CN101621794A - Method for realizing safe authentication of wireless application service system - Google Patents

Method for realizing safe authentication of wireless application service system Download PDF

Info

Publication number
CN101621794A
CN101621794A CN200910054451A CN200910054451A CN101621794A CN 101621794 A CN101621794 A CN 101621794A CN 200910054451 A CN200910054451 A CN 200910054451A CN 200910054451 A CN200910054451 A CN 200910054451A CN 101621794 A CN101621794 A CN 101621794A
Authority
CN
China
Prior art keywords
authentication
mobile communication
communication terminal
control server
service control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN200910054451A
Other languages
Chinese (zh)
Inventor
董志
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN200910054451A priority Critical patent/CN101621794A/en
Publication of CN101621794A publication Critical patent/CN101621794A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention relates to a method for realizing the safe authentication of a wireless application service system, comprising the following steps: (1) when a mobile communication client terminal sends a service request, the mobile communication client terminal appends an authentication value on encrypted data by carrying out encryption and authentication operation on a user name, a code and a terminal IP address and sends the authentication value to a service control server; (2) the service control server carries out the authentication and decryption process on safe authentication request data sent by the mobile communication client terminal and verifies the user name and the code obtained after decryption, and after the authentication, the user name and the code are passed by being verified, the service control server encrypts a server-side IP address and appends the authentication value to the server-side IP address and then sends the server-side IP address to the mobile communication client terminal; and (3) after the authenticated safe authentication request data sent by the service control server are passed by being authenticated and verified by the mobile communication client terminal, the mobile communication client terminal sends a successful two-way authenticated safe authentication process message, thereby the safe authentication process is completed.

