CN105530229A - Terminal and server end authentication method and automatic authentication system - Google Patents

Terminal and server end authentication method and automatic authentication system Download PDF

Info

Publication number
CN105530229A
CN105530229A CN201410564594.9A CN201410564594A CN105530229A CN 105530229 A CN105530229 A CN 105530229A CN 201410564594 A CN201410564594 A CN 201410564594A CN 105530229 A CN105530229 A CN 105530229A
Authority
CN
China
Prior art keywords
authentication
information
terminal
identity information
certification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410564594.9A
Other languages
Chinese (zh)
Other versions
CN105530229B (en
Inventor
韩丹
赵强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xi'an Nova Nebula Technology Co., Ltd.
Original Assignee
Xian Novastar Electronic Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Novastar Electronic Technology Co Ltd filed Critical Xian Novastar Electronic Technology Co Ltd
Priority to CN201410564594.9A priority Critical patent/CN105530229B/en
Publication of CN105530229A publication Critical patent/CN105530229A/en
Application granted granted Critical
Publication of CN105530229B publication Critical patent/CN105530229B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention relates to a terminal and server end authentication method and an automatic authentication system. The method comprises the steps that a first end and a second end mutually exchange identity information; the first end uses the identity information of the second end to encrypt authentication information and the identity information per se to obtain authentication initiation information, and sends the authentication initiation information to the second end; the first end receives authentication response information generated by the second end by responding to the authentication initiation information, wherein the authentication response information contains an operation result obtained by the second end by operating authentication data via an authentication mode in the authentication information, and the authentication response information is generated by the second end by using the identity information of the first end to encrypt the operation result and the identity information per se; and the first end uses the identity information per se to decrypt the received authentication response information to extract the operation result, compares the extracted operation result with the operation result per se to generate an authentication result, and sends the authentication result to the second end. Therefore, the terminal and server end authentication method provided by the invention can be used for improving the authentication convenience and security.

