CN104219228B - A kind of user's registration, user identification method and system - Google Patents

A kind of user's registration, user identification method and system Download PDF

Info

Publication number
CN104219228B
CN104219228B CN201410405307.XA CN201410405307A CN104219228B CN 104219228 B CN104219228 B CN 104219228B CN 201410405307 A CN201410405307 A CN 201410405307A CN 104219228 B CN104219228 B CN 104219228B
Authority
CN
China
Prior art keywords
server
symmetrical
password
encryption
login password
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410405307.XA
Other languages
Chinese (zh)
Other versions
CN104219228A (en
Inventor
李强
李晓东
刘�东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Changhong Electric Co Ltd
Original Assignee
Sichuan Changhong Electric Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Changhong Electric Co Ltd filed Critical Sichuan Changhong Electric Co Ltd
Priority to CN201410405307.XA priority Critical patent/CN104219228B/en
Publication of CN104219228A publication Critical patent/CN104219228A/en
Application granted granted Critical
Publication of CN104219228B publication Critical patent/CN104219228B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses a kind of user's registration, user identification method and system, it is desirable to provide a kind of client registers and user identification method of the encryption based on http agreements.Technical key point:Including:Step 1:User name and password are encrypted using symmetrical enciphering and deciphering algorithm for client;Step 2:User name after encryption and password are transferred to server by client according to http agreements;Step 3:The user name and password that receive are decrypted the symmetrical enciphering and deciphering algorithm of server by utilizing;Whether the user name there is in searching data storehouse, if being not present, the server then public key encryption using symmetrical enciphering and deciphering algorithm to succeed in registration information and a rivest, shamir, adelman, while to its database write access customer name and password;If in the presence of if using the symmetrical enciphering and deciphering algorithm to the registration failure information of return is encrypted;Step 4:The encryption information that execution step 3 obtains is transferred to client etc. by server according to http agreements.

