CN102195983B - network terminal encryption authentication method and server - Google Patents

network terminal encryption authentication method and server Download PDF

Info

Publication number
CN102195983B
CN102195983B CN201110122357.3A CN201110122357A CN102195983B CN 102195983 B CN102195983 B CN 102195983B CN 201110122357 A CN201110122357 A CN 201110122357A CN 102195983 B CN102195983 B CN 102195983B
Authority
CN
China
Prior art keywords
dynamic key
network terminal
key
generatmg
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201110122357.3A
Other languages
Chinese (zh)
Other versions
CN102195983A (en
Inventor
吴博远
张海
李剑
魏含寒
陈贻斌
周青海
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen TCL New Technology Co Ltd
Original Assignee
Shenzhen TCL New Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen TCL New Technology Co Ltd filed Critical Shenzhen TCL New Technology Co Ltd
Priority to CN201110122357.3A priority Critical patent/CN102195983B/en
Publication of CN102195983A publication Critical patent/CN102195983A/en
Application granted granted Critical
Publication of CN102195983B publication Critical patent/CN102195983B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The present invention relates to a kind of network terminal encryption authentication method and server, its method comprises: server obtains an ID and the first dynamically key when network terminal logs in; According to an ID, dynamically key pre-generatmg table and ID mapping table, certification is carried out to the first dynamic key; When the authentication is successful, random acquisition the second dynamic key from dynamic key pre-generatmg table, and by the 2nd corresponding for the second dynamic key ID stored in ID mapping table; Second dynamic key is sent to the network terminal, as the first dynamic key that this network terminal is new, and using the authenticate key of the 2nd corresponding for the second dynamic key ID as this network terminal login next time.The present invention, by the dynamic key of pre-generatmg, makes the quantity of dynamic key be controlled, and alleviates server and generates and preserve the frequent degree of dynamic key to hard disk, reduce the resource consumption of server.

