CN106357679A - Method, system and client for password authentication, and server and intelligent equipment - Google Patents

Method, system and client for password authentication, and server and intelligent equipment Download PDF

Info

Publication number
CN106357679A
CN106357679A CN201610939568.9A CN201610939568A CN106357679A CN 106357679 A CN106357679 A CN 106357679A CN 201610939568 A CN201610939568 A CN 201610939568A CN 106357679 A CN106357679 A CN 106357679A
Authority
CN
China
Prior art keywords
key
data
password
client
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610939568.9A
Other languages
Chinese (zh)
Other versions
CN106357679B (en
Inventor
陈柳章
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Minghua Alliance Technology Co Ltd
Original Assignee
Beijing Minghua Alliance Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Minghua Alliance Technology Co Ltd filed Critical Beijing Minghua Alliance Technology Co Ltd
Priority to CN201610939568.9A priority Critical patent/CN106357679B/en
Publication of CN106357679A publication Critical patent/CN106357679A/en
Application granted granted Critical
Publication of CN106357679B publication Critical patent/CN106357679B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0884Network architectures or network communication protocols for network security for authentication of entities by delegation of authentication, e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention is suitable for the technical field of communications, and provides a method, a system and a client for password authentication, and a server and intelligent equipment. The method comprises the following steps that: the client encrypts input password/key data according to a first key to generate a first encrypted password and sends the first encrypted password to the server; the server decrypts the first encrypted password according to the first key, encrypts the input password/key data obtained after decryption according to a second key to generate a second encrypted password, generates an authentication command message according to the second encrypted password, and forwards the authentication command message to the intelligent equipment; and the intelligent equipment obtains original password/key data from a local place, decrypts the authentication command message by using the second key, then compares the input password data obtained after decryption with the original password data or compares the input key data obtained after decryption with the original key data, and returns an authentication result generated according to a comparison result to the client through the server. The invention can avoid disclosure of the password/key data and the error rate is low.