Description

A kind of user's registration, user identification method and system
Technical field
It is especially a kind of based on the client registers of encryption technology and user's identification side the present invention relates to network security technology Method.
Background technology
For common cloud computing platform when identifying user, the mode of generally use is to use HTTPS agreements, and it ensure that end Information transfer between end and server is to encrypt, be safe.But this technology is for terminals such as intelligent television, intelligent air conditions For equipment, just less it is adapted to.Because for the application APP fields of household electrical appliances, HTTPS agreements have disadvantages that.Mainly have:
1)HTTPS agreements need CA to apply for certificate, and certificate is all charge, and which increase the cost of terminal.
2)HTTPS is the SSL encryption host-host protocol for having security, and compared with http protocol, it is to network bandwidth resources Consumption it is much greater.
3)It adds the loss of server resource, it is necessary to which more hardware servers, also increase the service of producer Cost.
That is, if a server is originally using http protocol for multiple client connection, the client of support Connection number can reach 3000, and use HTTPS agreements to be connected for multiple client, and the client connection number of support can only achieve More than 600.Therefore if a certain producer needs to support the access of 1,000,000 numbers of users, it is necessary to configure more servers.
The content of the invention
It can be seen that https agreements although can guarantee that the information transmission security between terminal and server but cost is too late Information transfer cost based on http agreements is low.The problem of existing for this, the present invention provide a kind of based on http agreements The client registers and user identification method of encryption.
Present invention employs following technical scheme:
A kind of user registering method, it is characterised in that client on server with including the symmetrical encryption and decryption of identical Algorithm, including:
Step 1:User name and password are encrypted using the symmetrical enciphering and deciphering algorithm for client;
Step 2:User name after encryption and password are transferred to server by client according to http agreements;
Step 3:The user name and password that receive are decrypted symmetrical enciphering and deciphering algorithm described in server by utilizing;Search Whether the user name there is in the database of server, if being not present, server is first with rivest, shamir, adelman This user produces a public private key pair, using the symmetrical enciphering and deciphering algorithm to by return succeed in registration information and the public key enters Row encryption, while server writes user name, password and the private key to its database;If in the presence of server then utilizes The symmetrical enciphering and deciphering algorithm is to the registration failure information of return is encrypted;
Step 4:The encryption information that execution step 3 obtains is transferred to client by server according to http agreements;
Step 5:The information that client is returned using the symmetrical enciphering and deciphering algorithm to server is decrypted, and is registered Successful information and the public key obtain registration failure information;
The public key is used for client in login service device to encrypting its log-on message before server transport log-on message.
Further, in the step 5, what client received is registration failure information, then repeats step 1 ~ 5, directly To succeeding in registration.
Further, in the step 3, server is writing the password of client the specific method bag of the database Include:First with irreversible encryption algorithm calculate the client password cryptographic Hash and by plus salt algorithm, then by the Hash Value is together with the user name, private key character string plus salt character string write into Databasce.
Present invention also offers a kind of user identification method, client symmetrically adds solution with including identical on server Close algorithm, including:
Step 1:User name and login password are encrypted using the symmetrical enciphering and deciphering algorithm for client;
Step 2:User name after encryption and login password are transferred to server by client according to http agreements;
Step 3:The user name and login password that receive are decrypted symmetrical enciphering and deciphering algorithm described in server by utilizing; Then the corresponding login password of user name described in the database of obtained login password with server will be decrypted to be contrasted, if Identical, server is generated a random key and then entered using the symmetrical enciphering and deciphering algorithm to logining successfully information and random key Row encryption;If differing, then login failure information is encrypted using the symmetrical enciphering and deciphering algorithm for server;
Step 4:The encryption information that execution step 3 obtains is transferred to client by server according to http agreements;
Step 5:The information that client is returned using the symmetrical enciphering and deciphering algorithm to server is decrypted, and is logged in Successful information and the random key obtain login failure information;
The random key is that client is served by required checking password using what server provided.
Further, step 1 further comprises:Login password is encrypted the public key that client obtains first with registration, Then the symmetrical enciphering and deciphering algorithm is reused the login password after user name and asymmetric encryption is encrypted;
