CN101621794A - Method for realizing safe authentication of wireless application service system - Google Patents
Method for realizing safe authentication of wireless application service system Download PDFInfo
- Publication number
- CN101621794A CN101621794A CN200910054451A CN200910054451A CN101621794A CN 101621794 A CN101621794 A CN 101621794A CN 200910054451 A CN200910054451 A CN 200910054451A CN 200910054451 A CN200910054451 A CN 200910054451A CN 101621794 A CN101621794 A CN 101621794A
- Authority
- CN
- China
- Prior art keywords
- authentication
- mobile communication
- communication terminal
- control server
- service control
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Abstract
The invention relates to a method for realizing the safe authentication of a wireless application service system, comprising the following steps: (1) when a mobile communication client terminal sends a service request, the mobile communication client terminal appends an authentication value on encrypted data by carrying out encryption and authentication operation on a user name, a code and a terminal IP address and sends the authentication value to a service control server; (2) the service control server carries out the authentication and decryption process on safe authentication request data sent by the mobile communication client terminal and verifies the user name and the code obtained after decryption, and after the authentication, the user name and the code are passed by being verified, the service control server encrypts a server-side IP address and appends the authentication value to the server-side IP address and then sends the server-side IP address to the mobile communication client terminal; and (3) after the authenticated safe authentication request data sent by the service control server are passed by being authenticated and verified by the mobile communication client terminal, the mobile communication client terminal sends a successful two-way authenticated safe authentication process message, thereby the safe authentication process is completed.
Description
Technical field
The present invention relates to a kind of safety certification implementation method of wireless application service system.Especially, wireless application service system of the present invention comprises service control server equipment and client mobile communication terminal, the invention provides a kind of safety certifying method that carries out bi-directional authentification, encryption and checking user security password between described server and client terminal.
Background technology
Cordless communication network is comparative maturity technically at present, and has obtained using widely.Wherein the common wireless communication net comprises that its advantage exists such as GSM/GPRS/EDGE, WCDMA/HSDPA/HSUPA/HSPA+, CDMA/CDMA2000/CDMA2000-EVDO, TD-SCDMA and LTE system etc.
Very wide in coverage, the user can roam into each country easily.The use of intelligent mobile communication terminal such as mobile phone is very convenient and extensively in the common wireless communication net, become requisite personal electronic equipments in current people's life.System such as WLAN (wireless local area network) such as WIFI then has advantages such as networking is convenient, flexible, radiation is low, user's available bandwidth is bigger.
Existing wireless application service system, client send to server end by the extra-code of user name, password and generation at random basically after encrypting, carry out the authentication of username and password, prevent the login of malicious user forged identity.The usemame/password mode be the simplest also be the most frequently used identity identifying method, each user's password is set by this user oneself, has only that he just knows, as long as so can correctly input password, computer just thinks that he is exactly this user.Yet in fact, because many users forget Password in order to prevent, often adopt birthday such as own or household, telephone number etc. easily by significant character string that other people guess as password, perhaps password is copied at one and oneself thought safe place, this all exists many potential safety hazards, very easily causes password to reveal.Enable promptly to guarantee that user cipher is not leaked, because password is static data, and in proof procedure, need in calculator memory He in the network, transmit, and the authorization information that each proof procedure uses all is identical, and the trojan horse program or the audiomonitor in the network that are easy to reside in the calculator memory are intercepted and captured.Therefore the usemame/password mode is a kind of is the identification authentication mode that is absolutely unsafe.
Some Web bank's service systems by the mode of USB Key is provided to the client, are kept at key or digital certificate in the USB memory device, and utilize the authentication of the built-in cryptographic algorithm realization of USB Key to user identity.Mainly contain two kinds of application models based on USB Key identity authorization system: one is based on impact/corresponding certification mode, and two are based on the certification mode of PKI system.But do not consider identity two-way identification problem between server and the user by the mode of USB Key, promptly only considered the authentication of server, do not consider the authentication of user the server that may palm off to the user that may palm off.Present identification authentication mode does not realize the dynamic generation of crypto token yet simultaneously.Dynamically produce the crypto token technology, promptly the benefit of one-time pad is that the each password that uses of user is all inequality, even the hacker has intercepted and captured password one time, also can't utilize this password to come the identity of counterfeit validated user.