Description

The method of cipher authentication, system and client, server and smart machine
Technical field
The invention belongs to communication technical field, more particularly, to a kind of method of cipher authentication, system and client, server And smart machine.
Background technology
User cipher is used to the identity of operator is confirmed, is generally possible to provide correct user cipher to be quilt It is considered validated user, it is possible to obtain operating right corresponding with user cipher.After initial password storage in the server, visitor Family end subscriber can client input password, and send described input password be authenticated to server, with determine input close Whether code mates with initial password, if it does, then can determine input password correctly, user can normal login service device. By this cipher authentication mode, disabled user can be limited and log in client.
However, in realizing process of the present invention, inventor finds that the method for the cipher authentication that prior art provides at least is deposited In following problem:
During user's registration, by the initial password of user setup, in plain text or initial password ciphertext is saved in server.User During certification, by the input password of user input after line transmission is to server, server is defeated by user input for client Enter the initial password that password preserved with server in plain text or initial password ciphertext data is compared, if consistent, certification is led to Cross;Otherwise fail.
The mode of this cipher authentication, initial password is in plain text or initial password ciphertext is saved in server database, and Leak in the data base administration of server or storage dangerous, database data may be led to reveal, occur initial Decodement or initial password the leakage of password event, and, the input password of client user's input is direct by circuit It is transferred to server, therefore input password is easily stolen.
Additionally, in the cipher authentication mode that provides of prior art, authentication command message is generated to server by client, by Server carries out the certification of password.This cipher authentication mode, needs soft according to the different client of different client exploitations Part, because client haves the characteristics that wide variety and updating decision, so the exploitation of client software, debugging and maintenance workload Greatly, and the probability that malfunctions is high.
Content of the invention
In view of this, the embodiment of the present invention provides a kind of method of cipher authentication, system and client, server and intelligence Equipment, may lead to password to reveal event with the method solving the cipher authentication of prior art offer, and the probability malfunctioning is high Problem.
In a first aspect, providing a kind of method of cipher authentication, original password data or primary key data storage in intelligence In energy equipment, methods described includes:
Client obtains input code data or input key data, according to first key encryption described input password number According to or described input key data, generate the first Crypted password, and send described first Crypted password to server;
Server according to described first key to described first Crypted password deciphering, obtain described input code data or After described input key data, described input code data or described input key data are encrypted according to the second key, generate Second Crypted password, and generated after authentication command message according to described second Crypted password, described authentication command message is passed through Client is forwarded to smart machine;
Smart machine first obtains original password data or primary key data, then with described second key to described certification Command message is decrypted, and obtains described input code data or described input key data, then by described input password Data is compared with described original password data or is compared described input key data with described primary key data Right, authentication result is generated according to comparison result, and described authentication result is returned to client by server.
Further, if primary key data storage, in smart machine, obtains input code data in described client Afterwards, also include:
The described input code data getting is converted into described input key data by client.
Further, described first key is preset or consulted to generate before client with server communication;
Described second key is preset or consulted to generate before server with smart device communication.
Further, described first key is symmetric key or described first key is unsymmetrical key;
Described second key is symmetric key or described second key is unsymmetrical key.
Further, when described first key is unsymmetrical key, public private key pair is generated by server, public key is sent to Client;
When described second key is unsymmetrical key, public private key pair is generated by smart machine, public key is sent to server.
Further, described original password data or described primary key data storage are in the safety chip of smart machine In.
Second aspect, provides a kind of client, and described client includes:
First Crypted password sending module, for obtaining input code data or input key data, close according to first Key encryption described input code data or described input key data, generates the first Crypted password, and send described first plus Password is to server;
Authentication command packet forwarding module, for authentication command message is forwarded to smart machine, described authentication command report Literary composition is server according to described first key to described first Crypted password deciphering, obtains described input code data or described After input key data, described input code data or described input key data are encrypted according to the second key, generate second Crypted password, and generated according to described second Crypted password;
Authentication result receiver module, the authentication result returning for the reception server, described authentication result is smart machine First obtain original password data or primary key data, then with described second key, described authentication command message is solved Close, obtain described input code data or described input key data, then will be original with described for described input code data Code data is compared or described input key data is compared with described primary key data, according to comparison result Generate.
Further, described client also includes:
Password modular converter, for being converted into described input key data by described input code data.
The third aspect, provides a kind of server, and described server includes:
First Crypted password receiver module, for receiving the first Crypted password of client transmission, described first encryption is close Code be client obtain input code data or input key data, according to first key encryption described input code data or Generate after input key data described in person;
Authentication command message sending module, obtains to described first Crypted password deciphering for according to described first key After described input code data or described input key data, described input code data or institute are encrypted according to the second key State input key data, generate the second Crypted password, and generate after authentication command message according to described second Crypted password, by institute State authentication command message and smart machine is forwarded to by client;
Authentication result forwarding module, the authentication result for generating described smart machine is back to client, described recognizes Card result is that smart machine first obtains original password data or primary key data, then with described second key to described certification Command message is decrypted, and obtains described input code data or described input key data, then by described input password Data is compared with described original password data or is compared described input key data with described primary key data Right, generated according to comparison result.
Fourth aspect, provides a kind of smart machine, original password data or primary key data storage in described intelligence In equipment, described smart machine includes:
Authentication module, for first obtaining original password data or primary key data, then is ordered to certification with the second key Make message be decrypted, obtain input code data or input key data, then by described input code data with described Original password data is compared or described input key data is compared with described primary key data, according to comparison Result generates authentication result, and returns described authentication result to client by server;
Wherein, described authentication command message is that server is deciphered to the first Crypted password according to first key, obtains described After input code data or described input key data, described input code data or described defeated is encrypted according to the second key Enter key data, generate the second Crypted password, and according to described second Crypted password generation;
Described first Crypted password is that client obtains described input code data or described input key data, according to Generate after first key encryption described input code data or described input key data.
5th aspect, provides a kind of system of cipher authentication, and described system includes client as above, as mentioned above Server and smart machine as above.
The beneficial effect that the embodiment of the present invention compared with prior art exists is: the embodiment of the present invention is passed through original password Data or primary key data storage are in smart machine, without storage in the server, and former without carrying out on the line Beginning code data or the transmission of primary key data, can avoid original password data or the leakage of primary key data. In addition, when carrying out inputting cipher authentication, being encrypted to input code data or input key data using key, online On road, transmission is the encryption data comprising to input code data or input key data, therefore input code data or defeated Enter key data to be also not easy to be stolen, so that the transmission of input code data or input key data is safer, The method overcoming the cipher authentication of offer may lead to password to reveal the problem of event.Additionally, certification life is generated by server Make message it is not necessary to develop different client softwares for client, so the exploitation of client software, debugging and maintenance Little, and the probability malfunctioning is low.
Brief description
For the technical scheme being illustrated more clearly that in the embodiment of the present invention, below will be to embodiment or description of the prior art In required use accompanying drawing be briefly described it should be apparent that, drawings in the following description be only the present invention some Embodiment, for those of ordinary skill in the art, without having to pay creative labor, can also be according to these Accompanying drawing obtains other accompanying drawings.
Fig. 1 is the flowchart of the method for cipher authentication that first embodiment of the invention provides;
Fig. 2 is the structured flowchart of the client that second embodiment of the invention provides;
Fig. 3 is the structured flowchart of the server that third embodiment of the invention provides;
Fig. 4 is the structured flowchart of the smart machine that fourth embodiment of the invention provides;
Fig. 5 is the structured flowchart of the system of cipher authentication that fifth embodiment of the invention provides.
Specific embodiment
In order that the objects, technical solutions and advantages of the present invention become more apparent, below in conjunction with drawings and Examples, right The present invention is further elaborated.It should be appreciated that specific embodiment described herein is only in order to explain the present invention, and It is not used in the restriction present invention.
It should be noted that the executive agent of the embodiment of the present invention includes server, client and smart machine.Wherein, C/s (client/server) structure, i.e. client-server structure, client can be met between client and server Can also meet b/s (browser/server) structure between server, i.e. browser and server structure, in addition, client End can be mobile phone or computer, and here is all not construed as limiting.
Below in conjunction with specific embodiment, the realization of the present invention is described in detail:
Embodiment one
Fig. 1 show the embodiment of the present invention one provide the method for cipher authentication realize flow process, details are as follows:
In step s101, client obtains input code data or input key data, is encrypted according to first key Described input code data or described input key data, generate the first Crypted password, and send described first Crypted password To server.
In embodiments of the present invention, user can input password by client, and client receives the defeated of user input After entering code data, the first Crypted password can be generated according to first key key1 encryption described input code data, and send Described first Crypted password is to server.
Preferably, after client receives the input code data of user input, can be first by described input code data It is converted into and described input code data corresponding input key data by predetermined conversion method, then according to first key Encryption described input key data generates the first Crypted password, and sends described first Crypted password to server.Specifically, institute Stating conversion method can be cryptographic calculation or hash computing etc., and here does not limit.
Which kind of mode to be converted into input key data corresponding with inputting code data by inputting code data especially by, It is not limited in the embodiment of the present invention.
Specifically, first key key1 is preset or consulted to generate before client with server communication.
In addition, first key key1 can be symmetric key or unsymmetrical key.
Preferably, first key key1 is unsymmetrical key, if first key key1 is unsymmetrical key, by server Generate public private key pair, public key is sent to client.
In step s102, server obtains described defeated according to described first key to described first Crypted password deciphering After entering code data or described input key data, described input code data or described input are encrypted according to the second key Key data, generates the second Crypted password, and generates after authentication command message according to described second Crypted password, by described certification Command message is forwarded to smart machine by client.
In embodiments of the present invention, after server receives the first Crypted password of client transmission, according to first key Key1 is decrypted to described first Crypted password, it is possible to obtain input code data or input key that step s101 obtains Data, after obtaining described input code data or described input key data, server can add according to the second key key2 Close described input code data or described input key data, generate the second Crypted password, and close according to the described second encryption After code generates authentication command message, described authentication command message is forwarded to smart machine by client.
Specifically, first key key1 is preset or consulted to generate before client with server communication.
In addition, the second key key2 can be symmetric key or unsymmetrical key.
Preferably, the second key key2 is unsymmetrical key, if the second key key2 is unsymmetrical key, by intelligently setting Standby generation public private key pair, public key is sent to server.
In step s103, smart machine first obtains original password data or primary key data, then with described second Key is decrypted to described authentication command message, obtains described input code data or described input key data, then By described input code data compare with described original password data or will described input key data original with described Key data is compared, and generates authentication result according to comparison result, and returns described authentication result to client by server End.
In embodiments of the present invention, after smart machine receives the authentication command message of server transmission, first obtain local The original password data of storage or primary key data, then with the second key key2, described authentication command message is solved Close, obtain input code data or the input key data that step s101 obtains, then by described input code data and institute State original password data compare or by described input key data compare with described primary key data, according to than Authentication result is generated to result, and described authentication result is returned to client by server.
Specifically, smart machine can return described authentication result to client by following steps by server:
Step 1, smart machine generate authentication result response data according to described authentication result;
Step 2, smart machine send described authentication result response data to server;
Step 3, server parse described authentication result response data, obtain described authentication result;
Step 4, server send described authentication result to client.
Wherein, after client receives the authentication result of server transmission, described authentication result can be shown to user.
Preferably, original password data or primary key data storage be in the safety chip of smart machine, this safety Chip is the safety chip through the close certification of state and the certification of associated safety department, and original password data or primary key data are deposited Storage, in the safe space of described safety chip, can limit the data that user reads this safe space, and user can only be by recognizing The mode of card obtains, and can not obtain described primary key data by other any modes.
Preferably, number of retries can be set, when number of retries exceedes described certification number of retries, intelligence can be locked Equipment.
Specifically, the code data original password data locally stored with smart machine or solution are inputted when what deciphering obtained The close input key data the obtaining primary key data locally stored with smart machine is compared, and authentication result is inconsistent When, number of retries of can successively decreasing, when number of retries is 0, lock smart machine;When authentication result is consistent, then recover to retry Number of times, certification success.
By the embodiment of the present invention, can by original password data or primary key data storage in smart machine, Without storage in the server, and on the line without the transmission carrying out original password data or primary key data, permissible Avoid original password data or the leakage of primary key data.In addition, when carrying out inputting cipher authentication, using key to defeated Enter code data or input key data is encrypted, transmit on the line is to comprise to input code data or input close The encryption data of key data, therefore input code data or input key data are also not easy to be stolen, so that input The transmission of code data or input key data is safer, and the method overcoming the cipher authentication of offer may lead to password The problem of leakage event.Additionally, authentication command message is generated by server it is not necessary to develop different clients for client Software, so the exploitation of client software, debugging and maintenance are little, and the probability malfunctioning is low.
In addition, original password data or primary key data storage in the safety chip of smart machine so that user Primary key data can not be got by any mode of the other outside cipher authentication mode, further increase primary key The safety of data storage.
Additionally, the communication between client and server, between server and smart machine is all encryption, particularly adopt When using unsymmetrical key, safety is higher.
It should be understood that in embodiments of the present invention, the size of the sequence number of above-mentioned each process is not meant to the elder generation of execution sequence Afterwards, the execution sequence of each process should be determined with its function and internal logic, and should not be to the implementation process structure of the embodiment of the present invention Become any restriction.
One of ordinary skill in the art will appreciate that realizing all or part of step in the various embodiments described above method is can Completed with the hardware instructing correlation by program, corresponding program can be stored in a computer read/write memory medium In, described storage medium, such as rom/ram, disk or CD etc..
Embodiment two
Fig. 2 shows the concrete structure block diagram of the client that the embodiment of the present invention two provides, and for convenience of description, only illustrates The part related to the embodiment of the present invention.This client 2 constitutes the system of cipher authentication together with smart machine, server, Wherein, in smart machine, this client 2 includes: the first Crypted password for original password data or primary key data storage Sending module 21, authentication command packet forwarding module 22 and authentication result receiver module 23.
Wherein, the first Crypted password sending module 21, for obtaining input code data or input key data, according to First key encryption described input code data or described input key data, generate the first Crypted password, and send described First Crypted password is to server;
Authentication command packet forwarding module 22, for authentication command message is forwarded to smart machine, described authentication command Message is that server is deciphered to described first Crypted password according to described first key, obtains described input code data or institute After stating input key data, described input code data or described input key data is encrypted according to the second key, generate the Two Crypted passwords, and generated according to described second Crypted password;
Authentication result receiver module 23, the authentication result returning for the reception server, described authentication result is that intelligence sets Standby first acquisition original password data or primary key data, then with described second key, described authentication command message is solved Close, obtain described input code data or described input key data, then will be original with described for described input code data Code data is compared or described input key data is compared with described primary key data, according to comparison result Generate.
Preferably, described client 2 also includes:
Password modular converter, for being converted into described input key data by described input code data.
Client provided in an embodiment of the present invention can be applied in aforementioned corresponding embodiment of the method one, and details are referring to upper State the description of embodiment one, will not be described here.
Embodiment three
Fig. 3 shows the concrete structure block diagram of the server that the embodiment of the present invention three provides, and for convenience of description, only illustrates The part related to the embodiment of the present invention.This server 3 constitutes the system of cipher authentication together with client, smart machine, Wherein, in smart machine, this server 3 includes: the first Crypted password for original password data or primary key data storage Receiver module 31, authentication command message sending module 32 and authentication result forwarding module 33.
Wherein, the first Crypted password receiver module 31, for receive client transmission the first Crypted password, described first Crypted password is that client obtains input code data or input key data, encrypts described input password according to first key Generate after data or described input key data;
Authentication command message sending module 32, obtains to described first Crypted password deciphering for according to described first key Described input code data or described input key data after, according to second key encrypt described input code data or Described input key data, generates the second Crypted password, and generates after authentication command message according to described second Crypted password, will Described authentication command message is forwarded to smart machine by client;
Authentication result forwarding module 33, the authentication result for generating described smart machine is back to client, described Authentication result is that smart machine first obtains original password data or primary key data, then is recognized to described with described second key Card command message is decrypted, and obtains described input code data or described input key data, then will be close for described input Code data is compared with described original password data or is carried out described input key data with described primary key data Compare, generated according to comparison result.
Example IV
Fig. 4 shows the concrete structure block diagram of the smart machine that the embodiment of the present invention four provides, and for convenience of description, only shows Go out the part related to the embodiment of the present invention.What this smart machine 4 constituted cipher authentication together with client, server is System, wherein, in smart machine 4, this smart machine 4 includes: certification mould for original password data or primary key data storage Block 41.
Wherein, authentication module 41, for first obtaining original password data or primary key data, then with the second key pair Authentication command message is decrypted, and obtains input code data or input key data, then by described input code data Compare with described original password data or described input key data is compared with described primary key data, root Generate authentication result according to comparison result, and described authentication result is returned to client by server;
Wherein, described authentication command message is that server is deciphered to the first Crypted password according to first key, obtains described After input code data or described input key data, described input code data or described defeated is encrypted according to the second key Enter key data, generate the second Crypted password, and according to described second Crypted password generation;
Described first Crypted password is that client obtains described input code data or described input key data, according to Generate after first key encryption described input code data or described input key data.
Embodiment five
Fig. 5 shows the concrete structure block diagram of the system of cipher authentication that the embodiment of the present invention five provides, for the ease of saying Bright, illustrate only the part related to the embodiment of the present invention.The system 5 of this cipher authentication includes the clothes as described in embodiment three Client described in business device, embodiment two and the smart machine described in example IV.Wherein, server and client connect Connect, both can be with direction communication;Smart machine and client connect, and smart machine is communicated with server by client. Described in the work visible embodiment one to four of interaction between specific service device, client and smart machine, will not be described here.
Those of ordinary skill in the art are it is to be appreciated that combine the list of each example of the embodiments described herein description Unit and algorithm steps, being capable of being implemented in combination in electronic hardware or computer software and electronic hardware.These functions are actually To be executed with hardware or software mode, the application-specific depending on technical scheme and design constraint.Professional and technical personnel Each specific application can be used different methods to realize described function, but this realization is it is not considered that exceed The scope of the present invention.
Those skilled in the art can be understood that, for convenience and simplicity of description, the system of foregoing description, Device and the specific work process of unit, may be referred to the corresponding process in preceding method embodiment, will not be described here.
It should be understood that disclosed system, apparatus and method in several embodiments provided herein, permissible Realize by another way.For example, device embodiment described above is only schematically, for example, described unit Divide, only a kind of division of logic function, actual can have other dividing mode when realizing, for example multiple units or assembly Can in conjunction with or be desirably integrated into another system, or some features can be ignored, or does not execute.Another, shown or The coupling each other discussing or direct-coupling or communication connection can be by some interfaces, the indirect coupling of device or unit Close or communicate to connect, can be electrical, mechanical or other forms.
The described unit illustrating as separating component can be or may not be physically separate, show as unit The part showing can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple On NE.The mesh to realize this embodiment scheme for some or all of unit therein can be selected according to the actual needs 's.
In addition, can be integrated in a processing unit in each functional unit in each embodiment of the present invention it is also possible to It is that unit is individually physically present it is also possible to two or more units are integrated in a unit.
If described function realized using in the form of SFU software functional unit and as independent production marketing or use when, permissible It is stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially in other words Partly being embodied in the form of software product of part that prior art is contributed or this technical scheme, this meter Calculation machine software product is stored in a storage medium, including some instructions with so that a computer equipment (can be individual People's computer, server, or network equipment etc.) execution each embodiment methods described of the present invention all or part of step. And aforesaid storage medium includes: u disk, portable hard drive, read only memory (rom, read-only memory), random access memory are deposited Reservoir (ram, random access memory), magnetic disc or CD etc. are various can be with the medium of store program codes.
The above, the only specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, and any Those familiar with the art the invention discloses technical scope in, change or replacement can be readily occurred in, all should contain Cover within protection scope of the present invention.Therefore, protection scope of the present invention should described be defined by scope of the claims.

Claims (11)

1. a kind of method of cipher authentication is it is characterised in that original password data or primary key data storage set in intelligence In standby, methods described includes:
Client obtain input code data or input key data, according to first key encryption described input code data or Input key data described in person, generate the first Crypted password, and send described first Crypted password to server;
Server obtains described input code data or described according to described first key to described first Crypted password deciphering After input key data, described input code data or described input key data are encrypted according to the second key, generate second Crypted password, and generated after authentication command message according to described second Crypted password, described authentication command message is passed through client End is forwarded to smart machine;
Smart machine first obtains original password data or primary key data, then with described second key to described authentication command Message is decrypted, and obtains described input code data or described input key data, then by described input code data Compare with described original password data or described input key data is compared with described primary key data, root Generate authentication result according to comparison result, and described authentication result is returned to client by server.
If 2. the method for claim 1 is it is characterised in that primary key data storage is in smart machine, described After client obtains input code data, also include:
The described input code data getting is converted into described input key data by client.
3. the method for claim 1 is it is characterised in that described first key is preset or in client and service Consult generation before device communication;
Described second key is preset or consulted to generate before server with smart device communication.
4. the method for claim 1 is it is characterised in that described first key is symmetric key or described first key It is unsymmetrical key;
Described second key is symmetric key or described second key is unsymmetrical key.
5. method as claimed in claim 4 is it is characterised in that when described first key is unsymmetrical key, given birth to by server Become public private key pair, public key is sent to client;
When described second key is unsymmetrical key, public private key pair is generated by smart machine, public key is sent to server.
6. the method for claim 1 is it is characterised in that described original password data or described primary key data storage In the safety chip of smart machine.
7. a kind of client is it is characterised in that described client includes:
First Crypted password sending module, for obtaining input code data or input key data, according to first key plus Close described input code data or described input key data, generate the first Crypted password, and it is close to send described first encryption Code is to server;
Authentication command packet forwarding module, for authentication command message is forwarded to smart machine, described authentication command message is Server obtains described input code data or described input according to described first key to described first Crypted password deciphering After key data, described input code data or described input key data are encrypted according to the second key, generate the second encryption Password, and generated according to described second Crypted password;
Authentication result receiver module, the authentication result returning for the reception server, described authentication result is that smart machine first obtains Take original password data or primary key data, then with described second key, described authentication command message is decrypted, obtain Obtain described input code data or described input key data, then by described input code data and described original password number Compare with described primary key data according to comparing or by described input key data, generated according to comparison result 's.
8. client as claimed in claim 7 is it is characterised in that described client also includes:
Password modular converter, for being converted into described input key data by described input code data.
9. a kind of server is it is characterised in that described server includes:
First Crypted password receiver module, for receiving the first Crypted password of client transmission, described first Crypted password is Client obtains input code data or input key data, according to first key encryption described input code data or institute Generate after stating input key data;
Authentication command message sending module, obtains described for according to described first key to described first Crypted password deciphering After input code data or described input key data, described input code data or described defeated is encrypted according to the second key Enter key data, generate the second Crypted password, and generated after authentication command message according to described second Crypted password, recognize described Card command message is forwarded to smart machine by client;
Authentication result forwarding module, the authentication result for generating described smart machine is back to client, described certification knot Fruit is that smart machine first obtains original password data or primary key data, then with described second key to described authentication command Message is decrypted, and obtains described input code data or described input key data, then by described input code data Compare with described original password data or described input key data is compared with described primary key data, root Generate according to comparison result.
10. a kind of smart machine is it is characterised in that original password data or primary key data storage are in described smart machine In, described smart machine includes:
Authentication module, for first obtaining original password data or primary key data, then with the second key to authentication command report Literary composition is decrypted, and obtains input code data or input key data, then will be original with described for described input code data Code data is compared or described input key data is compared with described primary key data, according to comparison result Generate authentication result, and described authentication result is returned to client by server;
Wherein, described authentication command message is that server is deciphered to the first Crypted password according to first key, obtains described input After code data or described input key data, described input code data is encrypted according to the second key or described input is close Key data, generates the second Crypted password, and according to described second Crypted password generation;
Described first Crypted password is that client obtains described input code data or described input key data, according to first Generate after key encryption described input code data or described input key data.
A kind of 11. systems of cipher authentication are it is characterised in that described system includes the client described in any one of claim 7 to 8 End, the server as described in any one of claim 9 and the smart machine as described in any one of claim 10.
CN201610939568.9A 2016-10-24 2016-10-24 Method, system and the client of cipher authentication, server and smart machine Expired - Fee Related CN106357679B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610939568.9A CN106357679B (en) 2016-10-24 2016-10-24 Method, system and the client of cipher authentication, server and smart machine