Accordingly, step 3 further comprises:Symmetrical enciphering and deciphering algorithm described in server by utilizing is carried out to the information received Decryption, obtains the login password after user name and public key encryption;Server recycles private corresponding to user name described in database Key is decrypted to the login password after the public key encryption, obtains login password;Server and then the login password for obtaining decryption The corresponding login password of user name described in database with server is contrasted, if identical, server generation one is with secret Key is simultaneously then encrypted using the symmetrical enciphering and deciphering algorithm to logining successfully information and random key;If differing, server Then login failure information is encrypted using the symmetrical enciphering and deciphering algorithm.
Further, all user names to succeed in registration, and its corresponding login password are stored with the database of server Cryptographic Hash, the cryptographic Hash of the login password using irreversible encryption algorithm by calculating what login password obtained;
Step 3 further comprises:The information received is decrypted symmetrical enciphering and deciphering algorithm described in server by utilizing, obtains Login password to after user name and public key encryption;Server recycles private key corresponding to user name described in database to described Login password decryption after public key encryption, obtains login password;Server and then the cryptographic Hash that obtained login password will be decrypted The cryptographic Hash of the corresponding login password of user name described in database with server is contrasted, if identical, server generation One random key is simultaneously encrypted using the symmetrical enciphering and deciphering algorithm to logining successfully information and random key;If differing, Then login failure information is encrypted using the symmetrical enciphering and deciphering algorithm for server.
The corresponding above method, present invention also offers the client floppy disk system that a kind of user logs in, including:
Symmetrical encryption module, for user name and login password to be encrypted using symmetrical enciphering and deciphering algorithm;
Information sending module, for the information transfer after symmetrical encryption module is encrypted according to http agreements to server;
And symmetrical deciphering module, the information for being returned using the symmetrical enciphering and deciphering algorithm to server are solved It is close, obtain logining successfully information and the random key or obtain login failure information;
The random key is that client is served by required checking password using what server provided.
Further, in addition to:
Asymmetric encryption module, for the login password to be encrypted using the public key obtained when registering;
Accordingly, after the symmetrical encryption module is used to utilize the symmetrical enciphering and deciphering algorithm to user name and public key encryption Login password be encrypted.
A kind of server floppy disk system for identifying user, including:
Symmetrical deciphering module, for being solved using symmetrical enciphering and deciphering algorithm to the user name and login password that receive It is close;
Log-on message authentication module, for user name described in the database of obtained login password and server will to be decrypted Corresponding login password is contrasted, if identical, generates a random key, by the random key and logins successfully information friendship By symmetrical encryption module, if differing, login failure information is transferred into symmetrical encryption module;
Symmetrical encryption module, for using the symmetrical enciphering and deciphering algorithm to described in the output of log-on message authentication module with Secret key and login successfully information or log-on message authentication module output login failure information be encrypted;
Information sending module, for the symmetrical encryption module to be encrypted into obtained information transfer to visitor according to http agreements Family end;
The random key is that client is served by required checking password using what server provided.
Further, in addition to asymmetric deciphering module, all succeed in registration and is stored with the database of server The cryptographic Hash of user name and its corresponding login password, the cryptographic Hash of the login password using irreversible encryption algorithm by being calculated What login password obtained;
The symmetrical deciphering module is used for using the symmetrical enciphering and deciphering algorithm to the user name and public key encryption that receive Login password be decrypted, obtain the login password of user name and public key encryption;
The asymmetric deciphering module is used for using private key corresponding to user name described in database to the public key encryption Login password decryption afterwards, obtains login password;
Irreversible encryption module, for calculating the cryptographic Hash of the login password after decryption using irreversible encryption algorithm;
Log-on message authentication module, for institute in the obtained cryptographic Hash of login password and the database of server will to be decrypted The cryptographic Hash for stating login password corresponding to user name is contrasted, if identical, generates a random key, by the random key And login successfully information and then transfer to the symmetrical encryption module, if differing, by login failure information transfer to it is described symmetrical plus Close module.
In summary, by adopting the above-described technical solution, the beneficial effects of the invention are as follows:
