CN112054910A - Portal authentication method based on RSA algorithm - Google Patents

Portal authentication method based on RSA algorithm Download PDF

Info

Publication number
CN112054910A
CN112054910A CN202010990688.8A CN202010990688A CN112054910A CN 112054910 A CN112054910 A CN 112054910A CN 202010990688 A CN202010990688 A CN 202010990688A CN 112054910 A CN112054910 A CN 112054910A
Authority
CN
China
Prior art keywords
password
authentication
private key
user name
portal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202010990688.8A
Other languages
Chinese (zh)
Inventor
李晓坤
陈虹旭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Heilongjiang Xuao Technology Co ltd
Original Assignee
Heilongjiang Xuao Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Heilongjiang Xuao Technology Co ltd filed Critical Heilongjiang Xuao Technology Co ltd
Priority to CN202010990688.8A priority Critical patent/CN112054910A/en
Publication of CN112054910A publication Critical patent/CN112054910A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3249Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Abstract

The invention provides a Portal authentication method based on an RSA algorithm, which comprises the following steps: the method comprises the steps that a wireless access point obtains a Web page authentication request sent by terminal equipment, the running state of an authentication program is judged, a Web page authentication request message is received or discarded, a user name and a password are obtained through entering an authentication interface, a client program signs the password by using a private key contained in an RSA algorithm, then the signed user name and password are sent to a Portal server of a server side, the Portal server side decrypts the password by using an RSA public key of the client side, whether the decrypted user name and password are consistent with information stored in a database or not is judged, and authentication is successful or failed.

Description

Portal authentication method based on RSA algorithm
Technical Field
The invention relates to the field of data security, in particular to a Portal authentication method based on an RSA algorithm.
Background
With the continuous development of computer encryption technology, information encryption is required to be performed at various levels such as network information transmission, identity authentication and the like.
The Portal authentication method is suitable for wireless access authentication methods in places such as governments, large shopping malls and the like, and is gradually accepted and deployed by mainstream places. However, the existing Portal authentication method adopts plaintext transmission in the authentication information transmission process, so that illegal criminal acts are very easy to be performed after information is stolen, and personal or transaction information of users is revealed, so that a market demand for the Portal authentication method which can ensure safe and reliable transmission and is not tampered and stolen is provided.
Disclosure of Invention
Aiming at the defects in the prior art, the invention aims to provide a Portal authentication method based on an RSA algorithm, the provided method realizes safer monitoring management and authentication functions, and has the advantages of high data access safety factor, high signature and signature release speed and the like.
The invention provides a Portal authentication method based on an RSA algorithm, which comprises the following steps: the method comprises the steps that a wireless access point obtains a Web page authentication request sent by terminal equipment, the running state of an authentication program is judged, a Web page authentication request message is received or discarded, a user name and a password are obtained through entering an authentication interface, a client program signs the password by using a private key contained in an RSA algorithm, then the signed user name and password are sent to a Portal server of a server side, the Portal server side decrypts the password by using an RSA public key of the client side, whether the decrypted user name and password are consistent with information stored in a database or not is judged, and authentication is successful or failed.
Wherein the data originates from a user, a Portal server, and a wireless access point.
The private key signature data process satisfies the following formula, and finally, a ciphertext C is generated:
Figure DEST_PATH_IMAGE001
c' is an integer for transmitting information segmentation, e is an encryption character string stored in the private key, and n is an encryption character string in the original encryption private key.
The public key signing release data process satisfies the following formula, and finally, the data information C' is restored:
Figure 912925DEST_PATH_IMAGE002
d, storing the encrypted character string in the public key and the private key, and carrying out the label release.
The security is based on RSA non-tampering, if the user or server information is not honest, the authentication will not be passed.
And after receiving the signature data, the Portal server successfully signs off and matches the signature data with a server database, and if the signature data are consistent with the signature data, the user authentication is successful.
Drawings
Fig. 1 shows an overall process flow diagram of a method for authenticating Portal based on RSA algorithm according to an example embodiment of the present invention.
Detailed Description
As shown in fig. 1, an embodiment of the present invention provides a method for authenticating a Portal based on an RSA algorithm. First, in step S101, the wireless access point acquires a Web page authentication request sent by the terminal device, and the user selects to access the wireless access point network, thereby automatically triggering the Web page request.
Next, in step S102, it is determined that the authentication program is in an operating state.
In step S103, the Web page authentication request message is received or discarded, and if it is determined in step S102 that the authentication program is in the operating state, the Web page authentication request message is received, and if it is determined that the authentication program is in the non-operating state, the Web page authentication request message is discarded.
The user enters the authentication interface in step S104 and enters a username and password on the Web authentication page.
In step S105, the client RSA private key signs the password and sends the signed username and password to the Portal server, where the private key signing data process should satisfy the following formula, and finally generates a ciphertext C:
Figure DEST_PATH_IMAGE003
c' is an integer for transmitting information segmentation, e is an encryption character string stored in the private key, and n is an encryption character string in the original encryption private key.
In step S106, the Portal server decrypts the password by using the client RSA public key, and the public key signature decryption process should satisfy the following formula, and finally restores the data information C':
Figure 410772DEST_PATH_IMAGE004
d, storing the encrypted character string in the public key and the private key, and carrying out the label release.
It is determined in step S107 whether the decrypted user name and password agree with the information stored in the database.
In step S108, if it is determined in step S107 that the decrypted user name and password are consistent with the information stored in the database, the user authentication is successful and the wireless lan can be accessed normally, and if it is determined that the decrypted user name and password are inconsistent with the information stored in the database, the user authentication is failed and the wireless lan refuses to end.