Description

A kind of safety certification implementation method of wireless application service system
Technical field
The present invention relates to a kind of safety certification implementation method of wireless application service system.Especially, wireless application service system of the present invention comprises service control server equipment and client mobile communication terminal, the invention provides a kind of safety certifying method that carries out bi-directional authentification, encryption and checking user security password between described server and client terminal.
Background technology
Cordless communication network is comparative maturity technically at present, and has obtained using widely.Wherein the common wireless communication net comprises that its advantage exists such as GSM/GPRS/EDGE, WCDMA/HSDPA/HSUPA/HSPA+, CDMA/CDMA2000/CDMA2000-EVDO, TD-SCDMA and LTE system etc.
Very wide in coverage, the user can roam into each country easily.The use of intelligent mobile communication terminal such as mobile phone is very convenient and extensively in the common wireless communication net, become requisite personal electronic equipments in current people's life.System such as WLAN (wireless local area network) such as WIFI then has advantages such as networking is convenient, flexible, radiation is low, user's available bandwidth is bigger.
Existing wireless application service system, client send to server end by the extra-code of user name, password and generation at random basically after encrypting, carry out the authentication of username and password, prevent the login of malicious user forged identity.The usemame/password mode be the simplest also be the most frequently used identity identifying method, each user's password is set by this user oneself, has only that he just knows, as long as so can correctly input password, computer just thinks that he is exactly this user.Yet in fact, because many users forget Password in order to prevent, often adopt birthday such as own or household, telephone number etc. easily by significant character string that other people guess as password, perhaps password is copied at one and oneself thought safe place, this all exists many potential safety hazards, very easily causes password to reveal.Enable promptly to guarantee that user cipher is not leaked, because password is static data, and in proof procedure, need in calculator memory He in the network, transmit, and the authorization information that each proof procedure uses all is identical, and the trojan horse program or the audiomonitor in the network that are easy to reside in the calculator memory are intercepted and captured.Therefore the usemame/password mode is a kind of is the identification authentication mode that is absolutely unsafe.
Some Web bank's service systems by the mode of USB Key is provided to the client, are kept at key or digital certificate in the USB memory device, and utilize the authentication of the built-in cryptographic algorithm realization of USB Key to user identity.Mainly contain two kinds of application models based on USB Key identity authorization system: one is based on impact/corresponding certification mode, and two are based on the certification mode of PKI system.But do not consider identity two-way identification problem between server and the user by the mode of USB Key, promptly only considered the authentication of server, do not consider the authentication of user the server that may palm off to the user that may palm off.Present identification authentication mode does not realize the dynamic generation of crypto token yet simultaneously.Dynamically produce the crypto token technology, promptly the benefit of one-time pad is that the each password that uses of user is all inequality, even the hacker has intercepted and captured password one time, also can't utilize this password to come the identity of counterfeit validated user.
Summary of the invention
The technical problem to be solved in the present invention is: provide a kind of in wireless application service system; effectively carry out the method for bidirectional identification safety certification between service control server end equipment and the client mobile communication terminal; do not forged by malice with the identity that guarantees user and server, the protection authentication information is not stolen.
In order to address the above problem, the invention provides a kind ofly in wireless application service system, carry out the implementation method of bi-directional authentification safety certification between service control server end equipment and the client mobile communication terminal.This method has comprised carries out encrypted process to information such as authenticating user identifications, carries out the process of bi-directional authentification between server end and the client, and uses dynamic random to count the method that token guarantees one-time pad in authentication process.
The present invention comprises following feature:
1. on service control server, produce and preserve the encryption and the KI file of specific user's correspondence, produce one group of random number simultaneously, and with this document and at random array be written in the intelligent memory card together.Client mobile communication terminal and described intelligent memory card interface that the user uses are read this encryption, KI file and array at random when needs carry out authentication.
2. described service control server is preserved phone number, the username and password information of its setting for each user, and the encryption of user's correspondence, KI file and array at random.Service control server uses the username and password of different user that data access control is carried out in the data field at this user place, prevents that unauthorized user from obtaining other users' private data information.
3. running client secure authentication application on the described client mobile communication terminal when initiating safety certification request, is at first visited described intelligent memory card, obtains corresponding encryption, KI and array at random.Described then secure authentication application is by this encryption key and specify cryptographic algorithm that the information such as IP address of user name, password and the described client mobile communication terminal of this user's input are encrypted.Last described secure authentication application calculates authentication MAC-I value to specify authentication arithmetic to the enciphered data that obtains by random number and the KI chosen of order in described array at random, and it is last that this authentication values is attached to enciphered data.