1. because the information that client and server are sent in the present invention is all by encryption, even if transmitting information from biography Illegally stolen in defeated channel, can not also crack the plaintext of transmission information, realize the user information safety based on http agreements and recognize Card, while remain the low-cost advantage of http agreements.
2. in the user identification method in the present invention, rivest, shamir, adelman and irreversible encryption has also further been used to calculate Method, it more ensure that the reliability of certification.
Brief description of the drawings
Examples of the present invention will be described by way of reference to the accompanying drawings, wherein:
Fig. 1 is the flow chart of user registering method one embodiment in the present invention.
Fig. 2 is the flow chart of user login method one embodiment in the present invention.
Embodiment
All features disclosed in this specification, or disclosed all methods or during the step of, except mutually exclusive Feature and/or step beyond, can combine in any way.
Any feature disclosed in this specification, unless specifically stated otherwise, can be equivalent by other or with similar purpose Alternative features are replaced.I.e., unless specifically stated otherwise, each feature is an example in a series of equivalent or similar characteristics .
First embodiment:
Such as Fig. 1, a kind of user registering method, client with including the symmetrical enciphering and deciphering algorithm of identical on server, And both sides follow http communication protocols, including:
Step 1:User name and password are encrypted using the symmetrical enciphering and deciphering algorithm for client;
Step 2:User name after encryption and password are transferred to server by client according to http agreements;
Step 3:The user name and password that receive are decrypted symmetrical enciphering and deciphering algorithm described in server by utilizing;Search Whether the user name there is in the database of server, if being not present, server is then using rivest, shamir, adelman This user produces the key pair of a public/private keys, and symmetrical enciphering and deciphering algorithm described in server by utilizing is to by the note of return Volume successful information and the public key are encrypted, while server writes user name, password and the private to database Key;If in the presence of server is then using the symmetrical enciphering and deciphering algorithm to the registration failure information of return is encrypted;
Step 4:The encryption information that execution step 3 obtains is transferred to client by server according to http agreements;
Step 5:The information that client is returned using the symmetrical enciphering and deciphering algorithm to server is decrypted, and is registered Successful information and the public key obtain registration failure information.
The symmetrical enciphering and deciphering algorithm can be any one existing algorithm, and rivest, shamir, adelman can be existing , the rivest, shamir, adelman is located on server, there is provided a pair of public keys and private key, private key is stored with server, by public affairs Key is distributed to the user to succeed in registration, and subsequent user can utilize the log-on messages such as the public key encryption login password.
In another embodiment, in the step 5, when what client received is registration failure information, repeats and perform Step 1 ~ 5, until succeeding in registration.
Further, in the step 3, server is writing the password of client the specific method bag of the database Include:The cryptographic Hash of the client password is calculated first with irreversible encryption algorithm, then by the cryptographic Hash together with the user Name, private key write into Databasce together.
In other embodiments, the cryptographic Hash of the login password is by using irreversible encryption algorithm, such as SHA-1 algorithms, Like this, even internal operation/operation maintenance personnel can not also obtain the plaintext of password from database, so as to protect account Safety.More it is difficult to crack in order that obtaining the ciphertext that irreversible encryption algorithm is calculated, can also simultaneously uses plus salt is calculated Method.Now, in the step 3, server includes in the specific method that the password of client is write to the database:First profit The cryptographic Hash of the client password is calculated with irreversible encryption algorithm, reuses plus cryptographic Hash and one is added salt figure group by salt algorithm It is combined to obtain a string of character strings, then together with the user name, the private key and adds salt figure to write the character string Enter database.
Second embodiment:
Such as Fig. 2, user is such by user name and login password login service device, detailed process after registration: First, the symmetrical enciphering and deciphering algorithm of identical is included on client and server, including:
Step 1:User name and login password are encrypted using the symmetrical enciphering and deciphering algorithm for client;
Step 2:User name after encryption and login password are transferred to server by client according to http agreements;
Step 3:The user name and login password that receive are decrypted symmetrical enciphering and deciphering algorithm described in server by utilizing; Then the corresponding login password of user name described in the database of obtained login password with server will be decrypted to be contrasted, if Identical, server is generated a random key and carried out using the symmetrical enciphering and deciphering algorithm to logining successfully information and random key Encryption;If differing, then login failure information is encrypted using the symmetrical enciphering and deciphering algorithm for server;
Step 4:The encryption information that execution step 3 obtains is transferred to client by server according to http agreements;