Description

Terminal and server end authentication method and automated validation system
Technical field
The present invention relates to Display Technique field, particularly a kind of terminal and server end authentication method and a kind of automated validation system.
Background technology
Along with the continuous quickening of LED display industrial application of information technology degree process, increasing display terminal has been arrived in LED display management system by linking Internet.How to ensure display terminal automatic, safe, legal be linked into management system, be a problem being worth inquiring into.
Existing technology, the mode completion system registration that general employing is following and checking:
First, a LED display terminal will be linked into LED display management system, must first register in a management system.Register later LED display terminal, just the functional module that can be managed in system used.In traditional mode, for registration, need people's (being generally display screen terminal operation maintenance personnel) to arrive first LED display end and extract some terminal identification information and (terminal can be represented uniquely, as No. S/N, MAC Address, terminal demonstration control system, service number etc.), these information are all that user is visible certainly.And then by other people (being generally business personnel) login management system, by manual type by the Data Enter of display screen terminal to management system, in Input Process, the encrypted message of display screen terminal is set.
After LED display terminal is registered to management system, business personnel can tell the encrypted message of the operation maintenance personnel LED display terminal of LED display terminal.Now operation maintenance personnel is selected terminal identification information, configurating terminal encrypted message again and is configured the information (as server link information etc.) of other necessity in LED display terminal.To configure and after preserving configuration information just now, LED display terminal just starts to carry out with server alternately, confirm identity.
Carry out authentication afterwards, LED display terminal according to configuration information, regularly can send request from trend server, contains terminal identification information, encrypted message and other relevant informations in solicited message.Server to receive after the information of terminal according to terminal identification information and encrypted message, judges terminal whether legal (that is to say no register, whether encrypted message is correct), and makes corresponding response.
In authentication phase, if correctly, then beam back the service response relevant to this LED display terminal; If certification is not passed through, then return error message.
For above-mentioned traditional mode, it is mainly the mode using user name (terminal iidentification) and password (terminal password) certification, although it can refuse some unregistered illegal terminal accesses, but still there are some following problems: (a) must complete registration by manual entry end message, cumbersome; B () authentication information is generally by expressly to transmit or transmitted in encrypted tunnel by clear-text way, this mode has certain security risk; (c) due to terminal identification information be visible to user, the third party is easy to forge LED display terminal, sends request to server; D () this authentication mode is unidirectional, only have server authentication terminal and do not have terminal authentication server, if there is the third party to palm off server, then probably loses the control to terminal.
Summary of the invention
Therefore, for solving in prior art the defect and deficiency that exist, the present invention proposes a kind of terminal and server end authentication method and a kind of automated validation system, to promote convenience and the fail safe of certification.
Particularly, a kind of terminal that the embodiment of the present invention provides and server end authentication method, comprise step: (a) first end and the second end exchange identity information mutually, wherein said first end is the one in terminal and server end, and described second end is the another one in described terminal and described server end; B () described first end uses the identity information of described second end to be encrypted to obtain certification to authentication information and the identity information of oneself and initiates information and information is initiated in described certification to be sent to described second end, wherein said authentication information comprises verify data and authentication mode; C () described first end receives described second end and initiates information and the authentication response information that produces because responding described certification, wherein said authentication response information comprises and utilizes described authentication mode to carry out to described verify data operation result that computing obtains by described second end and use the identity information of described first end to be encrypted described operation result and the identity information of oneself and to produce by described second end; And (d) described first end uses the identity information of oneself to be decrypted to extract described operation result to the described authentication response information received, by the described operation result extracted and oneself utilize described authentication mode to carry out to described verify data the operation result that computing obtains to contrast and produce described second end according to comparison result whether be sent to described second end by the authentication result of certification.
In one embodiment of the invention, above-mentionedly produce described second end according to comparison result and whether be sent to described second end by the authentication result of certification and comprise: described first end uses the identity information of described second end be encrypted to obtain encrypting and authenticating object information to described authentication result and the identity information of oneself and described encrypting and authenticating object information is sent to described second end.