Summary of the invention
The technical problem to be solved in the present invention is: provide a kind of in wireless application service system; effectively carry out the method for bidirectional identification safety certification between service control server end equipment and the client mobile communication terminal; do not forged by malice with the identity that guarantees user and server, the protection authentication information is not stolen.
In order to address the above problem, the invention provides a kind ofly in wireless application service system, carry out the implementation method of bi-directional authentification safety certification between service control server end equipment and the client mobile communication terminal.This method has comprised carries out encrypted process to information such as authenticating user identifications, carries out the process of bi-directional authentification between server end and the client, and uses dynamic random to count the method that token guarantees one-time pad in authentication process.
The present invention comprises following feature:
1. on service control server, produce and preserve the encryption and the KI file of specific user's correspondence, produce one group of random number simultaneously, and with this document and at random array be written in the intelligent memory card together.Client mobile communication terminal and described intelligent memory card interface that the user uses are read this encryption, KI file and array at random when needs carry out authentication.
2. described service control server is preserved phone number, the username and password information of its setting for each user, and the encryption of user's correspondence, KI file and array at random.Service control server uses the username and password of different user that data access control is carried out in the data field at this user place, prevents that unauthorized user from obtaining other users' private data information.
3. running client secure authentication application on the described client mobile communication terminal when initiating safety certification request, is at first visited described intelligent memory card, obtains corresponding encryption, KI and array at random.Described then secure authentication application is by this encryption key and specify cryptographic algorithm that the information such as IP address of user name, password and the described client mobile communication terminal of this user's input are encrypted.Last described secure authentication application calculates authentication MAC-I value to specify authentication arithmetic to the enciphered data that obtains by random number and the KI chosen of order in described array at random, and it is last that this authentication values is attached to enciphered data.
4. described client mobile communication terminal sends to described service control server by the modes such as DTMF in note, multimedia message or the conversation with the encrypting traffic that obtains in the described feature 3.
5. the server end secure authentication application of moving on the described service control server, receive the enciphered data that described client mobile communication terminal sends over, at first by with the phone number of this client mobile communication terminal as index, obtain KI that this user preserves and array at random, by KI with by the random number of obtaining with the same order of this client mobile communication terminal, calculate authentication values with the appointment authentication arithmetic.If the authentication MAC-I value unanimity that the enciphered data end that this authentication values that calculates sends over described client mobile communication terminal is additional is then carried out next step deciphering and username and password authentication.
6. described service control server as index, obtains encryption key that this user preserves and user name, password with the phone number of described client mobile communication terminal.Described service control server is decrypted the encrypting traffic that receives to specify cryptographic algorithm.Obtain the username and password that this client mobile communication terminal sends over after the deciphering, and username and password that its server end that coexists is preserved is compared, if coupling is correct then think that server end passes through the authentication of client mobile communication terminal.
7. described service control server is encrypted the information such as IP address of server with the encryption key of this client mobile communication terminal correspondence, and after encryption stream, this uses the next random number of order of array at random to obtain this user.The authentication MAC-I value that obtains by KI, this random number and appointment authentication arithmetic, append to the end of message.Last described service control server sends to described client mobile communication terminal in the DTMF mode in note, multimedia message or the conversation.
8. after described client mobile communication terminal is received the data that described service control server sends over, choose this user and used the next random number of order of array at random last time, utilize the KI on the intelligent memory card and specify authentication arithmetic to carry out authentication calculations, and obtain authentication MAC-I value.If the MAC-I value of calculating is with to send over the MAC-I value that the data flow end attaches consistent, think that then described client mobile communication terminal finishes the authentication of described service control server, and will and specify decipherment algorithm obtain and preserve the information such as IP address of service control server by decruption key.Last described client mobile communication terminal sends the bi-directional authentification success message to described service control server, and whole bi-directional authentification safety certification process finishes.