Step 5:The information that client is returned using the symmetrical enciphering and deciphering algorithm to server is decrypted, and is logged in Successful information and the random key obtain login failure information;
The random key is that client is served by required checking password in short-term using what server provided.Service User name and random key are stored in internal memory or high-speed processing apparatus by device(Such as SSD)In, and it is effective for random key setting Time(Such as 8 hours effectively).After user takes random key, user name and random need to be only used in the random key valid period Key is logged in and is served by using what server provided, without going to log in public key encryption password, both ensure that information security It in turn simplify the logging program of user.Symmetric encipherment algorithm in the present embodiment is as in first embodiment, random cipher It can be one group of random number.
In other embodiments, in step 5 after client receives the information of login failure, can repeat step 1 ~ 5。
3rd embodiment:
The present embodiment is improved step 1 wherein, 3 on the basis of second embodiment.
Step 1 further comprises:Login password is encrypted the public key obtained when client is first with registration, Ran Houzai The login password after user name and public key encryption is encrypted using the symmetrical enciphering and deciphering algorithm;
Accordingly, step 3 further comprises:The information received is decrypted using the symmetrical enciphering and deciphering algorithm To user name and the ciphertext of login password;Then private key corresponding to user name described in database will be used to decrypt the ciphertext, The login password of user is obtained, will decrypt that user name described in the database of obtained login password with server is corresponding to be stored Login password is contrasted, if identical, then it represents that user logins successfully, and server generates a random key and then using described right Enciphering and deciphering algorithm is claimed to be encrypted to logining successfully information and random key;If differing, server is then symmetrically added using described Login failure information is encrypted decipherment algorithm.
Fourth embodiment:
In order to further ensure that the safety of login password, the present embodiment has done further excellent on the basis of 3rd embodiment Change.
All user names to succeed in registration and its cryptographic Hash of corresponding login password are stored with the database of server, The cryptographic Hash of the login password, such as SHA-1 algorithms, calculates what login password obtained by using irreversible encryption algorithm.So If, even internal operation/operation maintenance personnel can not also obtain the plaintext of password from database, so as to protect the peace of account Entirely.
Step 3 further comprises:The information received is decrypted symmetrical enciphering and deciphering algorithm described in server by utilizing, obtains Login password to after user name and public key encryption;Server recycles private key corresponding to user name described in database to described Login password after public key encryption is decrypted, and obtains login password;Server recycles irreversible encryption algorithm to calculate decryption Login password afterwards obtains a cryptographic Hash, and by user name described in the database of the cryptographic Hash with server it is corresponding log in it is close The cryptographic Hash of code is contrasted, if identical, server generates a random key and then using the symmetrical enciphering and deciphering algorithm to stepping on Record successful information and random key are encrypted;If differing, server is then lost using the symmetrical enciphering and deciphering algorithm to logging in Information is lost to be encrypted.
Symmetric encipherment algorithm is easy to be cracked, and the rivest, shamir, adelman of public/private keys is not easy to crack, in reality In, make server regular(Such as every half a year)The key pair of a public/private keys is changed, effectively prevents from artificially divulging a secret.
More safely may be used in order that the irreversible encryption algorithm in the present embodiment calculates the cryptographic Hash that login password obtains Lean on, can also simultaneously use and add salt algorithm.So step 3 further comprises:Symmetrical enciphering and deciphering algorithm pair described in server by utilizing The information received is decrypted, and obtains the login password after user name and public key encryption;Server recycles institute in database State private key corresponding to user name the login password after the public key encryption is decrypted, obtain login password;Server is sharp again The cryptographic Hash of the login password after decryption is calculated with irreversible encryption, reuses plus salt algorithm will be somebody's turn to do in the cryptographic Hash and database Corresponding to user name plus salt figure is combined computing and obtains a character string, will be used described in the database of the character string and server Character string is contrasted corresponding to name in an account book, if identical, server is generated a random key and then calculated using the symmetrical encryption and decryption Method is encrypted to logining successfully information and random key;If differing, server then utilizes the symmetrical enciphering and deciphering algorithm pair Login failure information is encrypted.
The invention is not limited in foregoing embodiment.The present invention, which expands to, any in this manual to be disclosed New feature or any new combination, and disclose any new method or process the step of or any new combination.