In one embodiment of the invention, when described authentication result is that described second end passes through certification, above-mentioned authentication method comprises step further: (e) described first end receive described second end produce second certification initiate information, wherein said second certification initiate information use the identity information of described first end to be encrypted the second authentication information and the identity information of oneself by described second end and produce and described second certification initiate information comprise the second verify data and the second authentication mode, f () described first end uses the identity information of oneself to initiate information to the second certification received and is decrypted to extract described second verify data and described second authentication mode, utilize described second authentication mode to carry out computing to described second verify data and obtain the second operation result, and utilize the identity information of described second end be encrypted to obtain the second authentication response information to described second operation result and the identity information of oneself and described second authentication response information is sent to described second end, the identity information of oneself is used to be decrypted to extract described second operation result to the second authentication response information received for described second end, by the second operation result extracted and oneself utilize described second authentication mode to carry out to described second verify data the operation result that computing obtains to compare, and produce described first end whether by the second authentication result of certification according to comparison result, and (g) receives described first end that described second end produces whether by the second authentication result of certification.
In one embodiment of the invention, above-mentioned first end is terminal, and described terminal is LED display terminal.
In one embodiment of the invention, above-mentioned terminal and server end authentication method also comprise step: before whether described second end of generation passes through the authentication result of certification, and whether the identity information of the second end obtained when described first end comparison exchanges identity information is mutually consistent with the identity information of described second end obtained after the described authentication response information of deciphering.
In addition, a kind of automated validation system that the embodiment of the present invention provides, for the certification between terminal and server end, it comprises: signal dispatcher module, certification initiate information-generation module and authentication result generation module.Wherein, described signal dispatcher module is for sending the identity information of local terminal and receiving the identity information of opposite end to complete the identity information communication between local terminal and opposite end, described certification is initiated information-generation module and is sent to opposite end produces authentication response information to be responded described certification by opposite end and initiate information and described authentication response information comprises opposite end utilizes described authentication mode to carry out computing to described verify data and the operation result that obtains for utilizing the identity information of the identity information of opposite end to the authentication information and local terminal that comprise verify data and authentication mode to be encrypted to produce certification to initiate information and described certification being initiated information by described signal dispatcher module, described authentication result generation module is used for after receiving described authentication response information by described signal dispatcher module, utilize the identity information of local terminal to be decrypted to extract described operation result to described authentication response information, by the described operation result extracted and oneself utilize described authentication mode to carry out to described authentication result the operation result that computing obtains to compare, and produce opposite end whether by the authentication result of certification according to comparison result.
In one embodiment of the invention, above-mentioned authentication result generation module is also for using the identity information of the identity information of opposite end to described authentication result and local terminal to be encrypted to obtain encrypting and authenticating object information, and described encrypting and authenticating object information is sent to opposite end by described signal dispatcher module.
In one embodiment of the invention, above-mentioned automated validation system also comprises: authentication response information generation module; information is initiated in the second certification comprising the second verify data and the second authentication mode using the identity information of local terminal to be encrypted that described information sending module also produces for receiving opposite end, described authentication response information generation module is decrypted to extract described second verify data and the second authentication mode for using the identity information of local terminal to initiate information to described second certification, utilize described second authentication mode to carry out computing to described second verify data and obtain the second operation result, and utilize the identity information of the identity information of opposite end to described second operation result and local terminal to be encrypted to obtain the second authentication response information, described second authentication response information is sent to opposite end by described signal dispatcher module and uses the identity information of oneself to be decrypted to extract described second operation result to the second authentication response information received for described opposite end, by described second operation result extracted and oneself utilize described second authentication mode to carry out to described second verify data the operation result that computing obtains to compare, and produce according to comparison result the second authentication result whether local terminal passes through certification.
In one embodiment of the invention, above-mentioned local terminal is the one in terminal and server end, and opposite end is to another one in terminal and server end.
In one embodiment of the invention, above-mentioned terminal is LED display terminal.
The embodiment of the present invention solves the problem must first registered when terminal connecting system, eliminates the trouble registered manually; The data of transmission are also the data of encryption, so be all have certain safety assurance at escape way or non-security channel transfer; This authentication mode can transfer two-way authentication to, avoids legal server end that traditional unilateral authentication may cause and loses control problem to terminal; This certification is that terminal and server end complete automatically, only basic link information need be configured when terminal configuration, the identity information of terminal and server information are completed automatically by two ends software, are transparent concerning user, improve ease for use and the experience of user.
