CN107786326A - Apply the sharing method in the verification of car networking dynamic password - Google Patents
Apply the sharing method in the verification of car networking dynamic password Download PDFInfo
- Publication number
- CN107786326A CN107786326A CN201610728069.5A CN201610728069A CN107786326A CN 107786326 A CN107786326 A CN 107786326A CN 201610728069 A CN201610728069 A CN 201610728069A CN 107786326 A CN107786326 A CN 107786326A
- Authority
- CN
- China
- Prior art keywords
- former
- character string
- sharing method
- client
- verification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0863—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer And Data Communications (AREA)
- Storage Device Security (AREA)
Abstract
Apply the sharing method in the verification of car networking dynamic password, it is characterised in that specifically include:According to the sharing method I at client and server end, USE ID are generated as after former ID is encrypted;The sharing method I is:It is N positions character string to provide former ID, and character string is made up of letter and number, not comprising other characters;Using former ID each character as the leaf node of a complete binary tree, a complete binary tree is formed in the way of hierarchal arrangement;Again N number of character combination into a new character string in the way of preamble travels through;To newly-generated character string, base64 codings, generation USE ID are carried out;Using sharing method, ID is encrypted, to protect ID;Using shared encryption method, encryption data bag is generated, the data encryption in network, it is not easy to be cracked, security has more preferable guarantee.
Description
Technical field
The present invention relates to car networking technology field, especially a kind of shared side applied in the verification of car networking dynamic password
Method.
Background technology
SASL be it is a kind of be used for expand C/S model checking ability authentication mechanism, full name Simple Authentication
And Security Layer. are when setting sasl, it is necessary to two pieces thing are determined, first, for exchanging " identification information " or identity
The authentication mechanism of certificate;Second, determine the checking framework of identification information storage method.Sasl authentication mechanism specification client with
The coding method of answering, transferring content between server;Sasl checking frameworks determine how server stores visitor in itself
The letter of identity at family end and the password how client offer is provided.If client can successfully pass checking, server end
The identity of user is then can determine that, and determines what kind of authority user has whereby.During using this mechanism, client and server
Same hidden cipher is shared, and this password does not pass through network transmission.Verification process is first to propose to address inquires to from server
Challenge starts, and client calculates a response response using this challenge and hidden cipher.Different
Challenge, it is impossible to calculate identical response;Any side for possessing secret password, can use phase
Same challenge calculates identical response.Therefore, if server compare client return response whether with
The response oneself calculated is identical, it is possible to knows whether the password that client is possessed is correct.SASL is to provide a kind of use
Whether family ID authentication mechanism, the account/password that can be simply considered for certification user are run into system or use
The service of system.
The content of the invention
It is right using sharing method the invention provides a kind of sharing method applied in the verification of car networking dynamic password
ID is encrypted, to protect ID;Using shared encryption method, encryption data bag is generated, the data in network are added
It is close, it is not easy to be cracked, security has more preferable guarantee.
On the one hand, the invention provides the sharing method applied in the verification of car networking dynamic password, specifically include:
S1:According to the sharing method I at client and server end, USE ID are generated as after former ID is encrypted;
The sharing method I is:
A, provide that former ID is N positions character string, character string is made up of letter and number, not comprising other characters;
B, using former ID each character as the leaf node of a complete binary tree, the group in the way of hierarchal arrangement
Into a complete binary tree;I.e. former ID first node is with node, while is the first node layer;Second node layer is 2
Node, from left to right respectively second character and the 3rd character, the like, form a complete y-bend with N number of character
Tree;
C, again N number of character combination into a new character string in the way of preamble travels through;I.e. according to first with node,
Left sibling afterwards, the most mode of rear right node generate new character string;
D, to newly-generated character string, base64 codings, generation USE ID are carried out;
S2:The generation cryptographic methods shared using client and server end, generate code data bag;
S3:According to the USE ID and code data bag of generation, packet is made, is sent to server.
Further, the generation cryptographic methods are:
P1. a character string is formed with former ID and H positions random number first, and CRC check, gained is carried out to this character string
CRC check value be clear-text passwords;
P2. the when m- UTC time of client is obtained;
P3. according to former ID, clear-text passwords, interim key, timestamp and chassis number, using CRAM-MD5 encryption method,
Generate original password;
P4. according to the sharing method IV at client and server end, former ID, original password, chassis number, timestamp and face
When key be made code data bag;
P5. newly-generated character string is exactly password.