4. described client mobile communication terminal sends to described service control server by the modes such as DTMF in note, multimedia message or the conversation with the encrypting traffic that obtains in the described feature 3.
5. the server end secure authentication application of moving on the described service control server, receive the enciphered data that described client mobile communication terminal sends over, at first by with the phone number of this client mobile communication terminal as index, obtain KI that this user preserves and array at random, by KI with by the random number of obtaining with the same order of this client mobile communication terminal, calculate authentication values with the appointment authentication arithmetic.If the authentication MAC-I value unanimity that the enciphered data end that this authentication values that calculates sends over described client mobile communication terminal is additional is then carried out next step deciphering and username and password authentication.
6. described service control server as index, obtains encryption key that this user preserves and user name, password with the phone number of described client mobile communication terminal.Described service control server is decrypted the encrypting traffic that receives to specify cryptographic algorithm.Obtain the username and password that this client mobile communication terminal sends over after the deciphering, and username and password that its server end that coexists is preserved is compared, if coupling is correct then think that server end passes through the authentication of client mobile communication terminal.
7. described service control server is encrypted the information such as IP address of server with the encryption key of this client mobile communication terminal correspondence, and after encryption stream, this uses the next random number of order of array at random to obtain this user.The authentication MAC-I value that obtains by KI, this random number and appointment authentication arithmetic, append to the end of message.Last described service control server sends to described client mobile communication terminal in the DTMF mode in note, multimedia message or the conversation.
8. after described client mobile communication terminal is received the data that described service control server sends over, choose this user and used the next random number of order of array at random last time, utilize the KI on the intelligent memory card and specify authentication arithmetic to carry out authentication calculations, and obtain authentication MAC-I value.If the MAC-I value of calculating is with to send over the MAC-I value that the data flow end attaches consistent, think that then described client mobile communication terminal finishes the authentication of described service control server, and will and specify decipherment algorithm obtain and preserve the information such as IP address of service control server by decruption key.Last described client mobile communication terminal sends the bi-directional authentification success message to described service control server, and whole bi-directional authentification safety certification process finishes.
The present invention passes through said method, can prevent effectively that malicious user from stealing the username and password information of validated user, simultaneously can be effectively to the two-way identification authentication that carries out between client mobile communication terminal use and service control server, by using the dynamic random number to produce the method for authentication-tokens, guarantee the realization of one-time pad, more effectively prevented the stolen consequence of bringing of key information.
Description of drawings
Fig. 1 is a wireless application service system configuration diagram of the present invention.
Fig. 2 is the secure authentication application schematic diagram of client mobile communication terminal of the present invention.
Fig. 3 is the secure authentication application schematic diagram of service control server of the present invention.
Fig. 4 is an enciphered data flow diagram of the present invention.
Fig. 5 is service control server of the present invention and client mobile communication terminal interaction process schematic diagram.
Embodiment
Below in conjunction with accompanying drawing and enforcement the present invention is described in detail.
Fig. 1 is a wireless application service system configuration diagram of the present invention.
101 is service control server among the figure, and 102 is intelligent memory card, and 103 is the client mobile communication terminal.Described wireless application service system has comprised a service control server, the client mobile communication terminal of one or more use wireless communication networks, one or more intelligent memory card equipment.
Service control server 101 is carried out communication by antenna and wireless communication networks, and by and the read-write interface of 102 of intelligent memory cards, with generate the specific user encryption and KI file, array is written in the intelligent memory card at random.102 are used on client mobile communication terminal 103 by the specific user, and the interface by 103 and 102 is read this user's encryption and KI file, array at random, so that use in safe authentication procedure reciprocal process.
Fig. 2 is the secure authentication application schematic diagram of client mobile communication terminal of the present invention.
The client secure authentication application program of moving on the client mobile communication terminal is carried out safety certification process according to user's request after beginning, comprise the steps:
A1: current random number subscript is initialized as 0.
A2: the service safe authentication is carried out in the request that judges whether to receive, if then change a3 over to, otherwise continues to wait for request at a2.