By the detailed description below with reference to accompanying drawing, other side of the present invention and feature become obvious.But it should be known that this accompanying drawing is only the object design of explanation, instead of as the restriction of scope of the present invention, this is because it should with reference to additional claim.Should also be appreciated that, unless otherwise noted, unnecessaryly draw accompanying drawing to scale, they only try hard to structure described herein and flow process are described conceptually.
Accompanying drawing explanation
Below in conjunction with accompanying drawing, the specific embodiment of the present invention is described in detail.
Fig. 1 is the module diagram of a kind of automated validation system of the embodiment of the present invention.
Embodiment
For enabling above-mentioned purpose of the present invention, feature and advantage become apparent more, are described in detail the specific embodiment of the present invention below in conjunction with accompanying drawing.
Particularly, the implementation of the unilateral authentication in a kind of terminal that the embodiment of the present invention provides and server end authentication method is as follows, and it is described using server end as an example as certification originating end.
First, server end and terminal exchange identity information mutually.
Then, server end, after receiving the identity information of terminal, can tentatively judge, if having certain authentication feature, such as product performance mark, then carry out next step certification; If, directly do not refused.Terminal also tentatively can judge the identity information of server end, if having certain authentication feature, such as, has the letter of identity that certain company issues, then continues next step certification; If, do not refused.
Then, server end initiates certification to terminal: server end uses the identity information of terminal to be encrypted to produce certification to authentication information and the identity information of oneself and initiates information, then certification initiation information is sent to terminal; At this, authentication information comprises verify data and authentication mode.
Next, the certification of terminal response server end: after terminal receives the certification initiation information from server end, first initiate information with the identity information of oneself to the certification received to be decrypted, then peel off the identity information of server end to extract the authentication information comprising verify data and authentication mode, utilize the authentication mode obtained to carry out computing to verify data and obtain operation result; Then use the identity information of server end to encrypt to produce authentication response information operation result and the identity information of oneself, send to server.
Afterwards, server end is to terminal return authentication result: after server end receives the authentication response information that terminal beams back, first with the identity information of oneself, authentication response information is deciphered, peel off the identity information of terminal to extract above-mentioned operation result, above-mentioned authentication mode is utilized to contrast the operation result that above-mentioned verify data carries out computing the operation result extracted and oneself, the identity information of the terminal of also comparison twice acquisition simultaneously.If comparison result is consistent, then replys terminal authentication and pass through; If comparison result is inconsistent, then reply authentification failure, the access of refusal terminal; At this, that is to say that server end produces terminal whether by the authentication result of certification.In addition, after generation authentication result, server end also utilizes the identity information of terminal to be encrypted to obtain encrypting and authenticating object information to authentication result and the identity information of oneself, again encrypting and authenticating object information is sent to terminal afterwards, terminal after receiving encrypting and authenticating object information, utilize the identity information of oneself to be decrypted encrypting and authenticating object information and the identity information peeling off server end can know authentication result.So far, the unilateral authentication process of server end to terminal is completed.
Be understandable that, terminal also can be adopted and be carried out certification to server end in the same way, finally realizes the mutual certification between terminal and server end.
In addition, the certification between terminal and server end, first both sides all can initiate, without successively.In actual use, because terminal is generally hided after router, server end cannot be directly connected to terminal, so certification starts many by terminal initiatively initiation, carries out identity verify by server end to terminal; The disposal ability of server end resource such as CPU, internal memory etc. is also limited simultaneously, and in order to protect the resource of server end, first server end does not also normally start verification process.
In the terminal stating embodiment on the invention and server end authentication method, can arrange authentication mode as required, as only arranged unilateral authentication, or be set to must two-way authentication.Further, when two-way authentication is arranged, if unilateral authentication does not pass through, then without the need to carrying out two-way authentication again.In the present embodiment, server end can prevent unauthorized terminal to the access of server end to the certification of terminal, enhances the access security of authorized user; To the certification of server end, terminal can ensure that terminal can be linked into legal server end, prevent the control of illegal server end acquisition to terminal, also maintain the control of server end to the terminal of oneself on the other hand.