Further, the sharing method, in addition to:
S4:According to the sharing method II at client and server end, USE ID are decrypted into former ID;
S5:According to the sharing method III at client and server end, code data bag be decrypted into former ID, original password,
Chassis number, timestamp and interim key;
S6:The former ID obtained in S4 and S5 is compared, judged whether unanimously, if inconsistent, directly returns to checking
Failure.
Further, above-mentioned sharing method, in addition to:
S7:If S6 Central Plains ID is consistent, the timestamp of server end is obtained, and compared with decrypting obtained timestamp
Compared with if the time difference is more than certain time, authentication failed, otherwise progress is verified below;
S8:It is original close using CRAM-MD5 decryption method, generation according to former ID, clear-text passwords, timestamp and chassis number
Code, and compared with decrypting obtained original password, judge whether unanimously, it is inconsistent, directly return to authentication failed.
Further, above-mentioned sharing method, in addition to:
S9:If the original password obtained in S8 is consistent, judge whether interim key is empty, and if sky, then generation is faced
When key;
S10:If user logs in for the first time, and is verified, then the interim key and the result of generation are made
Packet, it is sent to client;
If non-first time logs in, the result is only made packet, is sent to client;
If authentication failed, can failure the reason for, be sent to client.
Further, sharing method IV is:
1) arranged according to following form, form new character string:
Former ID original passwords<Chassis number timestamps>Interim key;
Wherein interim key is generated by server end, is issued to the key of client;
When user's first time game server, interim key is sky;From service after logging in successfully
Device end issues interim key, when being logged in after preservation next time, directly uses.
2) character string newly formed is generated new character string in the way of base64 is encoded.
Further, sharing method II is specially:
A1. it is N positions character string to provide former ID, and character string is made up of letter and number, not comprising other characters;
A2. base64 decodings are carried out to USE ID, generates new character string.
A3. according to the requirement of complete binary tree, one is generated in the way of preamble travels through to new character string and completes two
Fork tree;Because character string only has 17 characters, therefore this complete binary tree is only of five storeys, both first next node, the second layer
2 nodes, 4 nodes of third layer, the 4th layer of 8 node;Layer 5 is only left 2 nodes;
A4. in the way of being layered and traveling through, this complete binary tree of generation is traveled through, finally just reverts to original
ID。
As further, sharing method III is specially:
11) passwords are to be decrypted into initial data according to following form
Former ID original passwords<Chassis number timestamps>Interim key
22) characters ">" below when there is no data, representative is user's first time game server, and now server needs
Generate interim key;And when to client response, interim key is sent to client.
The present invention can obtain following technique effect due to using above technical method:Using sharing method, to user
ID is encrypted, to protect ID;Using shared encryption method, encryption data bag is generated, the data encryption in network, no
Easily it is cracked, security has more preferable guarantee;
Time element is added, ensure that ageing.Message is only received within the specific limits to be only effectively, is prevented
The problem of repeat logon;Password does not have to, in transmission over networks, avoid the worry that password is ravesdropping yet.
Brief description of the drawings
The shared width of accompanying drawing 1 of the present invention:
Fig. 1 is to apply the sharing method structure chart in the verification of car networking dynamic password.
Embodiment
To make the purpose, technical scheme and advantage of embodiments of the invention clearer, with reference to the embodiment of the present invention
In accompanying drawing, the technical scheme in the embodiment of the present invention is clearly completely described:
Embodiment 1
A kind of sharing method applied in the verification of car networking dynamic password is present embodiments provided, is specifically included:
S1:According to the sharing method I at client and server end, USE ID are generated as after former ID is encrypted;
Sharing method I is:
A, provide that former ID is 17 character strings, character string is made up of letter and number, not comprising other characters;
B, using former ID each character as the leaf node of a complete binary tree, the group in the way of hierarchal arrangement
Into a complete binary tree;I.e. former ID first node is with node, while is the first node layer;Second node layer is 2
Node, from left to right respectively second character and the 3rd character, the like, form a complete y-bends with 17 characters
Tree;
C, again 17 character combinations into a new character string in the way of preamble travels through;I.e. according to first with section
Point, most rear left sibling, the mode of rear right node generate new character string;
D, to newly-generated character string, base64 codings, generation USE ID are carried out.
S2:The generation cryptographic methods shared using client and server end, generate code data bag;
Generation password method be:
P1. a character string is formed with former ID and 15 random number first, and CRC check, institute is carried out to this character string
The CRC check value obtained is clear-text passwords;
P2. the when m- UTC time of client is obtained;
P3. according to former ID, clear-text passwords, interim key, timestamp and chassis number, using CRAM-MD5 encryption method,
Generate original password;
P4. according to the sharing method IV at client and server end, former ID, original password, chassis number, timestamp and face
When key be made code data bag;
P5. newly-generated character string is exactly password.
S3:According to the USE ID and code data bag of generation, packet is made, is sent to server;
Embodiment 2
As the further supplement to embodiment 1, above-mentioned sharing method also includes:
S4:According to the sharing method II at client and server end, USE ID are decrypted into former ID;
S5:According to the sharing method III at client and server end, code data bag be decrypted into former ID, original password,
Chassis number, timestamp and interim key;
S6:The former ID obtained in S4 and S5 is compared, judged whether unanimously, if inconsistent, directly returns to checking
Failure.
Embodiment 3
As the further supplement to embodiment 2, above-mentioned sharing method also includes:
S7:If S6 Central Plains ID is consistent, the timestamp of server end is obtained, and compared with decrypting obtained timestamp
Compared with if the time difference is more than certain time, such as outside 10 seconds, then authentication failed, otherwise carries out verifying below;
S8:It is original close using CRAM-MD5 decryption method, generation according to former ID, clear-text passwords, timestamp and chassis number
Code, and compared with decrypting obtained original password, judge whether unanimously, it is inconsistent, directly return to authentication failed.
S9:If the original password that S8 is obtained is consistent, judge whether interim key is empty, and if sky, then generation is interim
Key;
S10:If user logs in for the first time, and is verified, then the interim key and the result of generation are made
Packet, it is sent to client;
If non-first time logs in, the result is only made packet, is sent to client;
If authentication failed, can failure the reason for, be sent to client.
Embodiment 4
As the further supplement to embodiment 1, sharing method IV is:
1) arranged according to following form, form new character string:
Former ID original passwords<Chassis number timestamps>Interim key;
Wherein interim key is generated by server end, is issued to the key of client;
When user's first time game server, interim key is sky;Issued after logging in successfully from server end interim secret
Key, when being logged in after preservation next time, directly use.
2) character string newly formed is generated new character string in the way of base64 is encoded.
Embodiment 5
As the further supplementary notes to embodiment 2, sharing method II is specially:
A1. it is 17 character strings to provide former ID, and character string is made up of letter and number, not comprising other characters;
A2. base64 decodings are carried out to USE ID, generates new character string;
A3. according to the requirement of complete binary tree, one is generated in the way of preamble travels through to new character string and completes two
Fork tree;Because character string only has 17 characters, therefore this complete binary tree is only of five storeys, both first next node, the second layer
2 nodes, 4 nodes of third layer, the 4th layer of 8 node;Layer 5 is only left 2 nodes;
A4. in the way of being layered and traveling through, this complete binary tree of generation is traveled through, finally just reverts to original
ID。
As preferable, sharing method III is specially:
11) passwords are to be decrypted into initial data according to following form
Former ID original passwords<Chassis number timestamps>Interim key
22) characters ">" below when there is no data, representative is user's first time game server, and now server needs
Generate interim key;And when to client response, interim key is sent to client.
The foregoing is only a preferred embodiment of the present invention, but protection scope of the present invention be not limited thereto,
Any one skilled in the art in the technical scope of present disclosure, technique according to the invention scheme and its
Inventive concept is subject to equivalent substitution or change, should all be included within the scope of the present invention.
Claims (8)
1. apply the sharing method in the verification of car networking dynamic password, it is characterised in that specifically include:
S1:According to the sharing method I at client and server end, USE ID are generated as after former ID is encrypted;
The sharing method I is:
A, provide that former ID is N positions character string, character string is made up of letter and number, not comprising other characters;
B, using former ID each character as the leaf node of a complete binary tree, one is formed in the way of hierarchal arrangement
Complete binary tree;
C, again N number of character combination into a new character string in the way of preamble travels through;
D, to newly-generated character string, base64 codings, generation USE ID are carried out;
S2:The generation cryptographic methods shared using client and server end, generate code data bag;
S3:According to the USE ID and code data bag of generation, packet is made, is sent to server.
