CN107786326A - Apply the sharing method in the verification of car networking dynamic password - Google Patents

Apply the sharing method in the verification of car networking dynamic password Download PDF

Info

Publication number
CN107786326A
CN107786326A CN201610728069.5A CN201610728069A CN107786326A CN 107786326 A CN107786326 A CN 107786326A CN 201610728069 A CN201610728069 A CN 201610728069A CN 107786326 A CN107786326 A CN 107786326A
Authority
CN
China
Prior art keywords
former
character string
sharing method
client
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610728069.5A
Other languages
Chinese (zh)
Inventor
田雨农
宋涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dalian Roiland Technology Co Ltd
Original Assignee
Dalian Roiland Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dalian Roiland Technology Co Ltd filed Critical Dalian Roiland Technology Co Ltd
Priority to CN201610728069.5A priority Critical patent/CN107786326A/en
Publication of CN107786326A publication Critical patent/CN107786326A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer And Data Communications (AREA)
  • Storage Device Security (AREA)

Abstract

Apply the sharing method in the verification of car networking dynamic password, it is characterised in that specifically include:According to the sharing method I at client and server end, USE ID are generated as after former ID is encrypted;The sharing method I is:It is N positions character string to provide former ID, and character string is made up of letter and number, not comprising other characters;Using former ID each character as the leaf node of a complete binary tree, a complete binary tree is formed in the way of hierarchal arrangement;Again N number of character combination into a new character string in the way of preamble travels through;To newly-generated character string, base64 codings, generation USE ID are carried out;Using sharing method, ID is encrypted, to protect ID;Using shared encryption method, encryption data bag is generated, the data encryption in network, it is not easy to be cracked, security has more preferable guarantee.