The present invention passes through said method, can prevent effectively that malicious user from stealing the username and password information of validated user, simultaneously can be effectively to the two-way identification authentication that carries out between client mobile communication terminal use and service control server, by using the dynamic random number to produce the method for authentication-tokens, guarantee the realization of one-time pad, more effectively prevented the stolen consequence of bringing of key information.
Description of drawings
Fig. 1 is a wireless application service system configuration diagram of the present invention.
Fig. 2 is the secure authentication application schematic diagram of client mobile communication terminal of the present invention.
Fig. 3 is the secure authentication application schematic diagram of service control server of the present invention.
Fig. 4 is an enciphered data flow diagram of the present invention.
Fig. 5 is service control server of the present invention and client mobile communication terminal interaction process schematic diagram.
Embodiment
Below in conjunction with accompanying drawing and enforcement the present invention is described in detail.
Fig. 1 is a wireless application service system configuration diagram of the present invention.
101 is service control server among the figure, and 102 is intelligent memory card, and 103 is the client mobile communication terminal.Described wireless application service system has comprised a service control server, the client mobile communication terminal of one or more use wireless communication networks, one or more intelligent memory card equipment.
Fig. 2 is the secure authentication application schematic diagram of client mobile communication terminal of the present invention.
The client secure authentication application program of moving on the client mobile communication terminal is carried out safety certification process according to user's request after beginning, comprise the steps:
A1: current random number subscript is initialized as 0.
A2: the service safe authentication is carried out in the request that judges whether to receive, if then change a3 over to, otherwise continues to wait for request at a2.
A3: the visit intelligent memory card, obtain corresponding encryption and KI, array at random.
A4:, obtain enciphered data with encryption key and cryptographic algorithm encrypting user name, password and IP address.
A5: obtain random number in the array at random with current random number subscript.
A6: the random number so that KI and a5 obtain calculates the MAC-I value with the enciphered data of specifying authentication arithmetic that a4 is obtained.
A7: the MAC-I authentication values is attached to the last of enciphered data.
A8: encrypting traffic is sent to service control server by the modes such as DTMF in note, multimedia message or the conversation.
A9: whether receive the verify data stream that service control server sends,, otherwise, return a2 and wait for request thinking the safety certification failure after after a while if then enter a10.
A10: add 1 with current random number subscript,, obtain provisional random number if subscript surpasses maximum subscript then unrolls to 0.
A11: utilize KI and provisional random number on the intelligent memory card to specify the authentication deciphering to calculate, and obtain authentication MAC-I value.
A12: whether the subsidiary MAC-I value of the MAC-I value of judge calculating and receiving data stream is consistent, if unanimity then enter a13, otherwise think that safety certification fails, return the a2 wait and ask.
A13: by decruption key and appointment decipherment algorithm decrypted data stream.
A14: preserve the information such as service control server IP address after deciphering.
A15: preserve current random number=provisional random number.
A16: send bi-directional authentification safety certification process success notification message.
A17: the bi-directional authentification safety certification process is finished.
Fig. 3 is the secure authentication application schematic diagram of service control server of the present invention.
The server end secure authentication application of moving on the service control server is prepared the request of reception client and is carried out safety certification process after beginning, comprise the steps:
B1: current random number subscript is initialized as 0.
B2: judge whether to receive the safety certification request enciphered data that the client mobile communication terminal sends by the modes such as DTMF in note, multimedia message or the conversation,, otherwise continue to wait for client-requested at b2 if then enter b3.
B3: as index, obtain authentication that this user preserves, encryption key and array at random with the phone number of this client mobile communication terminal.
B4: obtain random number in the array at random with current random number subscript.