Claims (9)

1. a kind of user registering method, it is characterised in that client is calculated with including the symmetrical encryption and decryption of identical on server Method, including:
Step 1:User name and password are encrypted using the symmetrical enciphering and deciphering algorithm for client;
Step 2:User name after encryption and password are transferred to server by client according to http agreements;
Step 3:The user name and password that receive are decrypted symmetrical enciphering and deciphering algorithm described in server by utilizing;Search service Whether the user name there is in the database of device, if being not present, server is used first with rivest, shamir, adelman for this Family produces a public private key pair, using the symmetrical enciphering and deciphering algorithm to by return succeed in registration information and public key is encrypted, Server writes user name, password and the private key to its database simultaneously;If in the presence of server is then using described symmetrical Enciphering and deciphering algorithm is to the registration failure information of return is encrypted;
Step 4:The encryption information that execution step 3 obtains is transferred to client by server according to http agreements;
Step 5:The information that client is returned using the symmetrical enciphering and deciphering algorithm to server is decrypted, and is succeeded in registration Information and the public key obtain registration failure information;
The public key is used for client in login service device to encrypting its log-on message before server transport log-on message.
2. a kind of user registering method according to claim 1, it is characterised in that in the step 5, client receives Be registration failure information, then step 1 ~ 5 are repeated, until succeeding in registration.
A kind of 3. user registering method according to claim 1 or 2, it is characterised in that in the step 3, server Include in the specific method that the password of client is write to the database:The client is calculated first with irreversible encryption algorithm The cryptographic Hash of password is held, then by the cryptographic Hash together with the user name write into Databasce.
4. a kind of user identification method, it is characterised in that client is calculated with including the symmetrical encryption and decryption of identical on server Method, including:
Step 1:User name and login password are encrypted using the symmetrical enciphering and deciphering algorithm for client;
Step 2:User name after encryption and login password are transferred to server by client according to http agreements;
Step 3:The user name and login password that receive are decrypted symmetrical enciphering and deciphering algorithm described in server by utilizing;Then The corresponding login password of user name described in the database of obtained login password with server will be decrypted to be contrasted, if phase Together, server is generated a random key and added using the symmetrical enciphering and deciphering algorithm to logining successfully information and random key It is close;If differing, then login failure information is encrypted using the symmetrical enciphering and deciphering algorithm for server;
Step 4:The encryption information that execution step 3 obtains is transferred to client by server according to http agreements;
Step 5:The information that client is returned using the symmetrical enciphering and deciphering algorithm to server is decrypted, and is logined successfully Information and the random key obtain login failure information;
The random key is that client is served by required checking password using what server provided.
5. a kind of user identification method according to claim 4, it is characterised in that step 1 further comprises:Client is first Login password is encrypted using registration obtained public key, then reuses the symmetrical enciphering and deciphering algorithm to user name and non- Login password after symmetric cryptography is encrypted;
Accordingly, step 3 further comprises:Symmetrical enciphering and deciphering algorithm solves to the information received described in server by utilizing It is close, obtain the login password after user name and public key encryption;Server recycles private key corresponding to user name described in database Login password after the public key encryption is decrypted, obtains login password;Server then will decrypt obtained login password with Login password corresponding to user name is contrasted described in the database of server, if identical, server generates a random key And it is encrypted using the symmetrical enciphering and deciphering algorithm to logining successfully information and random key;If differing, server is then sharp Login failure information is encrypted with the symmetrical enciphering and deciphering algorithm.
6. a kind of user identification method according to claim 5, it is characterised in that stored in the database of server There are the user name to succeed in registration, and its cryptographic Hash of corresponding login password, the cryptographic Hash of the login password can not by use Reverse encryption algorithm calculates what login password obtained;
Step 3 further comprises:The information received is decrypted symmetrical enciphering and deciphering algorithm described in server by utilizing, is used Login password after name in an account book and public key encryption;Server recycles private key corresponding to user name described in database to the public key Login password decryption after encryption, obtains login password;Server and then the cryptographic Hash and clothes that obtained login password will be decrypted Be engaged in device database described in the cryptographic Hash of login password corresponding to user name contrasted, if identical, server generation one with Secret key is simultaneously encrypted using the symmetrical enciphering and deciphering algorithm to logining successfully information and random key;If differing, service Then login failure information is encrypted using the symmetrical enciphering and deciphering algorithm for device.
A kind of 7. FTP client FTP that user logs in, it is characterised in that including:
Symmetrical encryption module, for user name and login password to be encrypted using symmetrical enciphering and deciphering algorithm;
Information sending module, for the information transfer after symmetrical encryption module is encrypted according to http agreements to server;
And symmetrical deciphering module, the information for being returned using the symmetrical enciphering and deciphering algorithm to server are decrypted, obtained To logining successfully information and random key or obtain login failure information;
The random key is that client is served by required checking password using what server provided,
Also include asymmetric encryption module, for the login password to be encrypted using the public key obtained when registering,
Accordingly, the symmetrical encryption module is used for using the symmetrical enciphering and deciphering algorithm to stepping on after user name and public key encryption Record password is encrypted.
A kind of 8. server system for identifying user, it is characterised in that including:
Symmetrical deciphering module, for the user name and login password that receive to be decrypted using symmetrical enciphering and deciphering algorithm;
Log-on message authentication module, it is corresponding for user name described in database of the obtained login password with server will to be decrypted Login password contrasted, if identical, generate a random key, by the random key and login successfully information and transfer to pair Claim encrypting module, if differing, login failure information is transferred into symmetrical encryption module;
Symmetrical encryption module, for using the symmetrical enciphering and deciphering algorithm to described in the output of log-on message authentication module with secret Key and login successfully information or log-on message authentication module output login failure information be encrypted;
Information sending module, for the information transfer encrypting to obtain by the symmetrical encryption module according to http agreements to client End;
The random key is that client is served by required checking password using what server provided.
9. a kind of server system for identifying user according to claim 8, it is characterised in that also including asymmetric decryption The Hash of all user names to succeed in registration and its corresponding login password is stored with module, and the database of server Value, the cryptographic Hash of the login password using irreversible encryption algorithm by calculating what login password obtained;
The symmetrical deciphering module is used for the stepping on to the user name that receives and public key encryption using the symmetrical enciphering and deciphering algorithm Record password is decrypted, and obtains the login password of user name and public key encryption;
After the asymmetric deciphering module is used for using private key is to the public key encryption corresponding to user name described in database Login password is decrypted, and obtains login password;
Irreversible encryption module, for calculating the cryptographic Hash of the login password after decryption using irreversible encryption algorithm;
Log-on message authentication module, used for will decrypt described in the obtained cryptographic Hash of login password and the database of server The cryptographic Hash of login password corresponding to name in an account book is contrasted, if identical, generates a random key, by the random key and is stepped on Record successful information then transfers to the symmetrical encryption module, if differing, login failure information is transferred into the symmetric cryptography mould Block.
CN201410405307.XA 2014-08-18 2014-08-18 A kind of user's registration, user identification method and system Active CN104219228B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410405307.XA CN104219228B (en) 2014-08-18 2014-08-18 A kind of user's registration, user identification method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410405307.XA CN104219228B (en) 2014-08-18 2014-08-18 A kind of user's registration, user identification method and system