Claims (5)

1. A Portal authentication method based on an RSA algorithm, the method comprising:
a wireless access point acquires a Web page authentication request sent by terminal equipment;
judging the running state of the authentication program;
receiving or discarding a Web page authentication request message, and entering an authentication interface to acquire a user name and a password;
the client program signs the password by using a private key contained in an RSA algorithm, and then sends the signed user name and password to a Portal server of the server side, and the Portal server side decrypts the password by using an RSA public key of the client;
and judging whether the decrypted user name and password are consistent with the information stored in the database.
2. The method of claim 1, wherein the data originates from a user, a Portal server, and a wireless access point.
3. The method of claim 1, wherein the private key signature data process satisfies the following formula, and finally generates the ciphertext C:
Figure 378399DEST_PATH_IMAGE001
c' is an integer for transmitting information segmentation, e is an encryption character string stored in the private key, and n is an encryption character string in the original encryption private key.
4. The method according to claim 1, wherein the public key de-signing data process satisfies the following formula, and finally restores the data information C':
Figure 848564DEST_PATH_IMAGE002
d, storing the encrypted character string in the public key and the private key, and carrying out the label release.
5. The method of claim 1, wherein the fairness is based on RSA being non-tamperproof, such that if the user and the server are dishonest, the authentication will not be passed.
CN202010990688.8A 2020-09-19 2020-09-19 Portal authentication method based on RSA algorithm Withdrawn CN112054910A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010990688.8A CN112054910A (en) 2020-09-19 2020-09-19 Portal authentication method based on RSA algorithm

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010990688.8A CN112054910A (en) 2020-09-19 2020-09-19 Portal authentication method based on RSA algorithm

Publications (1)

Publication Number Publication Date
CN112054910A true CN112054910A (en) 2020-12-08

Family

ID=73604646

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010990688.8A Withdrawn CN112054910A (en) 2020-09-19 2020-09-19 Portal authentication method based on RSA algorithm

Country Status (1)

Country Link
CN (1) CN112054910A (en)

Similar Documents

Publication Publication Date Title
CN111614637B (en) Secure communication method and system based on software cryptographic module
US9094823B2 (en) Data processing for securing local resources in a mobile device
CN111435913B (en) Identity authentication method and device for terminal of Internet of things and storage medium
CN106357690B (en) data transmission method, data sending device and data receiving device
CN105828332A (en) Method of improving wireless local area authentication mechanism
JP3362780B2 (en) Authentication method in communication system, center device, recording medium storing authentication program
WO2010066127A1 (en) Safe communication method and device for mobile financial service based on application layer
CN113204760B (en) Method and system for establishing secure channel for software cryptographic module
CN113114668A (en) Information transmission method, mobile terminal, storage medium and electronic equipment
CN111541660B (en) Identity authentication method for remote vehicle control
CN110378135A (en) Intimacy protection system and method based on big data analysis and trust computing
CN113225330A (en) Electronic information data secure transmission method
CN112311533A (en) Terminal identity authentication method, system and storage medium
CN110839036B (en) Attack detection method and system for SDN (software defined network)
CN110572392A (en) Identity authentication method based on HyperLegger network
CN113992411A (en) User identity authentication method and device based on trusted equipment
CN112383577A (en) Authorization method, device, system, equipment and storage medium
US20050144459A1 (en) Network security system and method
CN116743372A (en) Quantum security protocol implementation method and system based on SSL protocol
CN111010491A (en) Image data transmission method, device and system based on hiding technology
CN107404476B (en) Method and device for protecting data security in big data cloud environment
CN112054910A (en) Portal authentication method based on RSA algorithm
CN113115309B (en) Data processing method and device for Internet of vehicles, storage medium and electronic equipment
CN114422266A (en) IDaaS system based on dual verification mechanism
CN113592484A (en) Account cubing method, system and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20201208