B5: this enciphered data is calculated the MAC-I value with KI and appointment authentication arithmetic.
B6: whether the subsidiary MAC-I value of the MAC-I value of judge calculating and receiving data stream is consistent, if then enter b7, otherwise thinks that safety certification fails, and returns b2 wait client-requested.
B7: by decruption key and appointment decipherment algorithm decrypted data stream.
B8: preserve the information such as user name, password and IP address after deciphering.
B9: judge whether coupling after the username and password that the server end that coexists is preserved is compared,, otherwise think the safety certification failure, return b2 and wait for client-requested if then enter b10.
B10: the encryption key with this client mobile communication terminal correspondence is encrypted the information such as IP address of server.
B11: add 1 with current random number subscript, if subscript surpasses maximum subscript then unrolls to 0 the provisional random number that obtains.
B12: calculate the MAC-I value with KI and appointment authentication arithmetic.
B13: the MAC-I authentication values is attached to binary add ciphertext data stream encryption stream at last.
B14: the binary system encrypting traffic is sent to this mobile communication terminal by the modes such as DTMF in note, multimedia message or the conversation.
B15: receive terminal bi-directional authentification safety certification process success message.
B16: preserve current random number=provisional random number.
B17: the bi-directional authentification safety certification process is finished.
Fig. 4 is an enciphered data schematic diagram of the present invention.
The c1 data flow is the safety certification data that described client mobile communication terminal sends to described service control server.Encrypted data have comprised user name, password and IP address of terminal.By using random number, KI, to specify authentication arithmetic user name, password and IP address of terminal data after encrypting are carried out authentication calculations, obtain authentication MAC-I value, be attached to the last of safety certification data flow.
The c2 data flow is the safety certification data flow that described service control server sends to described client mobile communication terminal.Encrypted data have comprised server ip address.By using random number, KI, to specify authentication arithmetic the server ip address data after encrypting are carried out authentication calculations, obtain authentication MAC-I value, be attached to the last of safety certification data flow.
Fig. 5 is service control server of the present invention and client mobile communication terminal interaction process schematic diagram.。
At first the client mobile communication terminal sends client authentication safety certification request message, by user name, password and IP address of terminal are encrypted and the additional authentication value after, send to described service control server;
After request message authentication that described then service control server sends client and security password checking are passed through, send server end authentication safety certification request message, by the IP at server end address is encrypted and the additional authentication value after, send to described client mobile communication terminal;
After last described client mobile communication terminal is passed through by the request message authentication verification that server end is sent, send bi-directional authentification safety certification process success notification message, whole bi-directional authentification safety certification process is finished.
Claims (6)
1, a kind of safety certification implementation method of wireless application service system is characterized in that, comprises following reciprocal process:
(1) the client mobile communication terminal in the wireless application service system is when initiating user's service request, by user name, password and IP address of terminal are encrypted, and enciphered data carried out authentication calculations, after will obtaining authentication values and being attached to enciphered data, send to service control server;
(2) described service control server is carried out authentication and decrypting process to the client secure authentication request data that described client mobile communication terminal sends, and the username and password that obtains after the checking deciphering.After authentication and user name password authentification are passed through, described service control server to the IP at server end address encrypt and the additional authentication value after enciphered data, send to described client mobile communication terminal;
(3) after described client mobile communication terminal server end authentication safety certification request data that described service control server is sent are carried out authentication and checking and are passed through, send bi-directional authentification safety certification process success notification message, whole bi-directional authentification safety certification process is finished.
2, the safety certification implementation method of wireless application service system according to claim 1, it is characterized in that, produce and preserve encryption, KI file and one group of random number of specific user's correspondence on the described service control server, and with this document and at random array be written in the intelligent memory card together.Described client mobile communication terminal and described intelligent memory card interface that the user uses are read this encryption, KI file and array at random when needs carry out safety certification.