For ease of more clearly understanding the above embodiment of the present invention, the mode of mathematics is used to describe a kind of unidirectional verification process below, wherein: S representative server end, the identity information of SID representative server end, T GC group connector, the identity information of TID GC group connector, AuthDA, AuthDB represent verify data, Funct () represents operation function, and OpR0 represents local terminal operation result, and OpR represents opposite end operation result, op represents authentication mode, Encrypt () represents encryption, and Decipher () represents deciphering, and AuthR represents authentication result; Verification process is described below:
First, server end and terminal exchange identity information mutually
T<——>S:TID<——>SID
Then, server end initiates certification to terminal
S——>T:Encrypt{{[(AuthDA,AuthDB)op],TID},SID}
Next, the certification of terminal response server end
T:Decipher{Encrypt{{[(AuthDA,AuthDB)op],TID},SID},TID}
T:OpR=Funct[(AuthDA,AuthDB),op]
T——>S:Encrypt{{OpR,TID},SID}
Afterwards, server end is to terminal return authentication result
S:Decipher{Encrypt{{(OpR),TID},SID},SID}
S:OpR0=Funct[(AuthDA,AuthDB)op]
S: contrast terminal beams back the result of operation result and server end oneself computing come:
if[OpR0==OpR]
then
Echo " AuthR=Pass " // certification is passed through
Else
Echo " AuthR=Failure " // authentification failure
T——>S:Encrypt{{AuthR,TID},SID}。
Refer to Fig. 1, a kind of automated validation system 100 that the embodiment of the present invention provides, be suitable for the terminal and the server end authentication method that perform above-described embodiment, it is such as being installed on the software module of terminal or server end and comprising: signal dispatcher module 110, certification initiate information-generation module 130, authentication result generation module 150 and authentication response information generation module 170.
Wherein, signal dispatcher module 110 for the identity information that sends local terminal (one also namely in terminal and server end) and receive opposite end (also i.e. terminal and server end in another one) identity information to complete the identity information communication between local terminal and opposite end, certification is initiated information-generation module 130 and is sent to opposite end produces authentication response information to initiate information by opposite end response authentication and described authentication response information comprises opposite end utilizes described authentication mode to carry out computing to described verify data and the operation result that obtains for utilizing the identity information of the identity information of opposite end to the authentication information and local terminal that comprise verify data and authentication mode to be encrypted to produce certification to initiate information and certification being initiated information by signal dispatcher module 110, authentication result generation module 150 is decrypted to extract described operation result to described authentication response information for utilizing the identity information of local terminal after signal dispatcher module 110 receives described authentication response information, by the described operation result extracted and oneself utilize described authentication mode to carry out to described authentication result the operation result that computing obtains to compare, and produce opposite end whether by the authentication result of certification according to comparison result.
Above-mentioned authentication result generation module 150 also can be used for using the identity information of identity information to described authentication result and local terminal of opposite end to be encrypted to obtain encrypting and authenticating object information, and described encrypting and authenticating object information is sent to opposite end by signal dispatcher module 110.
In addition, information is initiated in the second certification comprising the second verify data and the second authentication mode using the identity information of local terminal to be encrypted that information sending module 110 also can be used for receiving opposite end generation, authentication response information generation module 170 is decrypted to extract described second verify data and the second authentication mode for using the identity information of local terminal to initiate information to described second certification, utilize described second authentication mode to carry out computing to described second verify data and obtain the second operation result, and utilize the identity information of the identity information of opposite end to described second operation result and local terminal to be encrypted to obtain the second authentication response information, described second authentication response information is sent to opposite end by signal dispatcher module 110 and uses the identity information of oneself to be decrypted to extract described second operation result to the second authentication response information received for opposite end, by described second operation result extracted and oneself utilize described second authentication mode to carry out to described second verify data the operation result that computing obtains to compare, and produce according to comparison result the second authentication result whether local terminal passes through certification.
Be understandable that, terminal and server end both can configure above-mentioned automated validation system.Wherein, terminal is such as display terminal, as LED display terminal or other display screen terminals.
In sum, the above embodiment of the present invention solves the problem must first registered when terminal connecting system, eliminates the trouble registered manually; The data of transmission are also the data of encryption, so be all have certain safety assurance at escape way or non-security channel transfer; This authentication mode can transfer two-way authentication to, avoids legal server end that traditional unilateral authentication may cause and loses control problem to terminal; This certification is that terminal and server end complete automatically, only basic link information need be configured when terminal configuration, the identity information of terminal and server information are completed automatically by two ends software, are transparent concerning user, improve ease for use and the experience of user.
Apply specific case herein to set forth the principle of terminal of the present invention and server end authentication method and automated validation system and execution mode, the explanation of above embodiment just understands method of the present invention and core concept thereof for helping; Meanwhile, for one of ordinary skill in the art, according to thought of the present invention; all will change in specific embodiments and applications; in sum, this description should not be construed as limitation of the present invention, and protection scope of the present invention should be as the criterion with appended claim.