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610939568.9A CN106357679B (en) 2016-10-24 2016-10-24 Method, system and the client of cipher authentication, server and smart machine

Publications (2)

Publication Number Publication Date
CN106357679A true CN106357679A (en) 2017-01-25
CN106357679B CN106357679B (en) 2019-09-13

Family

ID=57864407

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610939568.9A Expired - Fee Related CN106357679B (en) 2016-10-24 2016-10-24 Method, system and the client of cipher authentication, server and smart machine

Country Status (1)

Country Link
CN (1) CN106357679B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107195132A (en) * 2017-04-28 2017-09-22 深圳怡化电脑股份有限公司 A kind of finance self-help traction equipment and its auth method
CN107948065A (en) * 2017-12-29 2018-04-20 杭州迪普科技股份有限公司 A kind of link-state information acquisition methods and device
CN109547208A (en) * 2018-11-16 2019-03-29 交通银行股份有限公司 Electronic Finance equipment master key online distribution method and system
CN109684790A (en) * 2018-12-26 2019-04-26 佛山市瑞德物联科技有限公司 Software start-up method, soft ware authorization verification method, equipment and storage medium
CN110278083A (en) * 2018-03-16 2019-09-24 腾讯科技(深圳)有限公司 ID authentication request treating method and apparatus, equipment replacement method and apparatus
CN112069472A (en) * 2020-07-23 2020-12-11 中国铁道科学研究院集团有限公司电子计算技术研究所 User login authentication method and system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020031225A1 (en) * 2000-09-08 2002-03-14 Hines Larry Lee User selection and authentication process over secure and nonsecure channels
CN101296086A (en) * 2008-06-18 2008-10-29 华为技术有限公司 Method, system and device for access authentication
CN101741860A (en) * 2009-11-27 2010-06-16 华中科技大学 Computer remote security control method
CN102469080A (en) * 2010-11-11 2012-05-23 中国电信股份有限公司 Method for pass user to realize safety login application client and system thereof
CN104484596A (en) * 2015-01-07 2015-04-01 宇龙计算机通信科技(深圳)有限公司 Method and terminal for creating password in multi-operation system
CN105656864A (en) * 2014-11-27 2016-06-08 航天恒星科技有限公司 TCM-based key management system and management method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020031225A1 (en) * 2000-09-08 2002-03-14 Hines Larry Lee User selection and authentication process over secure and nonsecure channels
CN101296086A (en) * 2008-06-18 2008-10-29 华为技术有限公司 Method, system and device for access authentication
CN101741860A (en) * 2009-11-27 2010-06-16 华中科技大学 Computer remote security control method
CN102469080A (en) * 2010-11-11 2012-05-23 中国电信股份有限公司 Method for pass user to realize safety login application client and system thereof
CN105656864A (en) * 2014-11-27 2016-06-08 航天恒星科技有限公司 TCM-based key management system and management method
CN104484596A (en) * 2015-01-07 2015-04-01 宇龙计算机通信科技(深圳)有限公司 Method and terminal for creating password in multi-operation system

