CN112054910A - Portal authentication method based on RSA algorithm - Google Patents
Portal authentication method based on RSA algorithm Download PDFInfo
- Publication number
- CN112054910A CN112054910A CN202010990688.8A CN202010990688A CN112054910A CN 112054910 A CN112054910 A CN 112054910A CN 202010990688 A CN202010990688 A CN 202010990688A CN 112054910 A CN112054910 A CN 112054910A
- Authority
- CN
- China
- Prior art keywords
- password
- authentication
- private key
- user name
- portal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3249—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
Abstract
The invention provides a Portal authentication method based on an RSA algorithm, which comprises the following steps: the method comprises the steps that a wireless access point obtains a Web page authentication request sent by terminal equipment, the running state of an authentication program is judged, a Web page authentication request message is received or discarded, a user name and a password are obtained through entering an authentication interface, a client program signs the password by using a private key contained in an RSA algorithm, then the signed user name and password are sent to a Portal server of a server side, the Portal server side decrypts the password by using an RSA public key of the client side, whether the decrypted user name and password are consistent with information stored in a database or not is judged, and authentication is successful or failed.
Description
Technical Field
The invention relates to the field of data security, in particular to a Portal authentication method based on an RSA algorithm.
Background
With the continuous development of computer encryption technology, information encryption is required to be performed at various levels such as network information transmission, identity authentication and the like.
The Portal authentication method is suitable for wireless access authentication methods in places such as governments, large shopping malls and the like, and is gradually accepted and deployed by mainstream places. However, the existing Portal authentication method adopts plaintext transmission in the authentication information transmission process, so that illegal criminal acts are very easy to be performed after information is stolen, and personal or transaction information of users is revealed, so that a market demand for the Portal authentication method which can ensure safe and reliable transmission and is not tampered and stolen is provided.
Disclosure of Invention
Aiming at the defects in the prior art, the invention aims to provide a Portal authentication method based on an RSA algorithm, the provided method realizes safer monitoring management and authentication functions, and has the advantages of high data access safety factor, high signature and signature release speed and the like.
The invention provides a Portal authentication method based on an RSA algorithm, which comprises the following steps: the method comprises the steps that a wireless access point obtains a Web page authentication request sent by terminal equipment, the running state of an authentication program is judged, a Web page authentication request message is received or discarded, a user name and a password are obtained through entering an authentication interface, a client program signs the password by using a private key contained in an RSA algorithm, then the signed user name and password are sent to a Portal server of a server side, the Portal server side decrypts the password by using an RSA public key of the client side, whether the decrypted user name and password are consistent with information stored in a database or not is judged, and authentication is successful or failed.
Wherein the data originates from a user, a Portal server, and a wireless access point.
The private key signature data process satisfies the following formula, and finally, a ciphertext C is generated:
c' is an integer for transmitting information segmentation, e is an encryption character string stored in the private key, and n is an encryption character string in the original encryption private key.
The public key signing release data process satisfies the following formula, and finally, the data information C' is restored:
d, storing the encrypted character string in the public key and the private key, and carrying out the label release.
The security is based on RSA non-tampering, if the user or server information is not honest, the authentication will not be passed.
And after receiving the signature data, the Portal server successfully signs off and matches the signature data with a server database, and if the signature data are consistent with the signature data, the user authentication is successful.
Drawings
Fig. 1 shows an overall process flow diagram of a method for authenticating Portal based on RSA algorithm according to an example embodiment of the present invention.
Detailed Description
As shown in fig. 1, an embodiment of the present invention provides a method for authenticating a Portal based on an RSA algorithm. First, in step S101, the wireless access point acquires a Web page authentication request sent by the terminal device, and the user selects to access the wireless access point network, thereby automatically triggering the Web page request.
Next, in step S102, it is determined that the authentication program is in an operating state.
In step S103, the Web page authentication request message is received or discarded, and if it is determined in step S102 that the authentication program is in the operating state, the Web page authentication request message is received, and if it is determined that the authentication program is in the non-operating state, the Web page authentication request message is discarded.
The user enters the authentication interface in step S104 and enters a username and password on the Web authentication page.
In step S105, the client RSA private key signs the password and sends the signed username and password to the Portal server, where the private key signing data process should satisfy the following formula, and finally generates a ciphertext C:
c' is an integer for transmitting information segmentation, e is an encryption character string stored in the private key, and n is an encryption character string in the original encryption private key.
In step S106, the Portal server decrypts the password by using the client RSA public key, and the public key signature decryption process should satisfy the following formula, and finally restores the data information C':
d, storing the encrypted character string in the public key and the private key, and carrying out the label release.
It is determined in step S107 whether the decrypted user name and password agree with the information stored in the database.
In step S108, if it is determined in step S107 that the decrypted user name and password are consistent with the information stored in the database, the user authentication is successful and the wireless lan can be accessed normally, and if it is determined that the decrypted user name and password are inconsistent with the information stored in the database, the user authentication is failed and the wireless lan refuses to end.
Claims (5)
1. A Portal authentication method based on an RSA algorithm, the method comprising:
a wireless access point acquires a Web page authentication request sent by terminal equipment;
judging the running state of the authentication program;
receiving or discarding a Web page authentication request message, and entering an authentication interface to acquire a user name and a password;
the client program signs the password by using a private key contained in an RSA algorithm, and then sends the signed user name and password to a Portal server of the server side, and the Portal server side decrypts the password by using an RSA public key of the client;
and judging whether the decrypted user name and password are consistent with the information stored in the database.
2. The method of claim 1, wherein the data originates from a user, a Portal server, and a wireless access point.
3. The method of claim 1, wherein the private key signature data process satisfies the following formula, and finally generates the ciphertext C:
c' is an integer for transmitting information segmentation, e is an encryption character string stored in the private key, and n is an encryption character string in the original encryption private key.
5. The method of claim 1, wherein the fairness is based on RSA being non-tamperproof, such that if the user and the server are dishonest, the authentication will not be passed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010990688.8A CN112054910A (en) | 2020-09-19 | 2020-09-19 | Portal authentication method based on RSA algorithm |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010990688.8A CN112054910A (en) | 2020-09-19 | 2020-09-19 | Portal authentication method based on RSA algorithm |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112054910A true CN112054910A (en) | 2020-12-08 |
Family
ID=73604646
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010990688.8A Withdrawn CN112054910A (en) | 2020-09-19 | 2020-09-19 | Portal authentication method based on RSA algorithm |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112054910A (en) |
-
2020
- 2020-09-19 CN CN202010990688.8A patent/CN112054910A/en not_active Withdrawn
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111614637B (en) | Secure communication method and system based on software cryptographic module | |
US9094823B2 (en) | Data processing for securing local resources in a mobile device | |
CN111435913B (en) | Identity authentication method and device for terminal of Internet of things and storage medium | |
CN106357690B (en) | data transmission method, data sending device and data receiving device | |
CN105828332A (en) | Method of improving wireless local area authentication mechanism | |
JP3362780B2 (en) | Authentication method in communication system, center device, recording medium storing authentication program | |
WO2010066127A1 (en) | Safe communication method and device for mobile financial service based on application layer | |
CN113204760B (en) | Method and system for establishing secure channel for software cryptographic module | |
CN113114668A (en) | Information transmission method, mobile terminal, storage medium and electronic equipment | |
CN111541660B (en) | Identity authentication method for remote vehicle control | |
CN110378135A (en) | Intimacy protection system and method based on big data analysis and trust computing | |
CN113225330A (en) | Electronic information data secure transmission method | |
CN112311533A (en) | Terminal identity authentication method, system and storage medium | |
CN110839036B (en) | Attack detection method and system for SDN (software defined network) | |
CN110572392A (en) | Identity authentication method based on HyperLegger network | |
CN113992411A (en) | User identity authentication method and device based on trusted equipment | |
CN112383577A (en) | Authorization method, device, system, equipment and storage medium | |
US20050144459A1 (en) | Network security system and method | |
CN116743372A (en) | Quantum security protocol implementation method and system based on SSL protocol | |
CN111010491A (en) | Image data transmission method, device and system based on hiding technology | |
CN107404476B (en) | Method and device for protecting data security in big data cloud environment | |
CN112054910A (en) | Portal authentication method based on RSA algorithm | |
CN113115309B (en) | Data processing method and device for Internet of vehicles, storage medium and electronic equipment | |
CN114422266A (en) | IDaaS system based on dual verification mechanism | |
CN113592484A (en) | Account cubing method, system and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20201208 |