Publications (2)

Publication Number Publication Date
CN104219228A CN104219228A (en) 2014-12-17
CN104219228B true CN104219228B (en) 2018-01-02

Family

ID=52100362

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410405307.XA Active CN104219228B (en) 2014-08-18 2014-08-18 A kind of user's registration, user identification method and system

Country Status (1)

Country Link
CN (1) CN104219228B (en)

Families Citing this family (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104580248A (en) * 2015-01-27 2015-04-29 中復保有限公司 Secured logon method for variable secret key encryption under HTTP
CN106549920B (en) * 2015-09-21 2021-06-01 华为终端有限公司 Login information input method, login information storage method and related device
CN106559378B (en) * 2015-09-24 2020-05-01 联芯科技有限公司 Automobile door lock unlocking device, system and method and intelligent terminal
CN107404469B (en) * 2016-05-20 2021-02-19 阿里巴巴(中国)有限公司 Session safety processing system, device, apparatus and method
CN107786326A (en) * 2016-08-25 2018-03-09 大连楼兰科技股份有限公司 Apply the sharing method in the verification of car networking dynamic password
CN107786338B (en) * 2016-08-25 2021-04-27 大连楼兰科技股份有限公司 Shared platform in dynamic password verification
CN106355106A (en) * 2016-08-30 2017-01-25 深圳市引导美电子商务有限公司 Account information storing method and system
CN106788993A (en) * 2016-12-02 2017-05-31 乐视控股(北京)有限公司 A kind of encryption communication method, device and electronic equipment
CN106533677B (en) * 2016-12-30 2019-09-17 四川九洲电器集团有限责任公司 A kind of user login method, user terminal and server
CN107733635B (en) * 2017-11-29 2020-10-09 四川长虹电器股份有限公司 Data security transmission method based on gateway
US10848304B2 (en) * 2018-07-17 2020-11-24 Visa International Service Association Public-private key pair protected password manager
CN109462669A (en) * 2018-11-13 2019-03-12 四川长虹电器股份有限公司 The method of the system platform and the name of specification terminal device of the name of specification terminal device
CN109450925B (en) * 2018-12-05 2021-09-28 国网浙江省电力有限公司杭州供电公司 User authority verification method and device for operation and maintenance of power secondary system and electronic equipment
CN110147658A (en) * 2019-04-16 2019-08-20 平安科技(深圳)有限公司 User information encipher-decipher method, system and computer equipment
CN110310128A (en) * 2019-05-24 2019-10-08 中国平安人寿保险股份有限公司 The filter method and system of fake registrations user
CN110517377A (en) * 2019-07-12 2019-11-29 移康智能科技(上海)股份有限公司 Intelligent lock cipher store method
CN110535887A (en) * 2019-09-30 2019-12-03 海南鼎立信科技有限责任公司 Safety access control method, device, storage medium and electronic equipment based on Kafka
CN111199035B (en) * 2019-12-31 2022-05-31 苏州浪潮智能科技有限公司 Single sign-on method for interface encrypted data transmission
CN111368271A (en) * 2020-03-10 2020-07-03 山东汇贸电子口岸有限公司 Method and system for realizing password management based on multiple encryption
CN112019535B (en) * 2020-08-26 2023-03-07 北京信安世纪科技股份有限公司 Password authentication method
CN114169013B (en) * 2021-12-06 2022-07-01 镁佳(北京)科技有限公司 User registration and verification method and system
CN114499859A (en) * 2022-03-22 2022-05-13 深圳壹账通智能科技有限公司 Password verification method, device, equipment and storage medium
CN115174187A (en) * 2022-06-30 2022-10-11 济南浪潮数据技术有限公司 User secure login method, system and device