Description

Network terminal encryption authentication method and server
Technical field
The present invention relates to Internet technical field, particularly relate to a kind of network terminal encryption authentication method and server.
Background technology
In daily life, along with the rise of internet television, the fail safe of internet television becomes more and more important.
At present, for preventing the appearance of cloning, palming off Web TV, the webserver employs dynamic key and is encrypted certification to Web TV.That is: Web TV needs with one " dynamic key " as the certified information of secret key encryption, and after each server authentication success, server generates a new dynamic key in real time and returns to this Web TV, after new dynamic key success preserved by Web TV, server preserves this new dynamic key to database simultaneously, during as new key for this Web TV certification next time.Like this, can not think to clone by the Web TV of new key authentication, the Web TV of personation.
But, the method of the dynamic key of above-mentioned real-time generation, needs to transfer random number functions at server end, generates the new dynamic key with certain length scale, and check that this new dynamic key and already present dynamic key does not repeat, then by this new dynamic key write into Databasce.And when Web TV quantity size is larger, server needs frequently to repeat hard disk write operation, when hard disk resources consumes excessive, when becoming bottleneck, whole verification process then can slow down, thus affects the operating experience of user.
Summary of the invention
Main purpose of the present invention is to provide a kind of network terminal encryption authentication method and server, frequently writes to solve server in the network terminal verification process problem that hard disk causes network resource consumption too much.
In order to achieve the above object, the present invention proposes a kind of network terminal encryption authentication method, comprises the following steps:
Server obtains an ID and the first dynamically key when network terminal logs in;
According to a described ID, dynamically key pre-generatmg table and ID mapping table, certification is carried out to the described first dynamic key;
When the authentication is successful, random acquisition the second dynamic key from described dynamic key pre-generatmg table, and by the 2nd corresponding for the described second dynamic key ID stored in described ID mapping table;
Described second dynamic key is sent to the described network terminal, as the first dynamic key that this network terminal is new, and using the authenticate key of the 2nd corresponding for the described second dynamic key ID as this network terminal login next time.
Preferably, described dynamic key pre-generatmg table comprises the corresponding relation between the described second dynamic key and described 2nd ID; Described ID mapping table comprises the corresponding relation between an ID of the described network terminal and described 2nd ID.
Preferably, describedly according to an ID, dynamically key pre-generatmg table and ID mapping table, the step that the described first dynamic key carries out certification to be comprised:
Two ID corresponding with a described ID is obtained from described ID mapping table;
The second dynamic key corresponding with described 2nd ID is obtained from described dynamic key pre-generatmg table;
The dynamic key of second dynamic key and described first of more described correspondence, if both are consistent, then authentication success; Otherwise, authentification failure.
Preferably, described server also comprised obtain the step of the dynamic key of an ID and first of the described network terminal when the network terminal logs in before:
Generate the second dynamic key of predetermined quantity and stored in described dynamic key pre-generatmg table, and make each second dynamic key correspondence the 2nd ID.
Preferably, also comprise: upgrade described dynamic key pre-generatmg table according to the predetermined refresh time interval.
Preferably, also comprise: server send to the transmission times of the described network terminal to exceed pre-determined number the described second dynamic key and the unsuccessful preservation of this network terminal the described second dynamic key time, do not upgrade the first dynamic key of the described network terminal.
The present invention also proposes a kind of network terminal encrypting and authenticating server, comprising:
First acquisition module, for obtaining an ID and the first dynamically key when network terminal logs in;
Authentication module, for carrying out certification according to a described ID, dynamically key pre-generatmg table and ID mapping table to the described first dynamic key;
First update module, for when the authentication is successful, obtains the second dynamic key at random from described dynamic key pre-generatmg table, and by the 2nd corresponding for the described second dynamic key ID stored in described ID mapping table;
Second update module, for the described second dynamic key is sent to the described network terminal, as the first dynamic key that this network terminal is new, and using the authenticate key of the 2nd corresponding for the described second dynamic key ID as this network terminal login next time.
Preferably, described authentication module comprises:
2nd ID acquiring unit, for obtaining two ID corresponding with a described ID from described ID mapping table;
Second dynamic key acquiring unit, for obtaining the second dynamic key corresponding with described 2nd ID from described dynamic key pre-generatmg table;
Authentication ' unit, for the dynamic key of the second dynamic key and described first of more described correspondence, if both are consistent, then authentication success; Otherwise, authentification failure.
Preferably, also comprise:
Generation module, for generating predetermined quantity second dynamic key and stored in described dynamic key pre-generatmg table, and make corresponding 2nd ID of each second dynamic key.
Preferably, described generation module is also for upgrading described dynamic key pre-generatmg table according to the predetermined refresh time interval.