Description

Apply the sharing method in the verification of car networking dynamic password
Technical field
The present invention relates to car networking technology field, especially a kind of shared side applied in the verification of car networking dynamic password Method.
Background technology
SASL be it is a kind of be used for expand C/S model checking ability authentication mechanism, full name Simple Authentication And Security Layer. are when setting sasl, it is necessary to two pieces thing are determined, first, for exchanging " identification information " or identity The authentication mechanism of certificate;Second, determine the checking framework of identification information storage method.Sasl authentication mechanism specification client with The coding method of answering, transferring content between server;Sasl checking frameworks determine how server stores visitor in itself The letter of identity at family end and the password how client offer is provided.If client can successfully pass checking, server end The identity of user is then can determine that, and determines what kind of authority user has whereby.During using this mechanism, client and server Same hidden cipher is shared, and this password does not pass through network transmission.Verification process is first to propose to address inquires to from server Challenge starts, and client calculates a response response using this challenge and hidden cipher.Different Challenge, it is impossible to calculate identical response;Any side for possessing secret password, can use phase Same challenge calculates identical response.Therefore, if server compare client return response whether with The response oneself calculated is identical, it is possible to knows whether the password that client is possessed is correct.SASL is to provide a kind of use Whether family ID authentication mechanism, the account/password that can be simply considered for certification user are run into system or use The service of system.
The content of the invention
It is right using sharing method the invention provides a kind of sharing method applied in the verification of car networking dynamic password ID is encrypted, to protect ID;Using shared encryption method, encryption data bag is generated, the data in network are added It is close, it is not easy to be cracked, security has more preferable guarantee.
On the one hand, the invention provides the sharing method applied in the verification of car networking dynamic password, specifically include:
S1:According to the sharing method I at client and server end, USE ID are generated as after former ID is encrypted;
The sharing method I is:
A, provide that former ID is N positions character string, character string is made up of letter and number, not comprising other characters;
B, using former ID each character as the leaf node of a complete binary tree, the group in the way of hierarchal arrangement Into a complete binary tree;I.e. former ID first node is with node, while is the first node layer;Second node layer is 2 Node, from left to right respectively second character and the 3rd character, the like, form a complete y-bend with N number of character Tree;
C, again N number of character combination into a new character string in the way of preamble travels through;I.e. according to first with node, Left sibling afterwards, the most mode of rear right node generate new character string;
D, to newly-generated character string, base64 codings, generation USE ID are carried out;
S2:The generation cryptographic methods shared using client and server end, generate code data bag;
S3:According to the USE ID and code data bag of generation, packet is made, is sent to server.
Further, the generation cryptographic methods are:
P1. a character string is formed with former ID and H positions random number first, and CRC check, gained is carried out to this character string CRC check value be clear-text passwords;
P2. the when m- UTC time of client is obtained;
P3. according to former ID, clear-text passwords, interim key, timestamp and chassis number, using CRAM-MD5 encryption method, Generate original password;
P4. according to the sharing method IV at client and server end, former ID, original password, chassis number, timestamp and face When key be made code data bag;
P5. newly-generated character string is exactly password.
Further, the sharing method, in addition to:
S4:According to the sharing method II at client and server end, USE ID are decrypted into former ID;
S5:According to the sharing method III at client and server end, code data bag be decrypted into former ID, original password, Chassis number, timestamp and interim key;
S6:The former ID obtained in S4 and S5 is compared, judged whether unanimously, if inconsistent, directly returns to checking Failure.
Further, above-mentioned sharing method, in addition to:
S7:If S6 Central Plains ID is consistent, the timestamp of server end is obtained, and compared with decrypting obtained timestamp Compared with if the time difference is more than certain time, authentication failed, otherwise progress is verified below;
S8:It is original close using CRAM-MD5 decryption method, generation according to former ID, clear-text passwords, timestamp and chassis number Code, and compared with decrypting obtained original password, judge whether unanimously, it is inconsistent, directly return to authentication failed.
Further, above-mentioned sharing method, in addition to:
S9:If the original password obtained in S8 is consistent, judge whether interim key is empty, and if sky, then generation is faced When key;
S10:If user logs in for the first time, and is verified, then the interim key and the result of generation are made Packet, it is sent to client;
If non-first time logs in, the result is only made packet, is sent to client;
If authentication failed, can failure the reason for, be sent to client.
Further, sharing method IV is:
1) arranged according to following form, form new character string:
Former ID original passwords<Chassis number timestamps>Interim key;
Wherein interim key is generated by server end, is issued to the key of client;
When user's first time game server, interim key is sky;From service after logging in successfully
Device end issues interim key, when being logged in after preservation next time, directly uses.
2) character string newly formed is generated new character string in the way of base64 is encoded.
Further, sharing method II is specially:
A1. it is N positions character string to provide former ID, and character string is made up of letter and number, not comprising other characters;
A2. base64 decodings are carried out to USE ID, generates new character string.
A3. according to the requirement of complete binary tree, one is generated in the way of preamble travels through to new character string and completes two Fork tree;Because character string only has 17 characters, therefore this complete binary tree is only of five storeys, both first next node, the second layer 2 nodes, 4 nodes of third layer, the 4th layer of 8 node;Layer 5 is only left 2 nodes;
A4. in the way of being layered and traveling through, this complete binary tree of generation is traveled through, finally just reverts to original ID。