Claims (10)

1. terminal and a server end authentication method, is characterized in that, comprising:
First end and the second end exchange identity information mutually, and wherein said first end is the one in terminal and server end, and described second end is the another one in described terminal and described server end;
Described first end uses the identity information of described second end to be encrypted to obtain certification to authentication information and the identity information of oneself and initiates information and information is initiated in described certification to be sent to described second end, and wherein said authentication information comprises verify data and authentication mode;
Described first end receives the authentication response information that described second end produces because responding described certification and initiating information, and wherein said authentication response information comprises and utilizes described authentication mode to carry out to described verify data operation result that computing obtains by described second end and use the identity information of described first end to be encrypted described operation result and the identity information of oneself and to produce by described second end; And
Described first end uses the identity information of oneself to be decrypted to extract described operation result to the described authentication response information received, by the described operation result extracted and oneself utilize described authentication mode to carry out to described verify data the operation result that computing obtains to contrast and produce described second end according to comparison result whether be sent to described second end by the authentication result of certification.
2. terminal as claimed in claim 1 and server end authentication method, it is characterized in that whether be sent to described second end by the authentication result of certification according to described second end of comparison result generation and comprise: described first end uses the identity information of described second end be encrypted to obtain encrypting and authenticating object information to described authentication result and the identity information of oneself and described encrypting and authenticating object information is sent to described second end.
3. terminal as claimed in claim 1 and server end authentication method, is characterized in that, when described authentication result be described second end by certification, then comprise step further:
Described first end receives the second certification that described second end produces and initiates information, and wherein said second certification is initiated information and used the identity information of described first end to be encrypted the second authentication information and the identity information of oneself by described second end and to produce and described second certification is initiated information and comprised the second verify data and the second authentication mode;
Described first end uses the identity information of oneself to be decrypted to extract described second verify data and described second authentication mode to receiving described second certification initiation information, utilize described second authentication mode to carry out computing to described second verify data and obtain the second operation result, and utilize the identity information of described second end be encrypted to obtain the second authentication response information to described second operation result and the identity information of oneself and described second authentication response information is sent to described second end, the identity information of oneself is used to be decrypted to extract described second operation result to the second authentication response information received for described second end, by described second operation result extracted and oneself utilize described second authentication mode to carry out to described second verify data the operation result that computing obtains to compare, and produce described first end whether by the second authentication result of certification according to comparison result, and
Receive described first end that described second end produces whether by the second authentication result of certification.
4. terminal as claimed in claim 1 and server end authentication method, it is characterized in that, described first end is terminal, and described terminal is LED display terminal.
5. terminal as claimed in claim 1 and server end authentication method, is characterized in that, also comprise step:
Before whether described second end of generation passes through the authentication result of certification, whether the identity information of the second end obtained when described first end comparison exchanges identity information is mutually consistent with the identity information of described second end obtained after the described authentication response information of deciphering.
6. an automated validation system, for the certification between terminal and server end, is characterized in that, comprising: signal dispatcher module, and information-generation module and authentication result generation module are initiated in certification;
Wherein, described signal dispatcher module is for sending the identity information of local terminal and receiving the identity information of opposite end to complete the identity information communication between local terminal and opposite end, described certification is initiated information-generation module and is sent to opposite end produces authentication response information to be responded described certification by opposite end and initiate information and described authentication response information comprises opposite end utilizes described authentication mode to carry out computing to described verify data and the operation result that obtains for utilizing the identity information of the identity information of opposite end to the authentication information and local terminal that comprise verify data and authentication mode to be encrypted to produce certification to initiate information and described certification being initiated information by described signal dispatcher module, described authentication result generation module is used for after receiving described authentication response information by described signal dispatcher module, utilize the identity information of local terminal to be decrypted to extract described operation result to described authentication response information, by the described operation result extracted and oneself utilize described authentication mode to carry out to described verify data the operation result that computing obtains to compare, and produce opposite end whether by the authentication result of certification according to comparison result.
7. automated validation system as claimed in claim 6, it is characterized in that, described authentication result generation module is also for using the identity information of the identity information of opposite end to described authentication result and local terminal to be encrypted to obtain encrypting and authenticating object information, and described encrypting and authenticating object information is sent to opposite end by described signal dispatcher module.
8. automated validation system as claimed in claim 6, is characterized in that, also comprise: authentication response information generation module; information is initiated in the second certification comprising the second verify data and the second authentication mode using the identity information of local terminal to be encrypted that described information sending module also produces for receiving opposite end, described authentication response information generation module is decrypted to extract described second verify data and the second authentication mode for using the identity information of local terminal to initiate information to described second certification, utilize described second authentication mode to carry out computing to described second verify data and obtain the second operation result, and utilize the identity information of the identity information of opposite end to described second operation result and local terminal to be encrypted to obtain the second authentication response information, described second authentication response information is sent to opposite end by described signal dispatcher module and uses the identity information of oneself to be decrypted to extract described second operation result to the second authentication response information received for described opposite end, by described second operation result extracted and oneself utilize described second authentication mode to carry out to described second verify data the operation result that computing obtains to compare, and produce according to comparison result the second authentication result whether local terminal passes through certification.
9. automated validation system as claimed in claim 6, is characterized in that, local terminal is the one in described terminal and described server end, and opposite end is the another one in described terminal and described server end.
10. automated validation system as claimed in claim 9, it is characterized in that, described terminal is LED display terminal.
CN201410564594.9A 2014-10-21 2014-10-21 Terminal and server end authentication method and automated validation system Active CN105530229B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410564594.9A CN105530229B (en) 2014-10-21 2014-10-21 Terminal and server end authentication method and automated validation system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410564594.9A CN105530229B (en) 2014-10-21 2014-10-21 Terminal and server end authentication method and automated validation system

