and system, server, storage device and mobile device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002353959A (en) * 2001-05-30 2002-12-06 Nec Corp System, method and program for authentication
CN1768502A (en) * 2002-06-19 2006-05-03 安全通信公司 Inter-authentication method and device
CN101291228A (en) * 2008-06-18 2008-10-22 华为技术有限公司 Generating, authenticating method for super code, system and device thereof
CN101611631A (en) * 2007-02-12 2009-12-23 索尼株式会社 Use the key list of storage to carry out packaged media encryption
CN101697540A (en) * 2009-10-15 2010-04-21 浙江大学 Method for authenticating user identity through P2P service request

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002353959A (en) * 2001-05-30 2002-12-06 Nec Corp System, method and program for authentication
CN1768502A (en) * 2002-06-19 2006-05-03 安全通信公司 Inter-authentication method and device
CN101611631A (en) * 2007-02-12 2009-12-23 索尼株式会社 Use the key list of storage to carry out packaged media encryption
CN101291228A (en) * 2008-06-18 2008-10-22 华为技术有限公司 Generating, authenticating method for super code, system and device thereof
CN101697540A (en) * 2009-10-15 2010-04-21 浙江大学 Method for authenticating user identity through P2P service request

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102882848A (en) * 2012-08-28 2013-01-16 深圳Tcl新技术有限公司 Login system and method
CN109600354A (en) * 2017-09-30 2019-04-09 优仕达资讯股份有限公司 Network identity validation System and method for
CN112601219A (en) * 2021-03-03 2021-04-02 四川微巨芯科技有限公司 Data encryption and decryption method and system, server, storage device and mobile device

Also Published As

Publication number Publication date
CN102195983B (en) 2015-08-19

Similar Documents

Publication Publication Date Title
CN106330850B (en) Security verification method based on biological characteristics, client and server
CN101605108B (en) Method, system and apparatus for instant communication
US8180054B2 (en) Authenticating system, authenticating method, and authenticating program
CN101159715B (en) Safety information checking method and safety information checking device and client terminal
US8910254B2 (en) System and methods for profiling client devices
US20120254622A1 (en) Secure Access to Electronic Devices
US9544769B2 (en) Method for providing application service
CN108632241B (en) Unified login method and device for multiple application systems
CN103491084A (en) Authentication processing method and device of client side
CN101179382B (en) Login method and system
CN104320389A (en) Fusion identify protection system and fusion identify protection method based on cloud computing
US20170279706A1 (en) Link processing method, apparatus, and system
CN101552780B (en) Verification method and verification device
CN105072608B (en) A kind of method and device of administrative authentication token
CN102801713A (en) Website logging-in method and system as well as accessing management platform
CN102143131A (en) User logout method and authentication server
CN102833276A (en) Webpage login system based on token
CN101557403A (en) Website login method, device and system
CN111988275A (en) Single sign-on method, single sign-on server cluster and electronic equipment
CN102970308A (en) User authentication method and server
US9621349B2 (en) Apparatus, method and computer-readable medium for user authentication
CN105338525B (en) Log in access processing method, apparatus and system
CN102769629A (en) Client-side password storage method and service system
CN113992408B (en) Multi-system unified login information processing method and system
CN102195983A (en) Network terminal encryption authentication method and server

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20150819