As further, sharing method III is specially:
11) passwords are to be decrypted into initial data according to following form
Former ID original passwords<Chassis number timestamps>Interim key
22) characters ">" below when there is no data, representative is user's first time game server, and now server needs Generate interim key;And when to client response, interim key is sent to client.
The present invention can obtain following technique effect due to using above technical method:Using sharing method, to user ID is encrypted, to protect ID;Using shared encryption method, encryption data bag is generated, the data encryption in network, no Easily it is cracked, security has more preferable guarantee;
Time element is added, ensure that ageing.Message is only received within the specific limits to be only effectively, is prevented The problem of repeat logon;Password does not have to, in transmission over networks, avoid the worry that password is ravesdropping yet.
Brief description of the drawings
The shared width of accompanying drawing 1 of the present invention:
Fig. 1 is to apply the sharing method structure chart in the verification of car networking dynamic password.
Embodiment
To make the purpose, technical scheme and advantage of embodiments of the invention clearer, with reference to the embodiment of the present invention In accompanying drawing, the technical scheme in the embodiment of the present invention is clearly completely described:
Embodiment 1
A kind of sharing method applied in the verification of car networking dynamic password is present embodiments provided, is specifically included:
S1:According to the sharing method I at client and server end, USE ID are generated as after former ID is encrypted;
Sharing method I is:
A, provide that former ID is 17 character strings, character string is made up of letter and number, not comprising other characters;
B, using former ID each character as the leaf node of a complete binary tree, the group in the way of hierarchal arrangement Into a complete binary tree;I.e. former ID first node is with node, while is the first node layer;Second node layer is 2 Node, from left to right respectively second character and the 3rd character, the like, form a complete y-bends with 17 characters Tree;
C, again 17 character combinations into a new character string in the way of preamble travels through;I.e. according to first with section Point, most rear left sibling, the mode of rear right node generate new character string;
D, to newly-generated character string, base64 codings, generation USE ID are carried out.
S2:The generation cryptographic methods shared using client and server end, generate code data bag;
Generation password method be:
P1. a character string is formed with former ID and 15 random number first, and CRC check, institute is carried out to this character string The CRC check value obtained is clear-text passwords;
P2. the when m- UTC time of client is obtained;
P3. according to former ID, clear-text passwords, interim key, timestamp and chassis number, using CRAM-MD5 encryption method, Generate original password;
P4. according to the sharing method IV at client and server end, former ID, original password, chassis number, timestamp and face When key be made code data bag;
P5. newly-generated character string is exactly password.
S3:According to the USE ID and code data bag of generation, packet is made, is sent to server;
Embodiment 2
As the further supplement to embodiment 1, above-mentioned sharing method also includes:
S4:According to the sharing method II at client and server end, USE ID are decrypted into former ID;
S5:According to the sharing method III at client and server end, code data bag be decrypted into former ID, original password, Chassis number, timestamp and interim key;
S6:The former ID obtained in S4 and S5 is compared, judged whether unanimously, if inconsistent, directly returns to checking Failure.
Embodiment 3
As the further supplement to embodiment 2, above-mentioned sharing method also includes:
S7:If S6 Central Plains ID is consistent, the timestamp of server end is obtained, and compared with decrypting obtained timestamp Compared with if the time difference is more than certain time, such as outside 10 seconds, then authentication failed, otherwise carries out verifying below;
S8:It is original close using CRAM-MD5 decryption method, generation according to former ID, clear-text passwords, timestamp and chassis number Code, and compared with decrypting obtained original password, judge whether unanimously, it is inconsistent, directly return to authentication failed.
S9:If the original password that S8 is obtained is consistent, judge whether interim key is empty, and if sky, then generation is interim Key;
S10:If user logs in for the first time, and is verified, then the interim key and the result of generation are made Packet, it is sent to client;
If non-first time logs in, the result is only made packet, is sent to client;
If authentication failed, can failure the reason for, be sent to client.
Embodiment 4
As the further supplement to embodiment 1, sharing method IV is:
1) arranged according to following form, form new character string:
Former ID original passwords<Chassis number timestamps>Interim key;
Wherein interim key is generated by server end, is issued to the key of client;
When user's first time game server, interim key is sky;Issued after logging in successfully from server end interim secret Key, when being logged in after preservation next time, directly use.
2) character string newly formed is generated new character string in the way of base64 is encoded.
Embodiment 5
As the further supplementary notes to embodiment 2, sharing method II is specially:
A1. it is 17 character strings to provide former ID, and character string is made up of letter and number, not comprising other characters;
A2. base64 decodings are carried out to USE ID, generates new character string;
A3. according to the requirement of complete binary tree, one is generated in the way of preamble travels through to new character string and completes two Fork tree;Because character string only has 17 characters, therefore this complete binary tree is only of five storeys, both first next node, the second layer 2 nodes, 4 nodes of third layer, the 4th layer of 8 node;Layer 5 is only left 2 nodes;
A4. in the way of being layered and traveling through, this complete binary tree of generation is traveled through, finally just reverts to original ID。
As preferable, sharing method III is specially:
11) passwords are to be decrypted into initial data according to following form
Former ID original passwords<Chassis number timestamps>Interim key
22) characters ">" below when there is no data, representative is user's first time game server, and now server needs Generate interim key;And when to client response, interim key is sent to client.
The foregoing is only a preferred embodiment of the present invention, but protection scope of the present invention be not limited thereto, Any one skilled in the art in the technical scope of present disclosure, technique according to the invention scheme and its Inventive concept is subject to equivalent substitution or change, should all be included within the scope of the present invention.