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101431410A (en) * 2007-11-09 2009-05-13 康佳集团股份有限公司 Authentication method for network game client and server cluster
CN103391292A (en) * 2013-07-18 2013-11-13 百度在线网络技术(北京)有限公司 Mobile-application-oriented safe login method, system and device

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7711122B2 (en) * 2001-03-09 2010-05-04 Arcot Systems, Inc. Method and apparatus for cryptographic key storage wherein key servers are authenticated by possession and secure distribution of stored keys
CN1516388A (en) * 2003-08-26 2004-07-28 胡祥义 Network accreditation method based no symmetric cryptosystem
CN103036880A (en) * 2012-12-12 2013-04-10 华为技术有限公司 Network information transmission method, transmission equipment and transmission system
CN103036684B (en) * 2012-12-28 2015-06-17 武汉理工大学 Identity-based encryption (IBE) data encryption system and method capable of lowering damages of master key crack and disclosure
CN103701787A (en) * 2013-12-19 2014-04-02 上海格尔软件股份有限公司 User name password authentication method implemented on basis of public key algorithm

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101431410A (en) * 2007-11-09 2009-05-13 康佳集团股份有限公司 Authentication method for network game client and server cluster
CN103391292A (en) * 2013-07-18 2013-11-13 百度在线网络技术(北京)有限公司 Mobile-application-oriented safe login method, system and device

Also Published As

Publication number Publication date
CN104219228A (en) 2014-12-17

Similar Documents

Publication Publication Date Title
CN104219228B (en) A kind of user's registration, user identification method and system
US11757662B2 (en) Confidential authentication and provisioning
CN107040369B (en) Data transmission method, device and system
CN109088889B (en) SSL encryption and decryption method, system and computer readable storage medium
US9852300B2 (en) Secure audit logging
CN104023013B (en) Data transmission method, server side and client
CN103763356B (en) A kind of SSL establishment of connection method, apparatus and system
CN103124269B (en) Based on the Bidirectional identity authentication method of dynamic password and biological characteristic under cloud environment
CN105162772A (en) IoT equipment authentication and key agreement method and device
CN108809633B (en) Identity authentication method, device and system
CN103763631A (en) Authentication method, server and television
CN104901935A (en) Bilateral authentication and data interaction security protection method based on CPK (Combined Public Key Cryptosystem)
CN104394172A (en) Single sign-on device and method
CN111435913A (en) Identity authentication method and device for terminal of Internet of things and storage medium
CN107465665A (en) A kind of file encryption-decryption method based on fingerprint identification technology
CN111080299B (en) Anti-repudiation method for transaction information, client and server
CN107306181A (en) Encryption, verification method and the device of right discriminating system and its authentication information
CN106230840B (en) A kind of command identifying method of high security
KR20080005344A (en) System for authenticating user's terminal based on authentication server
CN115632797A (en) Safety identity verification method based on zero-knowledge proof
CN112822015B (en) Information transmission method and related device
CN104915689B (en) A kind of smart card information processing method
CN104780049B (en) A kind of method of safe read-write data
Jia et al. A Critique of a Lightweight Identity Authentication Protocol for Vehicular Networks.
EP3361670B1 (en) Multi-ttp-based method and device for verifying validity of identity of entity

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant