CN105530229B - Terminal and server end authentication method and automated validation system - Google Patents

Terminal and server end authentication method and automated validation system Download PDF

Info

Publication number
CN105530229B
CN105530229B CN201410564594.9A CN201410564594A CN105530229B CN 105530229 B CN105530229 B CN 105530229B CN 201410564594 A CN201410564594 A CN 201410564594A CN 105530229 B CN105530229 B CN 105530229B
Authority
CN
China
Prior art keywords
authentication
information
certification
terminal
result
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410564594.9A
Other languages
Chinese (zh)
Other versions
CN105530229A (en
Inventor
韩丹
赵强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xi'an Nova Nebula Technology Co., Ltd.
Original Assignee
Xian Novastar Electronic Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Novastar Electronic Technology Co Ltd filed Critical Xian Novastar Electronic Technology Co Ltd
Priority to CN201410564594.9A priority Critical patent/CN105530229B/en
Publication of CN105530229A publication Critical patent/CN105530229A/en
Application granted granted Critical
Publication of CN105530229B publication Critical patent/CN105530229B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The present invention relates to a kind of terminal and server end authentication method and a kind of automated validation systems, and the method comprising the steps of: first end and second end are exchanged with each other identity information;First end encrypts to obtain certification initiation information and is sent to second end using the identity information of second end to authentication information and the identity information of oneself;First end receive second end because response authenticates initiate information due to the authentication response information that generates, wherein authentication response information includes to be carried out operation result that operation obtains to authentication data using the authentication mode in authentication information by second end and generated using the identity information of first end to operation result and the identity information encryption of oneself by second end;And first end the authentication response information received is decrypted using the identity information of oneself to extract operation result, the operation result extracted and the operation result of oneself are compared after generate authentication result to second end.Therefore, the present invention can promote convenience and the safety of certification.

Description

Terminal and server end authentication method and automated validation system
Technical field
The present invention relates to field of display technology, in particular to a kind of terminal and server end authentication method and one kind are automatic Verification System.
Background technique
With the continuous quickening of LED display industrial application of information technology degree process, more and more display terminals pass through interconnection Net is integrated into LED display management system.How to guarantee display terminal automatically, safety, legal be linked into management System, being one is worth the problem of inquiring into.
Existing technology generally completes system registry and verifying by the way of following:
Firstly, a LED display terminal will be linked into LED display management system, it is necessary to first in a management system into Row registration.Later LED display terminal is registered, the functional module that can be just managed in system is used.In traditional mode In, for registration, needs someone's (generally display screen terminal operation maintenance personnel) to arrive first and extract some terminals at LED display terminal Identification information (can uniquely indicate a terminal, such as MAC Address, terminal display control program No. S/N number, service number etc.), when These right information are all that user is visible.Then management system is logged in by other people (generally business personnels) again, by artificial Mode is by the data input of display screen terminal to management system, and in Input Process, the encrypted message of display screen terminal is arranged.
After LED display terminal has already registered with management system, business personnel can tell the O&M of LED display terminal The encrypted message of personnel's LED display terminal.At this time operation maintenance personnel again in LED display terminal select terminal identification information, Configurating terminal encrypted message and configure other necessary information (such as server link information).Configure and save setting just now After confidence breath, LED display terminal begins to interact with server, confirms identity.
Authentication is carried out later, and LED display terminal can periodically be asked from the transmission of trend server according to configuration information It asks, terminal identification information, encrypted message and other relevant informations is contained in solicited message.Server receives the information of terminal Afterwards according to terminal identification information and encrypted message, judge whether terminal legal (namely whether registered, just whether encrypted message Really etc.), and make corresponding response.
In authentication phase, if correctly, sending back to service response relevant to the LED display terminal;If certification is not Pass through, then returns to error message.
It for above-mentioned traditional mode, is authenticated using user name (terminal iidentification) and password (terminal password) Mode, although can refuse some unregistered illegal terminal accesses, there are still some following problems: (a) must be artificial Typing end message completes registration, more troublesome;(b) authentication information generally pass through transmit in plain text or by clear-text way but It is transmitted in encrypted tunnel, this mode has certain security risk;(c) user is visible due to terminal identification information, The third party is easy to forge LED display terminal, sends and requests to server;(d) authentication mode is unidirectional, is only serviced Device authenticates terminal and then probably loses to terminal without terminal authentication server if there is the third party palms off server Control.
Summary of the invention
Therefore, propose that a kind of terminal and server end is recognized to solve defect and deficiency, the present invention existing in the prior art Card method and a kind of automated validation system, to promote convenience and the safety of certification.
Specifically, a kind of terminal and server end authentication method provided in an embodiment of the present invention, comprising steps of (a) first End is exchanged with each other identity information with second end, wherein the first end is one of terminal and server end person, the second end For the another one in the terminal and the server end;(b) first end is using the identity information of the second end to recognizing Card information and the identity information of oneself are encrypted to obtain certification initiation information and certification initiation information is sent to institute Second end is stated, wherein the authentication information includes authentication data and authentication mode;(c) first end receive the second end because The authentication response information that the certification is initiated information and generated is responded, wherein the authentication response information includes by the second end The obtained operation result of operation is carried out to the authentication data using the authentication mode and by described in the second end use The identity information of first end encrypts the operation result and the identity information of oneself and is generated;And (d) described first End is decrypted the authentication response information received using the identity information of oneself to extract the operation result, will mention The operation result taken out and the operation result oneself authentication data progress operation obtained using the authentication mode It compares and the second end is generated according to comparison result whether passes through the authentication result of certification and be sent to the second end.
In one embodiment of the invention, above-mentioned to generate whether the second end passes through recognizing for certification according to comparison result Card result be sent to the second end include: the first end using the identity information of the second end to the authentication result and The identity information of oneself is encrypted to obtain encryption authentication result information and the encryption authentication result information is sent to institute State second end.
In one embodiment of the invention, when the authentication result is that the second end passes through certification, above-mentioned authenticating party Method further comprises step: (e) described first end receives the second certification that the second end generates and initiates information, wherein described the Two certifications initiate information and use the identity information of the first end to the second authentication information and the identity of oneself by the second end Information encrypted and generated and it is described second certification initiate information include the second authentication data and the second authentication mode;(f) institute First end is stated the second certification initiation information received is decrypted to extract described second and recognize using the identity information of oneself Card data and second authentication mode carry out operation to second authentication data using second authentication mode and obtain the Two operation results and using the second end identity information to second operation result and oneself identity information carry out Encryption is to obtain the second authentication response information and second authentication response information is sent to the second end, for described the Two ends are decrypted the second authentication response information received using the identity information of oneself to extract the second operation knot Fruit, by the second operation result extracted and oneself using second authentication mode to second authentication data carry out operation Obtained operation result is compared and generates the second certification the knot whether first end passes through certification according to comparison result Fruit;And (g) receive the second the authentication result whether first end that the second end generates passes through certification.
In one embodiment of the invention, above-mentioned first end is terminal, and the terminal is LED display terminal.
In one embodiment of the invention, above-mentioned terminal and server end authentication method, which further comprises the steps of:, is generating institute Before stating the authentication result whether second end passes through certification, the first end compares second obtained when being exchanged with each other identity information Whether the identity information at end and the identity information for decrypting the second end obtained after the authentication response information are consistent.
In addition, a kind of automated validation system provided in an embodiment of the present invention, for the certification between terminal and server end, Comprising: which signal dispatcher module, certification initiate information-generation module and authentication result generation module.Wherein, the information is received Hair module is used to send the identity information of local terminal and receives the identity information of opposite end to complete the identity between local terminal and opposite end Information exchange, the certification initiate information-generation module and are used for the identity information using opposite end to including authentication data and authenticating party The authentication information of formula and the identity information of local terminal are encrypted to generate to authenticate and initiate information and by the signal dispatcher module Certification initiation information is sent to opposite end to respond certification initiation information by opposite end and generate authentication response information and The authentication response information carries out operation knot obtained from operation to the authentication data using the authentication mode comprising opposite end Fruit, the authentication result generation module are used to utilize this after receiving the authentication response information by the signal dispatcher module The operation that the identity information at end is decrypted the authentication response information to extract the operation result, will extract As a result the obtained operation result of operation is carried out to the authentication result using the authentication mode with oneself to be compared and basis Comparison result generates the authentication result whether opposite end passes through certification.
In one embodiment of the invention, above-mentioned authentication result generation module is also used for the identity information pair of opposite end The identity information of the authentication result and local terminal is encrypted to obtain encryption authentication result information, and encryption certification knot Fruit information is sent to opposite end by the signal dispatcher module.
In one embodiment of the invention, above-mentioned automated validation system further include: authentication response information generation module;Institute State the second certification number encrypted comprising the identity information using local terminal that information sending module is also used to receive opposite end generation Information is initiated according to the second certification with the second authentication mode, the authentication response information generation module is used for the identity using local terminal Information is initiated information to second certification and is decrypted to extract second authentication data and the second authentication mode, utilization Second authentication mode obtains the second operation result to second authentication data progress operation and utilizes the identity of opposite end Information encrypts the identity information of second operation result and local terminal to obtain the second authentication response information, and described second Authentication response information is sent to opposite end by the signal dispatcher module so that the opposite end uses the identity information of oneself to receipts To the second authentication response information the second operation knot to extract second operation result, will extract is decrypted Fruit with oneself using second authentication mode to second authentication data carry out the obtained operation result of operation be compared, And the second authentication result whether local terminal passes through certification is generated according to comparison result.
In one embodiment of the invention, above-mentioned local terminal is one of terminal and server end person, opposite end be terminal and To another one in server end.
In one embodiment of the invention, above-mentioned terminal is LED display terminal.
The embodiment of the present invention solves the problems, such as first register in terminal access system, eliminates and manually registers Trouble;The data of transmission are also the data of encryption, so either having one in exit passageway or non-security channel transfer Fixed safety assurance;The authentication mode can switch to two-way authentication, avoid the legal clothes that traditional unilateral authentication may cause Business device end loses the control problem to terminal;The certification is that terminal is automatically performed with server end, in terminal configuration Basic link information only need to be configured, the identity information and server information of terminal are automatically performed by both ends software, to user For be it is transparent, improve the ease for use and experience of user.
Through the following detailed description with reference to the accompanying drawings, other aspects of the invention and feature become obvious.But it should know Road, which is only the purpose design explained, not as the restriction of the scope of the present invention, this is because it should refer to Appended claims.It should also be noted that unless otherwise noted, it is not necessary to which scale attached drawing, they only try hard to concept Ground illustrates structure and process described herein.
Detailed description of the invention
Below in conjunction with attached drawing, specific embodiments of the present invention will be described in detail.
Fig. 1 is a kind of module diagram of automated validation system of the embodiment of the present invention.
Specific embodiment
In order to make the foregoing objectives, features and advantages of the present invention clearer and more comprehensible, with reference to the accompanying drawing to the present invention Specific embodiment be described in detail.
Specifically, the realization of the unilateral authentication in a kind of terminal and server end authentication method provided in an embodiment of the present invention Mode is as follows, is illustrated as an example using server end as certification originating end.
Firstly, server end and terminal are exchanged with each other identity information.
Then, server end can tentatively judge after receiving the identity information of terminal, if having certain certification Feature, such as product characteristic mark, then carry out next step certification;Directly refuse if without if.Terminal also can be to server end Identity information tentatively judged, if having certain authentication feature, such as the letter of identity for thering is certain company to issue, then after It is continuous to authenticate in next step;If refusing without if.
Then, server end initiates to authenticate to terminal: the identity information of server end using terminal is to authentication information and certainly Oneself identity information is encrypted to generate to authenticate and initiate information, then information is initiated in certification and is sent to terminal;Here, certification letter Breath includes authentication data and authentication mode.
Next, the certification at terminal response server end: after terminal receives the initiation information of the certification from server end, first Information is initiated to the certification received with the identity information of oneself to be decrypted, and removes the identity information of server end then to extract Out include the authentication information of authentication data and authentication mode, operation is carried out to authentication data using the authentication mode of acquisition and is transported Calculate result;Then operation result and the identity information of oneself are encrypted to generate authentication response using the identity information of server end Information is sent to server.
Later, server end is to terminal return authentication result: after server end receives the authentication response information that terminal is sent back to, First authentication response information is decrypted with the identity information of oneself, removes the identity information of terminal to extract above-mentioned operation result, The operation result extracted is carried out with oneself using the operation result that above-mentioned authentication mode carries out operation to above-mentioned authentication data Comparison, while also comparing the identity information of the terminal obtained twice.If the comparison results are consistent, then replys terminal authentication and pass through; If the comparison results are inconsistent, then replys authentification failure, refusal terminal access;Here, that is to say that server end generates terminal and is The no authentication result by certification.In addition, server end also utilizes the identity information of terminal to certification after generating authentication result As a result it is encrypted with the identity information of oneself to obtain encryption authentication result information, it later again will encryption authentication result information hair Terminal is given, terminal carries out encryption authentication result information using the identity information of oneself after receiving encryption authentication result information It decrypts and removes the identity information of server end you can learn that authentication result.So far, server end unidirectionally recognizing to terminal is completed Card process.
Server end is authenticated it is understood that same mode can also be used in terminal, it is final realize terminal and Mutual authentication between server end.
In addition, the certification between terminal and server end, both sides can initiate first, without successively.In actual use process In, since terminal is generally hided behind router, server end cannot be connected directly to terminal, so certification starts mostly by terminal It actively initiates, identity identification is carried out to terminal by server end;The processing energy of server end resource such as CPU, memory etc. simultaneously Power is also limited, and in order to protect the resource of server end, server end is also usually not start verification process first.
In the terminal and server end authentication method of the above embodiment of the present invention, setting authenticating party can according to need Unilateral authentication is such as only arranged in formula, or being set as must two-way authentication.Also, in two-way authentication setting, if unilateral authentication is not Pass through, then no longer needs to carry out two-way authentication.In the present embodiment, server end can prevent unauthorized terminal to the certification of terminal Access to server end enhances the access security of authorized user;Terminal can guarantee terminal to the certification of server end Legal server end is had access to, prevents illegal server end from obtaining the control to terminal, on the other hand also safeguards Control of the server end to the terminal of oneself.
For convenient for being more clearly understood that the above embodiment of the present invention, describe a kind of unidirectional to recognize underneath with the mode of mathematics Card process, in which: S representative server end, the identity information at SID representative server end, T GC group connector, the body of TID GC group connector Part information, AuthDA, AuthDB represent authentication data, and Funct () represents operation function, and OpR0 represents local terminal operation result, OpR represents opposite end operation result, and op represents authentication mode, and Encrypt () represents encryption, and Decipher () represents decryption, AuthR represents authentication result;Verification process is described as follows:
Firstly, server end and terminal are exchanged with each other identity information
T<--->S:TID<--->SID
Then, server end initiates to authenticate to terminal
S --- > T:Encrypt { { [(AuthDA, AuthDB) op], TID }, SID }
Next, the certification at terminal response server end
T:Decipher { Encrypt { { [(AuthDA, AuthDB) op], TID }, SID }, TID }
T:OpR=Funct [(AuthDA, AuthDB), op]
T --- > S:Encrypt { { OpR, TID }, SID }
Later, server end is to terminal return authentication result
S:Decipher { Encrypt { { (OpR), TID }, SID }, SID }
S:OpR0=Funct [(AuthDA, AuthDB) op]
S: the result of comparison the terminal operation result sent back and server end oneself operation:
If [OpR0==OpR]
then
Echo " AuthR=Pass " // certification passes through
Else
Echo " AuthR=Failure " // authentification failure
T --- > S:Encrypt { { AuthR, TID }, SID }.
Referring to Figure 1, a kind of automated validation system 100 provided in an embodiment of the present invention, is adapted for carrying out above-described embodiment Terminal and server end authentication method is, for example, to be installed on the software module of terminal or server end and include: information transmit-receive Information-generation module 130, authentication result generation module 150 and authentication response information generation module are initiated in module 110, certification 170。
Wherein, signal dispatcher module 110 is used to send the identity letter of local terminal (namely one of terminal and server end person) Breath and the identity information of reception opposite end (namely to another one in terminal and server end) are to complete between local terminal and opposite end Identity information communication, certification initiate information-generation module 130 and are used for the identity information using opposite end to comprising authentication data and recognizing The authentication information of card mode and the identity information of local terminal are encrypted to generate certification initiation information and pass through signal dispatcher module Certification is initiated information by 110 to be sent to opposite end and initiates information to respond certification by opposite end and generate authentication response information and described recognize It demonstrate,proves response message and operation result obtained from operation, certification is carried out to the authentication data using the authentication mode comprising opposite end As a result generation module 150 after signal dispatcher module 110 receives the authentication response information for utilizing the identity information of local terminal The authentication response information is decrypted with extract the operation result, by the operation result extracted and oneself benefit The operation result that operation obtains is carried out to the authentication result with the authentication mode to be compared and generated according to comparison result Whether opposite end passes through the authentication result of certification.
Above-mentioned authentication result generation module 150 can also be used in the identity information using opposite end to the authentication result and local terminal Identity information encrypted to obtain encryption authentication result information, and the encryption authentication result information passes through information transmit-receive Module 110 is sent to opposite end.
In addition, information sending module 110 can also be used to receive the identity information progress comprising using local terminal that opposite end generates Information is initiated in second authentication data of encryption and the second certification of the second authentication mode, and authentication response information generation module 170 is used In the identity information using local terminal to it is described second certification initiate information be decrypted with extract second authentication data and Second authentication mode, using second authentication mode to second authentication data carry out operation obtain the second operation result, And the identity information of second operation result and local terminal is encrypted using the identity information of opposite end to obtain second and recognize Response message is demonstrate,proved, second authentication response information is sent to opposite end by signal dispatcher module 110 so that opposite end uses oneself Identity information the second authentication response information received is decrypted to extract second operation result, by what is extracted Second operation result and the fortune oneself second authentication data progress operation obtained using second authentication mode Result is calculated to be compared and generate the second authentication result whether local terminal passes through certification according to comparison result.
It is understood that both terminal and server end can configure above-mentioned automated validation system.Wherein, terminal example Display terminal in this way, as LED display terminal or other display screen terminals.
In conclusion the above embodiment of the present invention solves the problems, such as first register in terminal access system, remove from The trouble manually registered;The data of transmission are also the data of encryption, so either in exit passageway or non-security Channel transfer has certain safety assurance;The authentication mode can switch to two-way authentication, and avoiding traditional unilateral authentication can Legal server end caused by energy loses the control problem to terminal;The certification is that terminal is automatically performed with server end , basic link information need to be only configured in terminal configuration, the identity information and server information of terminal are by both ends software Be automatically performed, be for users it is transparent, improve the ease for use and experience of user.
Specific case used herein is to terminal and server end of the present invention authentication method and automated validation system Principle and embodiment is expounded, method and its core of the invention that the above embodiments are only used to help understand Thought;At the same time, for those skilled in the art, according to the thought of the present invention, in specific embodiment and application range It is upper that there will be changes, in conclusion the contents of this specification are not to be construed as limiting the invention, protection model of the invention The attached claims should be subject to by enclosing.