Publications (2)

Publication Number Publication Date
CN105530229A true CN105530229A (en) 2016-04-27
CN105530229B CN105530229B (en) 2019-01-18

Family

ID=55772215

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410564594.9A Active CN105530229B (en) 2014-10-21 2014-10-21 Terminal and server end authentication method and automated validation system

Country Status (1)

Country Link
CN (1) CN105530229B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1747382A (en) * 2005-09-06 2006-03-15 徐文祥 Accidental enciphering and identity identifying method
CN101471770A (en) * 2007-12-24 2009-07-01 毛华 Method for determining inquiry answer type bidirectional identification and business, and encipher device applying the method
CN102457373A (en) * 2010-10-19 2012-05-16 捷达世软件(深圳)有限公司 System and method for bidirectionally authenticating handheld equipment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1747382A (en) * 2005-09-06 2006-03-15 徐文祥 Accidental enciphering and identity identifying method
CN101471770A (en) * 2007-12-24 2009-07-01 毛华 Method for determining inquiry answer type bidirectional identification and business, and encipher device applying the method
CN102457373A (en) * 2010-10-19 2012-05-16 捷达世软件(深圳)有限公司 System and method for bidirectionally authenticating handheld equipment

Also Published As

Publication number Publication date
CN105530229B (en) 2019-01-18

Similar Documents

Publication Publication Date Title
CN108684041B (en) System and method for login authentication
CN103118027B (en) The method of TLS passage is set up based on the close algorithm of state
CN100496025C (en) Ternary equal identification based reliable network access control method
CN101340437B (en) Time source regulating method and system
CN110336774A (en) Hybrid Encryption decryption method, equipment and system
EP2590356A1 (en) Method, device and system for authenticating gateway, node and server
CN106656510A (en) Encryption key acquisition method and system
CN106790064B (en) The method that both sides are communicated in credible root server-cloud computing server model
CN106576043A (en) Virally distributable trusted messaging
CN103051453A (en) Digital certificate-based mobile terminal network security trading system and digital certificate-based mobile terminal network security trading method
CN102215221A (en) Methods and systems for secure remote wake, boot, and login to a computer from a mobile device
CN104660605A (en) Multi-factor identity authentication method and system
CN102036242A (en) Access authentication method and system in mobile communication network
CN109309566B (en) Authentication method, device, system, equipment and storage medium
CN103916363A (en) Communication security management method and system for encryption machine
EP2827529B1 (en) Method, device, and system for identity authentication
CN104350703B (en) The safe transmission of message
CN104901940A (en) 802.1X network access method based on combined public key cryptosystem (CPK) identity authentication
CN104486087A (en) Digital signature method based on remote hardware security modules
CN106712939A (en) Offline key transmission method and device
CN106357404A (en) Data encryption method based on NFC chip security authentication
CN105323063A (en) Identity verification method of mobile terminal and fixed intelligent terminal based on two-dimensional code
CN104506509A (en) Multifunctional security authentication terminal and authentication method based on terminal
CN102739660B (en) Key exchange method for single sign on system
CN101437228B (en) Method, apparatus and system for implementing wireless business based on smart card

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address
CP03 Change of name, title or address

Address after: 710075 DEF101, Zero One Square, Xi'an Software Park, No. 72 Zhangbajie Science and Technology Second Road, Xi'an High-tech Zone, Shaanxi Province

Patentee after: Xi'an Nova Nebula Technology Co., Ltd.

Address before: 710075 Qinfengge D District 401, Xi'an Software Park, 68 Science and Technology Second Road, Xi'an High-tech Zone, Shaanxi Province

Patentee before: Xian Novastar Electronic Technology Co., Ltd.