Preferably, described second update module also for send to the transmission times of the described network terminal to exceed pre-determined number the described second dynamic key and the unsuccessful preservation of this network terminal the described second dynamic key time, do not upgrade the first dynamic key of the described network terminal.
A kind of network terminal encryption authentication method that the present invention proposes and server, by the dynamic key of pre-generatmg and stored in dynamic key pre-generatmg table, the quantity of dynamic key and the quantity of the network terminal are no longer man-to-man relations, the quantity of dynamic key is controlled, when after authentication success, server random dynamic key that obtains from dynamic key pre-generatmg table returns to the network terminal, 2nd ID corresponding to the dynamic key this returned is as the key of network terminal certification next time, thus alleviate server generation and preserve the frequent degree of dynamic key to hard disk, reduce the resource consumption of server.
Accompanying drawing explanation
Fig. 1 is network terminal encryption authentication method one embodiment schematic flow sheet of the present invention;
Fig. 2 carries out the schematic flow sheet of certification according to an ID, dynamically key pre-generatmg table and ID mapping table to the first dynamic key in network terminal encryption authentication method one embodiment of the present invention;
Fig. 3 is another embodiment schematic flow sheet of network terminal encryption authentication method of the present invention;
Fig. 4 is network terminal encrypting and authenticating server one example structure schematic diagram of the present invention;
Fig. 5 is the structural representation of authentication module in network terminal encrypting and authenticating server one embodiment of the present invention;
Fig. 6 is another example structure schematic diagram of network terminal encrypting and authenticating server of the present invention.
In order to make technical scheme of the present invention clearly, understand, be described in further detail below in conjunction with accompanying drawing.
Embodiment
Solution for embodiment of the invention is mainly by the dynamic key of pre-generatmg and stored in dynamic key pre-generatmg table, when after authentication success, server random dynamic key that obtains from dynamic key pre-generatmg table returns to the network terminal, 2nd ID corresponding to the dynamic key this returned is as the key of network terminal certification next time, generate to alleviate server and preserve the frequent degree of dynamic key to hard disk, reducing the resource consumption of server.
The embodiment of the present invention relates to authentication mode during network terminal logon server in the Internet, and this network terminal can be Web TV etc.
As shown in Figure 1, one embodiment of the invention proposes a kind of network terminal encryption authentication method, comprising:
Step S101, server obtains an ID and the first dynamically key when network terminal logs in;
When network terminal logon server, log-on message is sent, the ID (i.e. an ID alleged by the present embodiment) including the network terminal in this log-on message and the dynamic key (i.e. the first dynamic key alleged by the present embodiment) preserved thereof to server.Each network terminal all has unique identity the one ID, and when network terminal first time logon server, the first dynamic key that the network terminal is preserved is the initial dynamic key that this network terminal is preset when dispatching from the factory.
Server gets an ID and the first dynamically key of this network terminal according to the log-on message that the network terminal sends.
Step S102, carries out certification according to an ID, dynamically key pre-generatmg table and ID mapping table to this first dynamic key;
Server generates in advance before the network terminal logs in has the N number of second dynamic key, N to be natural number.The corresponding relation of the second dynamic key and the 2nd ID, as the unique identification of the second dynamic key, is kept in dynamic key pre-generatmg table by each second dynamic key corresponding 2nd ID, the 2nd ID; Meanwhile, server is also provided with the ID mapping table of the corresponding relation comprised between an ID of the network terminal and the 2nd ID.Corresponding two ID corresponding with the second dynamic key of one ID of each network terminal, after the first dynamic key renewal of the follow-up preservation of the network terminal, also can preserve the 2nd ID that renewal front and back the second dynamic key is corresponding in ID mapping table.
Wherein, N can carry out examining weighing apparatus value according to system safety requirement and performance.Such as: N=10, and suppose that the pregenerated second dynamic key does not upgrade, then the network terminal of cloning has 1/10 probability Successful login.If N reaches certain numerical value, then can think that the network terminal of clone can not Successful login.
In the present embodiment, server searches ID mapping table according to an ID of the network terminal obtained, obtain two ID corresponding with an ID from ID mapping table, then, search dynamic key pre-generatmg table according to the 2nd ID, the second dynamic key corresponding with the 2nd ID is obtained from dynamic key pre-generatmg table, the the first dynamic key second dynamic key and the network terminal preserved compares, if both are consistent, then and authentication success, otherwise, authentification failure.
Step S103, when the authentication is successful, random acquisition the second dynamic key from this dynamic key pre-generatmg table, and by the 2nd corresponding for this second dynamic key ID stored in this ID mapping table;
When the authentication is successful, server is the random dynamic key of picking one second from the dynamic key of N number of second dynamic key pre-generatmg table, and is kept in ID mapping table by the 2nd ID corresponding with second of picking the dynamic key in dynamic key pre-generatmg table.In ID mapping table, the 2nd ID that the second dynamic key of this random picking is corresponding is corresponding with an ID of the network terminal of above-mentioned login.
Step S104, sends to this network terminal by this second dynamic key, as the first dynamic key that this network terminal is new, and using the authenticate key of the 2nd corresponding for this second dynamic key ID as this network terminal login next time.