A3: the visit intelligent memory card, obtain corresponding encryption and KI, array at random.
A4:, obtain enciphered data with encryption key and cryptographic algorithm encrypting user name, password and IP address.
A5: obtain random number in the array at random with current random number subscript.
A6: the random number so that KI and a5 obtain calculates the MAC-I value with the enciphered data of specifying authentication arithmetic that a4 is obtained.
A7: the MAC-I authentication values is attached to the last of enciphered data.
A8: encrypting traffic is sent to service control server by the modes such as DTMF in note, multimedia message or the conversation.
A9: whether receive the verify data stream that service control server sends,, otherwise, return a2 and wait for request thinking the safety certification failure after after a while if then enter a10.
A10: add 1 with current random number subscript,, obtain provisional random number if subscript surpasses maximum subscript then unrolls to 0.
A11: utilize KI and provisional random number on the intelligent memory card to specify the authentication deciphering to calculate, and obtain authentication MAC-I value.
A12: whether the subsidiary MAC-I value of the MAC-I value of judge calculating and receiving data stream is consistent, if unanimity then enter a13, otherwise think that safety certification fails, return the a2 wait and ask.
A13: by decruption key and appointment decipherment algorithm decrypted data stream.
A14: preserve the information such as service control server IP address after deciphering.
A15: preserve current random number=provisional random number.
A16: send bi-directional authentification safety certification process success notification message.
A17: the bi-directional authentification safety certification process is finished.
Fig. 3 is the secure authentication application schematic diagram of service control server of the present invention.
The server end secure authentication application of moving on the service control server is prepared the request of reception client and is carried out safety certification process after beginning, comprise the steps:
B1: current random number subscript is initialized as 0.
B2: judge whether to receive the safety certification request enciphered data that the client mobile communication terminal sends by the modes such as DTMF in note, multimedia message or the conversation,, otherwise continue to wait for client-requested at b2 if then enter b3.
B3: as index, obtain authentication that this user preserves, encryption key and array at random with the phone number of this client mobile communication terminal.
B4: obtain random number in the array at random with current random number subscript.
B5: this enciphered data is calculated the MAC-I value with KI and appointment authentication arithmetic.
B6: whether the subsidiary MAC-I value of the MAC-I value of judge calculating and receiving data stream is consistent, if then enter b7, otherwise thinks that safety certification fails, and returns b2 wait client-requested.
B7: by decruption key and appointment decipherment algorithm decrypted data stream.
B8: preserve the information such as user name, password and IP address after deciphering.
B9: judge whether coupling after the username and password that the server end that coexists is preserved is compared,, otherwise think the safety certification failure, return b2 and wait for client-requested if then enter b10.
B10: the encryption key with this client mobile communication terminal correspondence is encrypted the information such as IP address of server.
B11: add 1 with current random number subscript, if subscript surpasses maximum subscript then unrolls to 0 the provisional random number that obtains.
B12: calculate the MAC-I value with KI and appointment authentication arithmetic.
B13: the MAC-I authentication values is attached to binary add ciphertext data stream encryption stream at last.
B14: the binary system encrypting traffic is sent to this mobile communication terminal by the modes such as DTMF in note, multimedia message or the conversation.
B15: receive terminal bi-directional authentification safety certification process success message.
B16: preserve current random number=provisional random number.
B17: the bi-directional authentification safety certification process is finished.
Fig. 4 is an enciphered data schematic diagram of the present invention.
The c1 data flow is the safety certification data that described client mobile communication terminal sends to described service control server.Encrypted data have comprised user name, password and IP address of terminal.By using random number, KI, to specify authentication arithmetic user name, password and IP address of terminal data after encrypting are carried out authentication calculations, obtain authentication MAC-I value, be attached to the last of safety certification data flow.
The c2 data flow is the safety certification data flow that described service control server sends to described client mobile communication terminal.Encrypted data have comprised server ip address.By using random number, KI, to specify authentication arithmetic the server ip address data after encrypting are carried out authentication calculations, obtain authentication MAC-I value, be attached to the last of safety certification data flow.
Fig. 5 is service control server of the present invention and client mobile communication terminal interaction process schematic diagram.。
At first the client mobile communication terminal sends client authentication safety certification request message, by user name, password and IP address of terminal are encrypted and the additional authentication value after, send to described service control server;
After request message authentication that described then service control server sends client and security password checking are passed through, send server end authentication safety certification request message, by the IP at server end address is encrypted and the additional authentication value after, send to described client mobile communication terminal;
After last described client mobile communication terminal is passed through by the request message authentication verification that server end is sent, send bi-directional authentification safety certification process success notification message, whole bi-directional authentification safety certification process is finished.