Claims (10)

1. a kind of terminal and server end authentication method characterized by comprising
First end and second end are exchanged with each other identity information, wherein the first end is one of terminal and server end person, institute Stating second end is the another one in the terminal and the server end;
The first end encrypts to obtain authentication information and the identity information of oneself using the identity information of the second end Information is initiated to certification and certification initiation information is sent to the second end, wherein the authentication information includes certification number According to and authentication mode;
The first end receives the authentication response information that the second end generates due to responding the certification and initiating information, wherein institute Stating authentication response information includes to carry out the fortune that operation obtains to the authentication data using the authentication mode by the second end It calculates result and uses the identity information of the first end to the operation result and the identity information of oneself by the second end It is encrypted and is generated;And
The first end is decrypted the authentication response information received using the identity information of oneself described to extract Operation result, by the operation result extracted and oneself using the authentication mode to the authentication data carry out operation obtain To operation result compare and the second end is generated according to comparison result whether pass through the authentication result of certification and be sent to The second end.
2. terminal and server end as described in claim 1 authentication method, which is characterized in that described in being generated according to comparison result It includes: the body that the first end uses the second end that the authentication result whether second end passes through certification, which is sent to the second end, Part information encrypts the authentication result and the identity information of oneself to obtain encryption authentication result information and described will add Close authentication result information is sent to the second end.
3. terminal and server end as described in claim 1 authentication method, which is characterized in that when the authentication result is described Second end then further comprises step by certification:
The first end receives the second certification that the second end generates and initiates information, wherein second certification initiate information by The second end encrypts the second authentication information and the identity information of oneself using the identity information of the first end and is produced It includes the second authentication data and the second authentication mode that information is initiated in raw and described second certification;
The first end is decrypted using the identity information of oneself to the second certification initiation information is received to extract It states the second authentication data and second authentication mode, second authentication data is transported using second authentication mode It calculates and obtains the second operation result and utilize the identity information of the second end to second operation result and the identity of oneself Information is encrypted to obtain the second authentication response information and second authentication response information is sent to the second end, with The second authentication response information received is decrypted using the identity information of oneself to extract described for the second end Two operation results, by second operation result extracted and oneself using second authentication mode to it is described second certification Data carry out the operation result that operation obtains and are compared and generate whether the first end passes through certification according to comparison result Second authentication result;And
Receive the second the authentication result whether first end that the second end generates passes through certification.
4. terminal and server end as described in claim 1 authentication method, which is characterized in that the first end is terminal, and The terminal is LED display terminal.
5. terminal and server end as described in claim 1 authentication method, which is characterized in that further comprise the steps of:
Before generating the second end and whether passing through the authentication result of certification, the first end comparison is exchanged with each other identity information When the identity information of second end that obtains and the identity information of the second end obtained after the decryption authentication response information be It is no consistent.
6. a kind of automated validation system, for the certification between terminal and server end characterized by comprising information transmit-receive Information-generation module and authentication result generation module are initiated in module, certification;
Wherein, the signal dispatcher module is used to send the identity information of local terminal and receives the identity information of opposite end to complete this Identity information communication between end and opposite end, the certification initiate information-generation module and are used for the identity information using opposite end to packet The identity information of authentication information and local terminal containing authentication data and authentication mode is encrypted to generate certification initiation information and lead to Cross the signal dispatcher module certification initiation information is sent to opposite end to respond certification initiation information by opposite end and It generates authentication response information and the authentication response information includes that opposite end carries out the authentication data using the authentication mode Operation result obtained from operation, the authentication result generation module be used for by the signal dispatcher module receive described in recognize Card response message after the authentication response information is decrypted using the identity information of local terminal with extract the operation result, By the operation result extracted and the operation oneself obtained using the authentication mode to authentication data progress operation As a result it is compared and the authentication result whether opposite end passes through certification is generated according to comparison result.
7. automated validation system as claimed in claim 6, which is characterized in that the authentication result generation module is also used for The identity information of opposite end encrypts the identity information of the authentication result and local terminal to obtain encryption authentication result information, and And the encryption authentication result information is sent to opposite end by the signal dispatcher module.
8. automated validation system as claimed in claim 6, which is characterized in that further include: authentication response information generation module;Institute State the second certification number encrypted comprising the identity information using local terminal that information sending module is also used to receive opposite end generation Information is initiated according to the second certification with the second authentication mode, the authentication response information generation module is used for the identity using local terminal Information is initiated information to second certification and is decrypted to extract second authentication data and the second authentication mode, utilization Second authentication mode obtains the second operation result to second authentication data progress operation and utilizes the identity of opposite end Information encrypts the identity information of second operation result and local terminal to obtain the second authentication response information, and described second Authentication response information is sent to opposite end by the signal dispatcher module so that the opposite end uses the identity information of oneself to receipts To the second authentication response information the second operation knot to extract second operation result, will extract is decrypted Fruit with oneself using second authentication mode to second authentication data carry out the obtained operation result of operation be compared, And the second authentication result whether local terminal passes through certification is generated according to comparison result.
9. automated validation system as claimed in claim 6, which is characterized in that local terminal is in the terminal and the server end One, opposite end be the terminal and the server end in another one.
10. automated validation system as claimed in claim 9, which is characterized in that the terminal is LED display terminal.
CN201410564594.9A 2014-10-21 2014-10-21 Terminal and server end authentication method and automated validation system Active CN105530229B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410564594.9A CN105530229B (en) 2014-10-21 2014-10-21 Terminal and server end authentication method and automated validation system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410564594.9A CN105530229B (en) 2014-10-21 2014-10-21 Terminal and server end authentication method and automated validation system