In this step, second of random picking dynamic key is sent to the network terminal by server, preserved by the network terminal, the first dynamic key that alternate network terminal was preserved originally, namely with this second dynamic key as new the first dynamic key of this network terminal, to carry out certification during next network terminal logon server.This verification process is with step S102.
If the network terminal is not the network terminal of clone or personation, then when next network terminal logon server, the value of the first dynamic key second dynamic key corresponding in dynamic key pre-generatmg table with server that the network terminal is preserved is consistent.
As shown in Figure 2, above-mentioned steps S102 comprises:
Step S1021, obtains two ID corresponding with an ID from this ID mapping table;
Step S1022, obtains the second dynamic key corresponding with the 2nd ID from this dynamic key pre-generatmg table;
Step S1023, compares the second dynamic key and this first dynamic key of this correspondence, if both are consistent, then and authentication success; Otherwise, authentification failure.
Compared to existing technology, the present embodiment is by preserving the dynamic key pre-generatmg table of the second dynamic key generated in advance, the quantity of dynamic key is controlled, when after authentication success, server random one second dynamic key that obtains from dynamic key pre-generatmg table returns to the network terminal, and the 2nd ID corresponding to this returned second dynamic key is as the key of network terminal certification next time, thus alleviate server generation and preserve the frequent degree of dynamic key to hard disk, significantly reduce the resource consumption of server.
For Web TV, if total M platform Web TV access services device, and server dynamic key pre-generatmg storehouse only generates the dynamic key of N bar (General N < M).When certain Web TV A access services device, server is random picking 1 from the dynamic key of N bar, returns to Web TV A.Adopt in this way, alleviate server and generate and preserve the frequency of dynamic key to hard disk, therefore significantly reduce the resource consumption of server.
As shown in Figure 3, another embodiment of the present invention proposes a kind of network terminal encryption authentication method, on the basis of above-described embodiment, also comprises before step S101:
Step S100, server generates the second dynamic key of predetermined quantity and stored in dynamic key pre-generatmg table, and makes each second dynamic key correspondence the 2nd ID.
The difference of the present embodiment and above-described embodiment is: in the present embodiment, second of predetermined quantity the dynamic key is generated by server self, and is kept at dynamic key pre-generatmg table, corresponding 2nd ID of each second dynamic key.
In a further embodiment, server can also according to predetermined refresh time interval Regeneration dynamics key pre-generatmg table.Authenticated used second dynamic key in dynamic key pre-generatmg table is deleted, to increase the fail safe of network terminal certification.
Further, Web TV sends a notification message to server after receiving and also successfully preserving this second dynamic key.Simultaneously, the transmission times that second dynamic key is sent to the network terminal by server can also be set, to confirm whether the network terminal successfully receives and preserve this second dynamic key, such as, setting transmission times is three times, if more than three times, and the network terminal still unsuccessful reception preserve this second dynamic key, then server does not upgrade the first dynamic key of the network terminal, and namely the network terminal still retains the first original dynamic key for next login authentication.
The present embodiment uses the mode of the dynamic key of pre-generatmg, alleviates the number of times writing hard disk, reduces with this resource consumption that server writes hard disk; Use the mode of the corresponding ID of dynamic key simultaneously, encryption key is become the ID corresponding with dynamic key of short data from the dynamic key of long data, reduce the resource consumption writing hard disk further.
As shown in Figure 4, one embodiment of the invention proposes a kind of network terminal encrypting and authenticating server, comprising: the first acquisition module 401, authentication module 402, first update module 403 and the second update module 404;
Wherein:
First acquisition module 401, for obtaining an ID and the first dynamically key when network terminal logs in;
Authentication module 402, for carrying out certification according to an ID, dynamically key pre-generatmg table and ID mapping table to the first dynamic key;
First update module 403, for when the authentication is successful, obtains the second dynamic key at random from dynamic key pre-generatmg table, and by the 2nd corresponding for the second dynamic key ID stored in ID mapping table;
Second update module 404, for the second dynamic key is sent to the network terminal, as the first dynamic key that this network terminal is new, and using the authenticate key of the 2nd corresponding for the second dynamic key ID as this network terminal login next time.
In the present embodiment, when network terminal logon server, log-on message is sent, the ID (i.e. an ID alleged by the present embodiment) including the network terminal in this log-on message and the dynamic key (i.e. the first dynamic key alleged by the present embodiment) preserved thereof to server.Each network terminal all has unique identity the one ID, and when network terminal first time logon server, the first dynamic key that the network terminal is preserved is the initial dynamic key that this network terminal is preset when dispatching from the factory.
Server first acquisition module 401 gets an ID and the first dynamically key of this network terminal according to the log-on message that the network terminal sends.