Claims (6)

1, a kind of safety certification implementation method of wireless application service system is characterized in that, comprises following reciprocal process:
(1) the client mobile communication terminal in the wireless application service system is when initiating user's service request, by user name, password and IP address of terminal are encrypted, and enciphered data carried out authentication calculations, after will obtaining authentication values and being attached to enciphered data, send to service control server;
(2) described service control server is carried out authentication and decrypting process to the client secure authentication request data that described client mobile communication terminal sends, and the username and password that obtains after the checking deciphering.After authentication and user name password authentification are passed through, described service control server to the IP at server end address encrypt and the additional authentication value after enciphered data, send to described client mobile communication terminal;
(3) after described client mobile communication terminal server end authentication safety certification request data that described service control server is sent are carried out authentication and checking and are passed through, send bi-directional authentification safety certification process success notification message, whole bi-directional authentification safety certification process is finished.
2, the safety certification implementation method of wireless application service system according to claim 1, it is characterized in that, produce and preserve encryption, KI file and one group of random number of specific user's correspondence on the described service control server, and with this document and at random array be written in the intelligent memory card together.Described client mobile communication terminal and described intelligent memory card interface that the user uses are read this encryption, KI file and array at random when needs carry out safety certification.
3, the safety certification implementation method of wireless application service system according to claim 1, it is characterized in that, described service control server is preserved phone number, the username and password information of its setting for each user, and the encryption of user's correspondence, KI file and array at random.Described service control server uses the username and password of different user that data access control is carried out in the data field at this user place, prevents that unauthorized user from obtaining other users' private data information.
4, the safety certification implementation method of wireless application service system according to claim 1, its reciprocal process (1) comprises the steps:
Step 1: the secure authentication application of moving on the described client mobile communication terminal is visited described intelligent memory card, obtains corresponding encryption, KI and array at random.
Step 2: described secure authentication application is by this encryption key and specify cryptographic algorithm that the information such as IP address of user name, password and the described client mobile communication terminal of this user's input are encrypted.
Step 3: random number and KI that described secure authentication application is chosen by order in described array at random, calculate authentication MAC-I value with the enciphered data of specifying authentication arithmetic that step 2 is obtained, it is last that this authentication values is attached to enciphered data.
Step 4: described client mobile communication terminal sends to described service control server by the modes such as DTMF in note, multimedia message or the conversation with the enciphered data that obtains in the described step 3.
5, the safety certification implementation method of described wireless application service system according to claim 1, its reciprocal process (2) comprises the steps:
Step 1: the server end secure authentication application of moving on the described service control server, after receiving the enciphered data that described client mobile communication terminal sends over, at first by with the phone number of this client mobile communication terminal as index, obtain KI that this user preserves and array at random.
Step 2: described service control server is calculated authentication values by KI with by the random number of obtaining with the same order of this client mobile communication terminal with the appointment authentication arithmetic.If the authentication MAC-I value unanimity that the enciphered data end that this authentication values that calculates sends over described client mobile communication terminal is additional then carry out step 3.Otherwise safety certification process failure.
Step 3: described service control server as index, obtains encryption key that this user preserves and user name, password with the phone number of described client mobile communication terminal.Described service control server is decrypted the encrypting traffic that receives to specify cryptographic algorithm.Obtain the username and password that this client mobile communication terminal sends over after the deciphering, and username and password that its server end that coexists is preserved is compared, if coupling is correct then think that server end passes through the authentication of client mobile communication terminal.
Step 4: described service control server is encrypted the information such as IP address of server with the encryption key of this client mobile communication terminal correspondence.This uses the next random number of order and the KI of array at random by obtaining this user, with the authentication MAC-I value of specifying authentication arithmetic to obtain, this authentication values handle is appended to the end of enciphered data.
Step 5: described service control server sends to described client mobile communication terminal in the DTMF mode in note, multimedia message or the conversation.
6, the safety certification implementation method of described wireless application service system according to claim 1, its reciprocal process (3) comprises the steps:
Step 1: after described client mobile communication terminal is received the enciphered data that described service control server sends over, choose this user and used the next random number of order of array at random last time, utilize the KI on the intelligent memory card and specify authentication arithmetic to carry out authentication calculations, and obtain authentication MAC-I value.If the MAC-I value of calculating, thinks then that described client mobile communication terminal finishes the authentication of described service control server with to send over the MAC-I value that the data flow end attaches consistent.
Step 2: described client mobile communication terminal is by decruption key and specify decipherment algorithm to obtain and preserve the information such as IP address of service control server.
Step 3: described client mobile communication terminal sends the bi-directional authentification success message to described service control server.
CN200910054451A 2009-07-07 2009-07-07 Method for realizing safe authentication of wireless application service system Pending CN101621794A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200910054451A CN101621794A (en) 2009-07-07 2009-07-07 Method for realizing safe authentication of wireless application service system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200910054451A CN101621794A (en) 2009-07-07 2009-07-07 Method for realizing safe authentication of wireless application service system