Publications (2)

Publication Number Publication Date
CN105530229A CN105530229A (en) 2016-04-27
CN105530229B true CN105530229B (en) 2019-01-18

Family

ID=55772215

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410564594.9A Active CN105530229B (en) 2014-10-21 2014-10-21 Terminal and server end authentication method and automated validation system

Country Status (1)

Country Link
CN (1) CN105530229B (en)

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1747382B (en) * 2005-09-06 2011-06-08 湖南泓达科技有限公司 Random encryption and identity authentication
CN101471770B (en) * 2007-12-24 2011-08-03 毛华 Method for determining inquiry answer type bidirectional identification and business
CN102457373B (en) * 2010-10-19 2016-09-07 鸿富锦精密工业(深圳)有限公司 Handheld device bi-directional verification system and method

Also Published As

Publication number Publication date
CN105530229A (en) 2016-04-27

Similar Documents

Publication Publication Date Title
CN102215221B (en) Methods and systems for secure remote wake, boot, and login to a computer from a mobile device
CN101340436B (en) Method and apparatus implementing remote access control based on portable memory apparatus
Naik et al. Cyber security—iot
CN111512608B (en) Trusted execution environment based authentication protocol
EP2932428B1 (en) Method of allowing establishment of a secure session between a device and a server
CN102833244B (en) Communication method for authentication by fingerprint information
CN105162797B (en) A kind of mutual authentication method based on video monitoring system
CN105656862B (en) Authentication method and device
CN104935441B (en) A kind of authentication method and relevant apparatus, system
CN102664898A (en) Fingerprint identification-based encrypted transmission method, fingerprint identification-based encrypted transmission device and fingerprint identification-based encrypted transmission system
CN105553666B (en) Intelligent power terminal safety authentication system and method
CN103401880A (en) Automatic login industrial control system and control method
CN104322003A (en) Cryptographic authentication and identification method using real-time encryption
KR101631635B1 (en) Method, device, and system for identity authentication
CN104901940A (en) 802.1X network access method based on combined public key cryptosystem (CPK) identity authentication
CN103916363A (en) Communication security management method and system for encryption machine
CN105323063B (en) The auth method of mobile terminal and fixed intelligent terminal based on two dimensional code
CN102893575A (en) One time passwords with ipsec and ike version 1 authentication
CN102025748B (en) Method, device and system for acquiring user name of Kerberos authentication mode
CN104994115B (en) A kind of login authentication method and system
CN105024813A (en) Server, user equipment and interactive method of the user equipment and the server
CN202206419U (en) Network security terminal and interactive system based on terminal
Suresh et al. A TPM-based architecture to secure VANET
CN105681350A (en) Zero interaction double-factor authentication system and method
CN102571341B (en) A kind of Verification System based on dynamic image and authentication method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address

Address after: 710075 DEF101, Zero One Square, Xi'an Software Park, No. 72 Zhangbajie Science and Technology Second Road, Xi'an High-tech Zone, Shaanxi Province

Patentee after: Xi'an Nova Nebula Technology Co., Ltd.

Address before: 710075 Qinfengge D District 401, Xi'an Software Park, 68 Science and Technology Second Road, Xi'an High-tech Zone, Shaanxi Province

Patentee before: Xian Novastar Electronic Technology Co., Ltd.

CP03 Change of name, title or address