In the present embodiment, server generates in advance before the network terminal logs in has the N number of second dynamic key, N to be natural number.The corresponding relation of the second dynamic key and the 2nd ID, as the unique identification of the second dynamic key, is kept in dynamic key pre-generatmg table by each second dynamic key corresponding 2nd ID, the 2nd ID; Meanwhile, server is also provided with the ID mapping table of the corresponding relation comprised between an ID of the network terminal and the 2nd ID.Corresponding two ID corresponding with the second dynamic key of one ID of each network terminal, after the first dynamic key renewal of the follow-up preservation of the network terminal, also can preserve the 2nd ID that renewal front and back the second dynamic key is corresponding in ID mapping table.
Wherein, N can carry out examining weighing apparatus value according to system safety requirement and performance.Such as: N=10, and suppose that the pregenerated second dynamic key does not upgrade, then the network terminal of cloning has 1/10 probability Successful login.If N reaches certain numerical value, then can think that the network terminal of clone can not Successful login.
One ID of the network terminal that authentication module 402 obtains according to the first acquisition module 401 searches ID mapping table, two ID corresponding with an ID is obtained from ID mapping table, then, search dynamic key pre-generatmg table according to the 2nd ID, obtain the second dynamic key corresponding with the 2nd ID from dynamic key pre-generatmg table, the first dynamic key the second dynamic key and the network terminal preserved compares, if both are consistent, then authentication success, otherwise, authentification failure.
When the authentication is successful, first update module 403 is the random dynamic key of picking one second from the dynamic key of N number of second dynamic key pre-generatmg table, and is kept in ID mapping table by the 2nd ID corresponding with second of picking the dynamic key in dynamic key pre-generatmg table.In ID mapping table, the 2nd ID that the second dynamic key of this random picking is corresponding is corresponding with an ID of the network terminal of above-mentioned login.
Second of random picking dynamic key is sent to the network terminal by the second update module 404, preserved by the network terminal, the first dynamic key that alternate network terminal was preserved originally, namely with this second dynamic key as new the first dynamic key of this network terminal, to carry out certification during next network terminal logon server.This verification process is with step S102.
If the network terminal is not the network terminal of clone or personation, then when next network terminal logon server, the value of the first dynamic key second dynamic key corresponding in dynamic key pre-generatmg table with server that the network terminal is preserved is consistent.
Further, the second update module 404 also for send to the transmission times of the network terminal to exceed pre-determined number the second dynamic key and the unsuccessful preservation second of this network terminal dynamically key time, do not upgrade the first dynamic key of the network terminal.
As shown in Figure 5, authentication module 402 comprises: the dynamic key acquiring unit 4022 of the 2nd ID acquiring unit 4021, second and authentication ' unit 4023, wherein:
2nd ID acquiring unit 4021, for obtaining two ID corresponding with an ID from ID mapping table;
Second dynamic key acquiring unit 4022, for obtaining the second dynamic key corresponding with the 2nd ID from dynamic key pre-generatmg table;
Authentication ' unit 4023, for the dynamic key of the more corresponding second dynamic key and described first, if both are consistent, then authentication success; Otherwise, authentification failure.
As shown in Figure 6, another embodiment of the present invention proposes a kind of network terminal encrypting and authenticating server, on the basis of above-described embodiment, also comprises:
Generation module 400, is connected with the first acquisition module 401, for generating predetermined quantity second dynamic key and stored in described dynamic key pre-generatmg table, and makes corresponding 2nd ID of each second dynamic key.
Further, generation module 400 is also for according to predetermined refresh time interval Regeneration dynamics key pre-generatmg table.
The difference of the present embodiment and above-described embodiment is: in the present embodiment, second of predetermined quantity the dynamic key is generated by server generation module 400, and is kept at dynamic key pre-generatmg table, corresponding 2nd ID of each second dynamic key.
In a further embodiment, server generation module 400 can also according to predetermined refresh time interval Regeneration dynamics key pre-generatmg table.Authenticated used second dynamic key in dynamic key pre-generatmg table is deleted, to increase the fail safe of network terminal certification.
Further, Web TV sends a notification message to server after receiving and also successfully preserving this second dynamic key.Simultaneously, the transmission times that second dynamic key is sent to the network terminal by server can also be set, to confirm whether the network terminal successfully receives and preserve this second dynamic key, such as, setting transmission times is three times, if more than three times, and the network terminal still unsuccessful reception preserve this second dynamic key, then server second update module 404 does not upgrade the first dynamic key of the network terminal, and namely the network terminal still retains the first original dynamic key for next login authentication.
The present embodiment uses the mode of the dynamic key of pre-generatmg, alleviates the number of times writing hard disk, reduces with this resource consumption that server writes hard disk; Use the mode of the corresponding ID of dynamic key simultaneously, encryption key is become the ID corresponding with dynamic key of short data from the dynamic key of long data, reduce the resource consumption writing hard disk further.
The foregoing is only the preferred embodiments of the present invention; not thereby the scope of the claims of the present invention is limited; every utilize specification of the present invention and accompanying drawing content to do equivalent structure or flow process conversion; or be directly or indirectly used in other relevant technical field, be all in like manner included in scope of patent protection of the present invention.