Publications (1)

Publication Number Publication Date
CN101621794A true CN101621794A (en) 2010-01-06

Family

ID=41514769

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200910054451A Pending CN101621794A (en) 2009-07-07 2009-07-07 Method for realizing safe authentication of wireless application service system

Country Status (1)

Country Link
CN (1) CN101621794A (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102377759A (en) * 2010-08-25 2012-03-14 中国移动通信有限公司 Service processing system, user identity identification method and related devices
CN102594721A (en) * 2011-12-09 2012-07-18 腾讯科技(深圳)有限公司 Anonymous making-friends method, system and network server
CN102710611A (en) * 2012-05-11 2012-10-03 福建联迪商用设备有限公司 Network security authentication method and system
CN102761560A (en) * 2012-08-01 2012-10-31 飞天诚信科技股份有限公司 Method and system for verifying information integrity
CN103078863B (en) * 2013-01-08 2015-11-18 青岛海信宽带多媒体技术有限公司 The method of login authentication, Apparatus and system
CN105554001A (en) * 2015-12-23 2016-05-04 北京奇虎科技有限公司 Communication method and system based on encryption
CN107295011A (en) * 2017-08-04 2017-10-24 杭州安恒信息技术有限公司 The safety certifying method and device of webpage
CN108737854A (en) * 2017-04-21 2018-11-02 武汉斗鱼网络科技有限公司 A kind of method for verifying authority and device of video render
CN108810017A (en) * 2018-07-12 2018-11-13 中国工商银行股份有限公司 Business processing safe verification method and device
CN108965324A (en) * 2018-08-17 2018-12-07 新疆玖富万卡信息技术有限公司 A kind of anti-brush method of short message verification code, terminal, server, equipment and medium
CN110661759A (en) * 2018-06-30 2020-01-07 华为技术有限公司 Access detection method and device
CN111431717A (en) * 2020-03-31 2020-07-17 兴唐通信科技有限公司 Encryption method for satellite mobile communication system
CN111783071A (en) * 2020-07-07 2020-10-16 支付宝(杭州)信息技术有限公司 Password-based and privacy data-based verification method, device, equipment and system
CN112866228A (en) * 2017-09-28 2021-05-28 中国银联股份有限公司 Method and device for controlling unauthorized access of web system
CN113795022A (en) * 2021-09-14 2021-12-14 浙江海高思通信科技有限公司 Public network interphone encrypted communication method and public network interphone system
CN111783071B (en) * 2020-07-07 2024-04-19 支付宝(杭州)信息技术有限公司 Verification method, device, equipment and system based on password and privacy data