Claims (8)

1. apply the sharing method in the verification of car networking dynamic password, it is characterised in that specifically include:
S1:According to the sharing method I at client and server end, USE ID are generated as after former ID is encrypted;
The sharing method I is:
A, provide that former ID is N positions character string, character string is made up of letter and number, not comprising other characters;
B, using former ID each character as the leaf node of a complete binary tree, one is formed in the way of hierarchal arrangement Complete binary tree;
C, again N number of character combination into a new character string in the way of preamble travels through;
D, to newly-generated character string, base64 codings, generation USE ID are carried out;
S2:The generation cryptographic methods shared using client and server end, generate code data bag;
S3:According to the USE ID and code data bag of generation, packet is made, is sent to server.
2. the sharing method in the verification of car networking dynamic password is applied according to claim 1, it is characterised in that the life It is into cryptographic methods:
P1. a character string is formed with former ID and H positions random number first, and CRC check is carried out to this character string, gained CRC check value is clear-text passwords;
P2. the when m- UTC time of client is obtained;
P3. according to former ID, clear-text passwords, interim key, timestamp and chassis number, CRAM-MD5 encryption method, generation are used Original password;
P4. according to the sharing method IV at client and server end, former ID, original password, chassis number, timestamp and interim secret Key is made code data bag;
P5. newly-generated character string is exactly password.
3. the sharing method in the verification of car networking dynamic password is applied according to claim 1, it is characterised in that described common Method is enjoyed, in addition to:
S4:According to the sharing method II at client and server end, USE ID are decrypted into former ID;
S5:According to the sharing method III at client and server end, code data bag is decrypted into former ID, original password, chassis Number, timestamp and interim key;
S6:The former ID obtained in S4 and S5 is compared, in obtained former ID be compared, judge whether it is consistent, if It is inconsistent, directly return to authentication failed.
4. the sharing method in the verification of car networking dynamic password is applied according to claim 3, it is characterised in that above-mentioned common Method is enjoyed, in addition to:
S7:If S6 Central Plains ID is consistent, the timestamp of server end is obtained, and compared with decrypting obtained timestamp, such as The fruit time difference is more than certain time, then authentication failed, otherwise carries out verifying below;
S8:According to former ID, clear-text passwords, timestamp and chassis number, using CRAM-MD5 decryption method, original password is generated, And compared with decrypting obtained original password, judge whether unanimously, it is inconsistent, directly return to authentication failed.
5. the sharing method in the verification of car networking dynamic password is applied according to claim 4, it is characterised in that above-mentioned common Method is enjoyed, in addition to:
S9:If the original password obtained in S8 is consistent, judge whether interim key is empty, and if sky, then generation is interim secret Key;
S10:If user logs in for the first time, and is verified, then the interim key and the result of generation are made data Bag, is sent to client;
If non-first time logs in, the result is only made packet, is sent to client;
If authentication failed, can failure the reason for, be sent to client.
6. the sharing method in the verification of car networking dynamic password is applied according to claim 2, it is characterised in that shared side Method IV is:
1) arranged according to following form, form new character string:
Former ID original passwords<Chassis number timestamps>Interim key;
Wherein interim key is generated by server end, is issued to the key of client;When user's first time game server When, interim key is sky;Interim key is issued from server end after logging in successfully, when being logged in after preservation next time, is directly used.
2) character string newly formed is generated new character string in the way of base64 is encoded.
7. the sharing method in the verification of car networking dynamic password is applied according to claim 3, it is characterised in that shared side Method II is specially:
A1. it is N positions character string to provide former ID, and character string is made up of letter and number, not comprising other characters;
A2. base64 decodings are carried out to USE ID, generates new character string;
A3. according to the requirement of complete binary tree, a completion binary tree is generated in the way of preamble travels through to new character string;
A4. in the way of being layered and traveling through, this complete binary tree of generation is traveled through, finally just reverts to former ID.
8. the sharing method in the verification of car networking dynamic password is applied according to claim 3, it is characterised in that shared side Method III is specially:
11) passwords are to be decrypted into initial data according to following form
Former ID original passwords<Chassis number timestamps>Interim key
22) characters ">" below when there is no data, representative is user's first time game server, and now server needs to generate Interim key;And when to client response, interim key is sent to client.
CN201610728069.5A 2016-08-25 2016-08-25 Apply the sharing method in the verification of car networking dynamic password Pending CN107786326A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610728069.5A CN107786326A (en) 2016-08-25 2016-08-25 Apply the sharing method in the verification of car networking dynamic password

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610728069.5A CN107786326A (en) 2016-08-25 2016-08-25 Apply the sharing method in the verification of car networking dynamic password

Publications (1)

Publication Number Publication Date
CN107786326A true CN107786326A (en) 2018-03-09

Family

ID=61439056

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610728069.5A Pending CN107786326A (en) 2016-08-25 2016-08-25 Apply the sharing method in the verification of car networking dynamic password

Country Status (1)

Country Link
CN (1) CN107786326A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109950956A (en) * 2019-03-29 2019-06-28 深圳市搜电科技发展有限公司 A kind of shared charging equipment system and its multisequencing encryption management method

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120210127A1 (en) * 2006-05-16 2012-08-16 Masakazu Sato Authentication device using true random number generating element or pseudo-random number generating element, authentication apparatus, and authentication method
CN103414552A (en) * 2013-07-31 2013-11-27 深圳信息职业技术学院 Method and device for encrypting and decrypting by using binary tree traversal mode
US20140149744A1 (en) * 2010-05-20 2014-05-29 Compagnie Industrielle Et Financiere D' Ingenierie "Ingenico" Method for obtaining encryption keys corresponding terminals, server and computer program products
CN103888265A (en) * 2014-04-11 2014-06-25 上海博路信息技术有限公司 Login system and method based on mobile terminal
CN104219228A (en) * 2014-08-18 2014-12-17 四川长虹电器股份有限公司 User registration and user identification method and user registration and user identification system
CN105282125A (en) * 2014-07-25 2016-01-27 中国电信股份有限公司 Access control method and device in Web real-time communication

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120210127A1 (en) * 2006-05-16 2012-08-16 Masakazu Sato Authentication device using true random number generating element or pseudo-random number generating element, authentication apparatus, and authentication method
US20140149744A1 (en) * 2010-05-20 2014-05-29 Compagnie Industrielle Et Financiere D' Ingenierie "Ingenico" Method for obtaining encryption keys corresponding terminals, server and computer program products
CN103414552A (en) * 2013-07-31 2013-11-27 深圳信息职业技术学院 Method and device for encrypting and decrypting by using binary tree traversal mode
CN103888265A (en) * 2014-04-11 2014-06-25 上海博路信息技术有限公司 Login system and method based on mobile terminal
CN105282125A (en) * 2014-07-25 2016-01-27 中国电信股份有限公司 Access control method and device in Web real-time communication
CN104219228A (en) * 2014-08-18 2014-12-17 四川长虹电器股份有限公司 User registration and user identification method and user registration and user identification system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109950956A (en) * 2019-03-29 2019-06-28 深圳市搜电科技发展有限公司 A kind of shared charging equipment system and its multisequencing encryption management method

Similar Documents

Publication Publication Date Title
EP2020797B1 (en) Client-server Opaque token passing apparatus and method
US8209744B2 (en) Mobile device assisted secure computer network communication
CN105516195B (en) A kind of security certification system and its authentication method based on application platform login
CN107846282A (en) A kind of electronic data distribution keeping method and system based on block chain technology
US8417949B2 (en) Total exchange session security
CN107566407A (en) A kind of two-way authentication Security Data Transmission and storage method based on USBkey
CN106060078B (en) User information encryption method, register method and verification method applied to cloud platform
CN106453361B (en) A kind of security protection method and system of the network information
CN103685282A (en) Identity authentication method based on single sign on
CN102868702B (en) System login device and system login method
CN104184743A (en) Three-layer authentication system and method oriented to cloud computing platform
CN105871553A (en) Identity-free three-factor remote user authentication method
CN103701919A (en) Remote login method and system
CN101938473A (en) Single-point login system and single-point login method
WO2009062373A1 (en) Method of implementing network genuine identification
CN105228157B (en) A kind of wireless sensor network security light weight reprogramming method
CN105827395A (en) Network user authentication method
CN103856468A (en) Authentication system and method
CN106685973A (en) Method and device for remembering log in information, log in control method and device
CN109033808B (en) Game experience method and account server
CN103414699A (en) Authentication method for client certificate, server and client
CN103475477A (en) Safe authorized access method
CN103220673A (en) Wireless local area network (WLAN) user authentication method, authentication server and user equipment (UE)
CN108400962A (en) A kind of Authentication and Key Agreement method under multiserver framework
CN108777673B (en) Bidirectional identity authentication method in block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180309