Claims (8)

1. a network terminal encryption authentication method, is characterized in that, comprises the following steps:
Server obtains an ID and the first dynamically key when network terminal logs in;
According to a described ID, dynamically key pre-generatmg table and ID mapping table, certification is carried out to the described first dynamic key;
When the authentication is successful, random acquisition the second dynamic key from described dynamic key pre-generatmg table, and by the 2nd corresponding for the described second dynamic key ID stored in described ID mapping table;
Described second dynamic key is sent to the described network terminal, as the first dynamic key that this network terminal is new, and using the authenticate key of the 2nd corresponding for the described second dynamic key ID as this network terminal login next time; Described dynamic key pre-generatmg table comprises the corresponding relation between the described second dynamic key and described 2nd ID; Described ID mapping table comprises the corresponding relation between an ID of the described network terminal and described 2nd ID; Describedly according to an ID, dynamically key pre-generatmg table and ID mapping table, the step that the described first dynamic key carries out certification to be comprised:
Two ID corresponding with a described ID is obtained from described ID mapping table;
The second dynamic key corresponding with described 2nd ID is obtained from described dynamic key pre-generatmg table;
The dynamic key of second dynamic key and described first of more described correspondence, if both are consistent, then authentication success; Otherwise, authentification failure.
2. method according to claim 1, is characterized in that, described server also comprised obtain the step of the dynamic key of an ID and first of the described network terminal when the network terminal logs in before:
Generate the second dynamic key of predetermined quantity and stored in described dynamic key pre-generatmg table, and make each second dynamic key correspondence the 2nd ID.
3. method according to claim 2, is characterized in that, also comprises: upgrade described dynamic key pre-generatmg table according to the predetermined refresh time interval.
4. method according to claim 1, is characterized in that, also comprises:
Server send to the transmission times of the described network terminal to exceed pre-determined number the described second dynamic key and the unsuccessful preservation of this network terminal the described second dynamic key time, do not upgrade the first dynamic key of the described network terminal.
5. a network terminal encrypting and authenticating server, is characterized in that, comprising:
First acquisition module, for obtaining an ID and the first dynamically key when network terminal logs in;
Authentication module, for carrying out certification according to a described ID, dynamically key pre-generatmg table and ID mapping table to the described first dynamic key;
First update module, for when the authentication is successful, obtains the second dynamic key at random from described dynamic key pre-generatmg table, and by the 2nd corresponding for the described second dynamic key ID stored in described ID mapping table;
Second update module, for the described second dynamic key is sent to the described network terminal, as the first dynamic key that this network terminal is new, and using the authenticate key of the 2nd corresponding for the described second dynamic key ID as this network terminal login next time; Described dynamic key pre-generatmg table comprises the corresponding relation between the described second dynamic key and described 2nd ID; Described ID mapping table comprises the corresponding relation between an ID of the described network terminal and described 2nd ID;
Described authentication module comprises:
2nd ID acquiring unit, for obtaining two ID corresponding with a described ID from described ID mapping table;
Second dynamic key acquiring unit, for obtaining the second dynamic key corresponding with described 2nd ID from described dynamic key pre-generatmg table;
Authentication ' unit, for the dynamic key of the second dynamic key and described first of more described correspondence, if both are consistent, then authentication success; Otherwise, authentification failure.
6. server according to claim 5, is characterized in that, also comprises:
Generation module, before the dynamic key of an ID and first for obtaining the described network terminal when the network terminal logs at server, generate the second dynamic key of predetermined quantity and stored in described dynamic key pre-generatmg table, and make each second dynamic key correspondence the 2nd ID.
7. server according to claim 6, is characterized in that, described generation module is also for upgrading described dynamic key pre-generatmg table according to the predetermined refresh time interval.
8. server according to claim 5, it is characterized in that, described second update module also for send to the transmission times of the described network terminal to exceed pre-determined number the described second dynamic key and the unsuccessful preservation of this network terminal the described second dynamic key time, do not upgrade the first dynamic key of the described network terminal.
CN201110122357.3A 2011-05-12 2011-05-12 network terminal encryption authentication method and server Active CN102195983B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110122357.3A CN102195983B (en) 2011-05-12 2011-05-12 network terminal encryption authentication method and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110122357.3A CN102195983B (en) 2011-05-12 2011-05-12 network terminal encryption authentication method and server