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107195132A (en) * 2017-04-28 2017-09-22 深圳怡化电脑股份有限公司 A kind of finance self-help traction equipment and its auth method
CN107948065A (en) * 2017-12-29 2018-04-20 杭州迪普科技股份有限公司 A kind of link-state information acquisition methods and device
CN110278083A (en) * 2018-03-16 2019-09-24 腾讯科技(深圳)有限公司 ID authentication request treating method and apparatus, equipment replacement method and apparatus
CN110278083B (en) * 2018-03-16 2021-11-30 腾讯科技(深圳)有限公司 Identity authentication request processing method and device, and equipment resetting method and device
CN114039734A (en) * 2018-03-16 2022-02-11 腾讯科技(深圳)有限公司 Device resetting method and device
CN109547208A (en) * 2018-11-16 2019-03-29 交通银行股份有限公司 Electronic Finance equipment master key online distribution method and system
CN109684790A (en) * 2018-12-26 2019-04-26 佛山市瑞德物联科技有限公司 Software start-up method, soft ware authorization verification method, equipment and storage medium
CN112069472A (en) * 2020-07-23 2020-12-11 中国铁道科学研究院集团有限公司电子计算技术研究所 User login authentication method and system

Also Published As

Publication number Publication date
CN106357679B (en) 2019-09-13

Similar Documents

Publication Publication Date Title
CN106357679A (en) Method, system and client for password authentication, and server and intelligent equipment
CN103595718B (en) A kind of POS terminal Activiation method, system, service platform and POS terminal
CN101742499B (en) Account number protection system for mobile communication equipment terminal and application method thereof
US8904195B1 (en) Methods and systems for secure communications between client applications and secure elements in mobile devices
CN108270739B (en) Method and device for managing encryption information
CN104715187A (en) Method and apparatus used for authenticating nodes of electronic communication system
CN101771699A (en) Method and system for improving SaaS application security
CN101815091A (en) Cipher providing equipment, cipher authentication system and cipher authentication method
CN104113839A (en) Mobile data safety protection system and method based on SDN
CN106034123A (en) Authentication method, application system server and client
CN105007163B (en) Transmission, acquisition methods and the transmission of wildcard, acquisition device
CN105764051B (en) Authentication method, authentication device, mobile device and server
CN109274500A (en) A kind of key downloading method, client, encryption device and terminal device
CN101707522B (en) Method and system for authentication and connection
CN106060073A (en) Channel key negotiation method
CN106452752B (en) Method, system and the client of Modify password, server and smart machine
CN110493177A (en) Based on unsymmetrical key pond to and sequence number quantum communications service station AKA cryptographic key negotiation method and system
US20200092096A1 (en) Method for secure management of secrets in a hierarchical multi-tenant environment
CN104506509A (en) Multifunctional security authentication terminal and authentication method based on terminal
CN100561913C (en) A kind of method of access code equipment
CN201717885U (en) Code providing equipment and code identification system
CN101646172B (en) Method and device for generating key in distributed MESH network
CN108229193B (en) Wearing device terminal information encryption method, encrypted data early warning device and wearing device terminal
CN114170709B (en) Cash box management method and system based on Internet of Things
KR102053993B1 (en) Method for Authenticating by using Certificate

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190913