3, the safety certification implementation method of wireless application service system according to claim 1, it is characterized in that, described service control server is preserved phone number, the username and password information of its setting for each user, and the encryption of user's correspondence, KI file and array at random.Described service control server uses the username and password of different user that data access control is carried out in the data field at this user place, prevents that unauthorized user from obtaining other users' private data information.
4, the safety certification implementation method of wireless application service system according to claim 1, its reciprocal process (1) comprises the steps:
Step 1: the secure authentication application of moving on the described client mobile communication terminal is visited described intelligent memory card, obtains corresponding encryption, KI and array at random.
Step 2: described secure authentication application is by this encryption key and specify cryptographic algorithm that the information such as IP address of user name, password and the described client mobile communication terminal of this user's input are encrypted.
Step 3: random number and KI that described secure authentication application is chosen by order in described array at random, calculate authentication MAC-I value with the enciphered data of specifying authentication arithmetic that step 2 is obtained, it is last that this authentication values is attached to enciphered data.
Step 4: described client mobile communication terminal sends to described service control server by the modes such as DTMF in note, multimedia message or the conversation with the enciphered data that obtains in the described step 3.
5, the safety certification implementation method of described wireless application service system according to claim 1, its reciprocal process (2) comprises the steps:
Step 1: the server end secure authentication application of moving on the described service control server, after receiving the enciphered data that described client mobile communication terminal sends over, at first by with the phone number of this client mobile communication terminal as index, obtain KI that this user preserves and array at random.
Step 2: described service control server is calculated authentication values by KI with by the random number of obtaining with the same order of this client mobile communication terminal with the appointment authentication arithmetic.If the authentication MAC-I value unanimity that the enciphered data end that this authentication values that calculates sends over described client mobile communication terminal is additional then carry out step 3.Otherwise safety certification process failure.
Step 3: described service control server as index, obtains encryption key that this user preserves and user name, password with the phone number of described client mobile communication terminal.Described service control server is decrypted the encrypting traffic that receives to specify cryptographic algorithm.Obtain the username and password that this client mobile communication terminal sends over after the deciphering, and username and password that its server end that coexists is preserved is compared, if coupling is correct then think that server end passes through the authentication of client mobile communication terminal.
Step 4: described service control server is encrypted the information such as IP address of server with the encryption key of this client mobile communication terminal correspondence.This uses the next random number of order and the KI of array at random by obtaining this user, with the authentication MAC-I value of specifying authentication arithmetic to obtain, this authentication values handle is appended to the end of enciphered data.
Step 5: described service control server sends to described client mobile communication terminal in the DTMF mode in note, multimedia message or the conversation.
6, the safety certification implementation method of described wireless application service system according to claim 1, its reciprocal process (3) comprises the steps:
Step 1: after described client mobile communication terminal is received the enciphered data that described service control server sends over, choose this user and used the next random number of order of array at random last time, utilize the KI on the intelligent memory card and specify authentication arithmetic to carry out authentication calculations, and obtain authentication MAC-I value.If the MAC-I value of calculating, thinks then that described client mobile communication terminal finishes the authentication of described service control server with to send over the MAC-I value that the data flow end attaches consistent.
Step 2: described client mobile communication terminal is by decruption key and specify decipherment algorithm to obtain and preserve the information such as IP address of service control server.
Step 3: described client mobile communication terminal sends the bi-directional authentification success message to described service control server.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200910054451A CN101621794A (en) | 2009-07-07 | 2009-07-07 | Method for realizing safe authentication of wireless application service system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200910054451A CN101621794A (en) | 2009-07-07 | 2009-07-07 | Method for realizing safe authentication of wireless application service system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101621794A true CN101621794A (en) | 2010-01-06 |
Family
ID=41514769
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN200910054451A Pending CN101621794A (en) | 2009-07-07 | 2009-07-07 | Method for realizing safe authentication of wireless application service system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101621794A (en) |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102377759A (en) * | 2010-08-25 | 2012-03-14 | 中国移动通信有限公司 | Service processing system, user identity identification method and related devices |
CN102594721A (en) * | 2011-12-09 | 2012-07-18 | 腾讯科技(深圳)有限公司 | Anonymous making-friends method, system and network server |
CN102710611A (en) * | 2012-05-11 | 2012-10-03 | 福建联迪商用设备有限公司 | Network security authentication method and system |
CN102761560A (en) * | 2012-08-01 | 2012-10-31 | 飞天诚信科技股份有限公司 | Method and system for verifying information integrity |
CN103078863B (en) * | 2013-01-08 | 2015-11-18 | 青岛海信宽带多媒体技术有限公司 | The method of login authentication, Apparatus and system |
CN105554001A (en) * | 2015-12-23 | 2016-05-04 | 北京奇虎科技有限公司 | Communication method and system based on encryption |
CN107295011A (en) * | 2017-08-04 | 2017-10-24 | 杭州安恒信息技术有限公司 | The safety certifying method and device of webpage |
CN108737854A (en) * | 2017-04-21 | 2018-11-02 | 武汉斗鱼网络科技有限公司 | A kind of method for verifying authority and device of video render |
CN108810017A (en) * | 2018-07-12 | 2018-11-13 | 中国工商银行股份有限公司 | Business processing safe verification method and device |
CN108965324A (en) * | 2018-08-17 | 2018-12-07 | 新疆玖富万卡信息技术有限公司 | A kind of anti-brush method of short message verification code, terminal, server, equipment and medium |
CN110661759A (en) * | 2018-06-30 | 2020-01-07 | 华为技术有限公司 | Access detection method and device |
CN111431717A (en) * | 2020-03-31 | 2020-07-17 | 兴唐通信科技有限公司 | Encryption method for satellite mobile communication system |
CN111783071A (en) * | 2020-07-07 | 2020-10-16 | 支付宝(杭州)信息技术有限公司 | Password-based and privacy data-based verification method, device, equipment and system |
CN112866228A (en) * | 2017-09-28 | 2021-05-28 | 中国银联股份有限公司 | Method and device for controlling unauthorized access of web system |
CN113795022A (en) * | 2021-09-14 | 2021-12-14 | 浙江海高思通信科技有限公司 | Public network interphone encrypted communication method and public network interphone system |
CN111783071B (en) * | 2020-07-07 | 2024-04-19 | 支付宝(杭州)信息技术有限公司 | Verification method, device, equipment and system based on password and privacy data |
-
2009
- 2009-07-07 CN CN200910054451A patent/CN101621794A/en active Pending
Cited By (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102377759A (en) * | 2010-08-25 | 2012-03-14 | 中国移动通信有限公司 | Service processing system, user identity identification method and related devices |
CN102377759B (en) * | 2010-08-25 | 2014-10-08 | 中国移动通信有限公司 | Service processing system, user identity identification method and related devices |
CN102594721A (en) * | 2011-12-09 | 2012-07-18 | 腾讯科技(深圳)有限公司 | Anonymous making-friends method, system and network server |
CN102594721B (en) * | 2011-12-09 | 2013-09-18 | 腾讯科技(深圳)有限公司 | Anonymous making-friends method, system and network server |
CN102710611A (en) * | 2012-05-11 | 2012-10-03 | 福建联迪商用设备有限公司 | Network security authentication method and system |
CN102761560A (en) * | 2012-08-01 | 2012-10-31 | 飞天诚信科技股份有限公司 | Method and system for verifying information integrity |
CN102761560B (en) * | 2012-08-01 | 2015-01-14 | 飞天诚信科技股份有限公司 | Method and system for verifying information integrity |
CN103078863B (en) * | 2013-01-08 | 2015-11-18 | 青岛海信宽带多媒体技术有限公司 | The method of login authentication, Apparatus and system |
CN105554001A (en) * | 2015-12-23 | 2016-05-04 | 北京奇虎科技有限公司 | Communication method and system based on encryption |
CN105554001B (en) * | 2015-12-23 | 2020-02-11 | 北京奇虎科技有限公司 | Encryption-based communication method and system |
CN108737854A (en) * | 2017-04-21 | 2018-11-02 | 武汉斗鱼网络科技有限公司 | A kind of method for verifying authority and device of video render |
CN107295011A (en) * | 2017-08-04 | 2017-10-24 | 杭州安恒信息技术有限公司 | The safety certifying method and device of webpage |
CN107295011B (en) * | 2017-08-04 | 2020-09-04 | 杭州安恒信息技术股份有限公司 | Webpage security authentication method and device |
CN112866228A (en) * | 2017-09-28 | 2021-05-28 | 中国银联股份有限公司 | Method and device for controlling unauthorized access of web system |
CN110661759A (en) * | 2018-06-30 | 2020-01-07 | 华为技术有限公司 | Access detection method and device |
CN110661759B (en) * | 2018-06-30 | 2021-10-01 | 华为技术有限公司 | Access detection method and device |
CN108810017A (en) * | 2018-07-12 | 2018-11-13 | 中国工商银行股份有限公司 | Business processing safe verification method and device |
CN108965324A (en) * | 2018-08-17 | 2018-12-07 | 新疆玖富万卡信息技术有限公司 | A kind of anti-brush method of short message verification code, terminal, server, equipment and medium |
CN111431717A (en) * | 2020-03-31 | 2020-07-17 | 兴唐通信科技有限公司 | Encryption method for satellite mobile communication system |
CN111783071A (en) * | 2020-07-07 | 2020-10-16 | 支付宝(杭州)信息技术有限公司 | Password-based and privacy data-based verification method, device, equipment and system |
CN111783071B (en) * | 2020-07-07 | 2024-04-19 | 支付宝(杭州)信息技术有限公司 | Verification method, device, equipment and system based on password and privacy data |
CN113795022A (en) * | 2021-09-14 | 2021-12-14 | 浙江海高思通信科技有限公司 | Public network interphone encrypted communication method and public network interphone system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101621794A (en) | Method for realizing safe authentication of wireless application service system | |
US8763097B2 (en) | System, design and process for strong authentication using bidirectional OTP and out-of-band multichannel authentication | |
KR101508360B1 (en) | Apparatus and method for transmitting data, and recording medium storing program for executing method of the same in computer | |
WO2017201809A1 (en) | Communication method and system for terminal | |
CN111615105B (en) | Information providing and acquiring method, device and terminal | |
CA2879910C (en) | Terminal identity verification and service authentication method, system and terminal | |
CN103297403A (en) | Method and system for achieving dynamic password authentication | |
JP2012530311A5 (en) | ||
JP2009510644A (en) | Method and configuration for secure authentication | |
CN103415008A (en) | Encryption communication method and encryption communication system | |
CN103812651B (en) | Method of password authentication, apparatus and system | |
US8397281B2 (en) | Service assisted secret provisioning | |
US7913096B2 (en) | Method and system for the cipher key controlled exploitation of data resources, related network and computer program products | |
CN108809633B (en) | Identity authentication method, device and system | |
CN102572817A (en) | Method and intelligent memory card for realizing mobile communication confidentiality | |
KR20130131682A (en) | Method for web service user authentication | |
CN111512608A (en) | Trusted execution environment based authentication protocol | |
US20090044007A1 (en) | Secure Communication Between a Data Processing Device and a Security Module | |
CN102404337A (en) | Data encryption method and device | |
KR101358375B1 (en) | Prevention security system and method for smishing | |
Khan et al. | Offline OTP based solution for secure internet banking access | |
CN106789977A (en) | A kind of method and system that handset token is realized based on Secret splitting | |
US9876774B2 (en) | Communication security system and method | |
RU2698424C1 (en) | Authorization control method | |
KR101329789B1 (en) | Encryption Method of Database of Mobile Communication Device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Open date: 20100106 |