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102377759A (en) * 2010-08-25 2012-03-14 中国移动通信有限公司 Service processing system, user identity identification method and related devices
CN102377759B (en) * 2010-08-25 2014-10-08 中国移动通信有限公司 Service processing system, user identity identification method and related devices
CN102594721A (en) * 2011-12-09 2012-07-18 腾讯科技(深圳)有限公司 Anonymous making-friends method, system and network server
CN102594721B (en) * 2011-12-09 2013-09-18 腾讯科技(深圳)有限公司 Anonymous making-friends method, system and network server
CN102710611A (en) * 2012-05-11 2012-10-03 福建联迪商用设备有限公司 Network security authentication method and system
CN102761560A (en) * 2012-08-01 2012-10-31 飞天诚信科技股份有限公司 Method and system for verifying information integrity
CN102761560B (en) * 2012-08-01 2015-01-14 飞天诚信科技股份有限公司 Method and system for verifying information integrity
CN103078863B (en) * 2013-01-08 2015-11-18 青岛海信宽带多媒体技术有限公司 The method of login authentication, Apparatus and system
CN105554001A (en) * 2015-12-23 2016-05-04 北京奇虎科技有限公司 Communication method and system based on encryption
CN105554001B (en) * 2015-12-23 2020-02-11 北京奇虎科技有限公司 Encryption-based communication method and system
CN108737854A (en) * 2017-04-21 2018-11-02 武汉斗鱼网络科技有限公司 A kind of method for verifying authority and device of video render
CN107295011A (en) * 2017-08-04 2017-10-24 杭州安恒信息技术有限公司 The safety certifying method and device of webpage
CN107295011B (en) * 2017-08-04 2020-09-04 杭州安恒信息技术股份有限公司 Webpage security authentication method and device
CN112866228A (en) * 2017-09-28 2021-05-28 中国银联股份有限公司 Method and device for controlling unauthorized access of web system
CN110661759A (en) * 2018-06-30 2020-01-07 华为技术有限公司 Access detection method and device
CN110661759B (en) * 2018-06-30 2021-10-01 华为技术有限公司 Access detection method and device
CN108810017A (en) * 2018-07-12 2018-11-13 中国工商银行股份有限公司 Business processing safe verification method and device
CN108965324A (en) * 2018-08-17 2018-12-07 新疆玖富万卡信息技术有限公司 A kind of anti-brush method of short message verification code, terminal, server, equipment and medium
CN111431717A (en) * 2020-03-31 2020-07-17 兴唐通信科技有限公司 Encryption method for satellite mobile communication system
CN111783071A (en) * 2020-07-07 2020-10-16 支付宝(杭州)信息技术有限公司 Password-based and privacy data-based verification method, device, equipment and system
CN111783071B (en) * 2020-07-07 2024-04-19 支付宝(杭州)信息技术有限公司 Verification method, device, equipment and system based on password and privacy data
CN113795022A (en) * 2021-09-14 2021-12-14 浙江海高思通信科技有限公司 Public network interphone encrypted communication method and public network interphone system

Similar Documents

Publication Publication Date Title
CN101621794A (en) Method for realizing safe authentication of wireless application service system
US8763097B2 (en) System, design and process for strong authentication using bidirectional OTP and out-of-band multichannel authentication
KR101508360B1 (en) Apparatus and method for transmitting data, and recording medium storing program for executing method of the same in computer
WO2017201809A1 (en) Communication method and system for terminal
CN111615105B (en) Information providing and acquiring method, device and terminal
CA2879910C (en) Terminal identity verification and service authentication method, system and terminal
CN103297403A (en) Method and system for achieving dynamic password authentication
JP2012530311A5 (en)
JP2009510644A (en) Method and configuration for secure authentication
CN103415008A (en) Encryption communication method and encryption communication system
CN103812651B (en) Method of password authentication, apparatus and system
US8397281B2 (en) Service assisted secret provisioning
US7913096B2 (en) Method and system for the cipher key controlled exploitation of data resources, related network and computer program products
CN108809633B (en) Identity authentication method, device and system
CN102572817A (en) Method and intelligent memory card for realizing mobile communication confidentiality
KR20130131682A (en) Method for web service user authentication
CN111512608A (en) Trusted execution environment based authentication protocol
US20090044007A1 (en) Secure Communication Between a Data Processing Device and a Security Module
CN102404337A (en) Data encryption method and device
KR101358375B1 (en) Prevention security system and method for smishing
Khan et al. Offline OTP based solution for secure internet banking access
CN106789977A (en) A kind of method and system that handset token is realized based on Secret splitting
US9876774B2 (en) Communication security system and method
RU2698424C1 (en) Authorization control method
KR101329789B1 (en) Encryption Method of Database of Mobile Communication Device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Open date: 20100106