2. the sharing method in the verification of car networking dynamic password is applied according to claim 1, it is characterised in that the life
It is into cryptographic methods:
P1. a character string is formed with former ID and H positions random number first, and CRC check is carried out to this character string, gained
CRC check value is clear-text passwords;
P2. the when m- UTC time of client is obtained;
P3. according to former ID, clear-text passwords, interim key, timestamp and chassis number, CRAM-MD5 encryption method, generation are used
Original password;
P4. according to the sharing method IV at client and server end, former ID, original password, chassis number, timestamp and interim secret
Key is made code data bag;
P5. newly-generated character string is exactly password.
3. the sharing method in the verification of car networking dynamic password is applied according to claim 1, it is characterised in that described common
Method is enjoyed, in addition to:
S4:According to the sharing method II at client and server end, USE ID are decrypted into former ID;
S5:According to the sharing method III at client and server end, code data bag is decrypted into former ID, original password, chassis
Number, timestamp and interim key;
S6:The former ID obtained in S4 and S5 is compared, in obtained former ID be compared, judge whether it is consistent, if
It is inconsistent, directly return to authentication failed.
4. the sharing method in the verification of car networking dynamic password is applied according to claim 3, it is characterised in that above-mentioned common
Method is enjoyed, in addition to:
S7:If S6 Central Plains ID is consistent, the timestamp of server end is obtained, and compared with decrypting obtained timestamp, such as
The fruit time difference is more than certain time, then authentication failed, otherwise carries out verifying below;
S8:According to former ID, clear-text passwords, timestamp and chassis number, using CRAM-MD5 decryption method, original password is generated,
And compared with decrypting obtained original password, judge whether unanimously, it is inconsistent, directly return to authentication failed.
5. the sharing method in the verification of car networking dynamic password is applied according to claim 4, it is characterised in that above-mentioned common
Method is enjoyed, in addition to:
S9:If the original password obtained in S8 is consistent, judge whether interim key is empty, and if sky, then generation is interim secret
Key;
S10:If user logs in for the first time, and is verified, then the interim key and the result of generation are made data
Bag, is sent to client;
If non-first time logs in, the result is only made packet, is sent to client;
If authentication failed, can failure the reason for, be sent to client.
6. the sharing method in the verification of car networking dynamic password is applied according to claim 2, it is characterised in that shared side
Method IV is:
1) arranged according to following form, form new character string:
Former ID original passwords<Chassis number timestamps>Interim key;
Wherein interim key is generated by server end, is issued to the key of client;When user's first time game server
When, interim key is sky;Interim key is issued from server end after logging in successfully, when being logged in after preservation next time, is directly used.
2) character string newly formed is generated new character string in the way of base64 is encoded.
7. the sharing method in the verification of car networking dynamic password is applied according to claim 3, it is characterised in that shared side
Method II is specially:
A1. it is N positions character string to provide former ID, and character string is made up of letter and number, not comprising other characters;
A2. base64 decodings are carried out to USE ID, generates new character string;
A3. according to the requirement of complete binary tree, a completion binary tree is generated in the way of preamble travels through to new character string;
A4. in the way of being layered and traveling through, this complete binary tree of generation is traveled through, finally just reverts to former ID.
8. the sharing method in the verification of car networking dynamic password is applied according to claim 3, it is characterised in that shared side
Method III is specially:
11) passwords are to be decrypted into initial data according to following form
Former ID original passwords<Chassis number timestamps>Interim key
22) characters ">" below when there is no data, representative is user's first time game server, and now server needs to generate
Interim key;And when to client response, interim key is sent to client.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610728069.5A CN107786326A (en) | 2016-08-25 | 2016-08-25 | Apply the sharing method in the verification of car networking dynamic password |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610728069.5A CN107786326A (en) | 2016-08-25 | 2016-08-25 | Apply the sharing method in the verification of car networking dynamic password |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107786326A true CN107786326A (en) | 2018-03-09 |
Family
ID=61439056
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610728069.5A Pending CN107786326A (en) | 2016-08-25 | 2016-08-25 | Apply the sharing method in the verification of car networking dynamic password |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107786326A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109950956A (en) * | 2019-03-29 | 2019-06-28 | 深圳市搜电科技发展有限公司 | A kind of shared charging equipment system and its multisequencing encryption management method |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120210127A1 (en) * | 2006-05-16 | 2012-08-16 | Masakazu Sato | Authentication device using true random number generating element or pseudo-random number generating element, authentication apparatus, and authentication method |
CN103414552A (en) * | 2013-07-31 | 2013-11-27 | 深圳信息职业技术学院 | Method and device for encrypting and decrypting by using binary tree traversal mode |
US20140149744A1 (en) * | 2010-05-20 | 2014-05-29 | Compagnie Industrielle Et Financiere D' Ingenierie "Ingenico" | Method for obtaining encryption keys corresponding terminals, server and computer program products |
CN103888265A (en) * | 2014-04-11 | 2014-06-25 | 上海博路信息技术有限公司 | Login system and method based on mobile terminal |
CN104219228A (en) * | 2014-08-18 | 2014-12-17 | 四川长虹电器股份有限公司 | User registration and user identification method and user registration and user identification system |
CN105282125A (en) * | 2014-07-25 | 2016-01-27 | 中国电信股份有限公司 | Access control method and device in Web real-time communication |
-
2016
- 2016-08-25 CN CN201610728069.5A patent/CN107786326A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120210127A1 (en) * | 2006-05-16 | 2012-08-16 | Masakazu Sato | Authentication device using true random number generating element or pseudo-random number generating element, authentication apparatus, and authentication method |
US20140149744A1 (en) * | 2010-05-20 | 2014-05-29 | Compagnie Industrielle Et Financiere D' Ingenierie "Ingenico" | Method for obtaining encryption keys corresponding terminals, server and computer program products |
CN103414552A (en) * | 2013-07-31 | 2013-11-27 | 深圳信息职业技术学院 | Method and device for encrypting and decrypting by using binary tree traversal mode |
CN103888265A (en) * | 2014-04-11 | 2014-06-25 | 上海博路信息技术有限公司 | Login system and method based on mobile terminal |
CN105282125A (en) * | 2014-07-25 | 2016-01-27 | 中国电信股份有限公司 | Access control method and device in Web real-time communication |
CN104219228A (en) * | 2014-08-18 | 2014-12-17 | 四川长虹电器股份有限公司 | User registration and user identification method and user registration and user identification system |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109950956A (en) * | 2019-03-29 | 2019-06-28 | 深圳市搜电科技发展有限公司 | A kind of shared charging equipment system and its multisequencing encryption management method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2020797B1 (en) | Client-server Opaque token passing apparatus and method | |
US8209744B2 (en) | Mobile device assisted secure computer network communication | |
CN105516195B (en) | A kind of security certification system and its authentication method based on application platform login | |
CN107846282A (en) | A kind of electronic data distribution keeping method and system based on block chain technology | |
US8417949B2 (en) | Total exchange session security | |
CN107566407A (en) | A kind of two-way authentication Security Data Transmission and storage method based on USBkey | |
CN106060078B (en) | User information encryption method, register method and verification method applied to cloud platform | |
CN106453361B (en) | A kind of security protection method and system of the network information | |
CN103685282A (en) | Identity authentication method based on single sign on | |
CN102868702B (en) | System login device and system login method | |
CN104184743A (en) | Three-layer authentication system and method oriented to cloud computing platform | |
CN105871553A (en) | Identity-free three-factor remote user authentication method | |
CN103701919A (en) | Remote login method and system | |
CN101938473A (en) | Single-point login system and single-point login method | |
WO2009062373A1 (en) | Method of implementing network genuine identification | |
CN105228157B (en) | A kind of wireless sensor network security light weight reprogramming method | |
CN105827395A (en) | Network user authentication method | |
CN103856468A (en) | Authentication system and method | |
CN106685973A (en) | Method and device for remembering log in information, log in control method and device | |
CN109033808B (en) | Game experience method and account server | |
CN103414699A (en) | Authentication method for client certificate, server and client | |
CN103475477A (en) | Safe authorized access method | |
CN103220673A (en) | Wireless local area network (WLAN) user authentication method, authentication server and user equipment (UE) | |
CN108400962A (en) | A kind of Authentication and Key Agreement method under multiserver framework | |
CN108777673B (en) | Bidirectional identity authentication method in block chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180309 |