Publications (2)

Publication Number Publication Date
CN102195983A CN102195983A (en) 2011-09-21
CN102195983B true CN102195983B (en) 2015-08-19

Family

ID=44603370

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110122357.3A Active CN102195983B (en) 2011-05-12 2011-05-12 network terminal encryption authentication method and server

Country Status (1)

Country Link
CN (1) CN102195983B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102882848A (en) * 2012-08-28 2013-01-16 深圳Tcl新技术有限公司 Login system and method
TWI675579B (en) * 2017-09-30 2019-10-21 優仕達資訊股份有限公司 Network authentication system and method
CN112601219A (en) * 2021-03-03 2021-04-02 四川微巨芯科技有限公司 Data encryption and decryption method and system, server, storage device and mobile device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002353959A (en) * 2001-05-30 2002-12-06 Nec Corp System, method and program for authentication
CN1768502A (en) * 2002-06-19 2006-05-03 安全通信公司 Inter-authentication method and device
CN101291228A (en) * 2008-06-18 2008-10-22 华为技术有限公司 Generating, authenticating method for super code, system and device thereof
CN101611631A (en) * 2007-02-12 2009-12-23 索尼株式会社 Use the key list of storage to carry out packaged media encryption
CN101697540A (en) * 2009-10-15 2010-04-21 浙江大学 Method for authenticating user identity through P2P service request

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002353959A (en) * 2001-05-30 2002-12-06 Nec Corp System, method and program for authentication
CN1768502A (en) * 2002-06-19 2006-05-03 安全通信公司 Inter-authentication method and device
CN101611631A (en) * 2007-02-12 2009-12-23 索尼株式会社 Use the key list of storage to carry out packaged media encryption
CN101291228A (en) * 2008-06-18 2008-10-22 华为技术有限公司 Generating, authenticating method for super code, system and device thereof
CN101697540A (en) * 2009-10-15 2010-04-21 浙江大学 Method for authenticating user identity through P2P service request

Also Published As

Publication number Publication date
CN102195983A (en) 2011-09-21

Similar Documents

Publication Publication Date Title
US8180054B2 (en) Authenticating system, authenticating method, and authenticating program
CN101605108B (en) Method, system and apparatus for instant communication
CN107077559B (en) Verification System reminds terminal and information recording carrier
WO2015090116A1 (en) Login method and desktop management device
CN104852925A (en) Method for leakproof, secure storage and backup of data of mobile smart terminal
CN104335523A (en) Access control method, client and server
US20130212654A1 (en) System and methods for profiling client devices
CN103763326A (en) Website one-stop log-in method and system based on Memcache and Cookie
CN102143131B (en) User logout method and authentication server
CN102801713A (en) Website logging-in method and system as well as accessing management platform
CN104168258A (en) Password-free temporary account generation and application method
CN103841117A (en) JAAS login method and server based on Cookie mechanism
CN101925020A (en) Method and system for binding E-mail addresses and mobile phone number
CN101771717A (en) Database synchronization method and database synchronization system
CN102195983B (en) network terminal encryption authentication method and server
CN106101134A (en) User&#39;s multiple domain is under one&#39;s name across the method for station roaming checking logging status
CN105072608B (en) A kind of method and device of administrative authentication token
CN102769629B (en) Client-side password storage method and service system
CN109039595A (en) A kind of method, apparatus and server for reducing internet-of-things terminal temporary password and issuing time delay
CN105338525B (en) Log in access processing method, apparatus and system
US20230164131A1 (en) Accessing cloud data providers with user-impersonation
CN107294931B (en) Method and apparatus for adjusting restricted access frequency
US10666644B2 (en) Enterprise key and password management system
CN103069741A (en) Credential authentication method and single sign-on server
CN103179089A (en) System and method for identity authentication for accessing of different software development platforms

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant