Wireless safety authentication method orienting to mobile terminal

An identity verification method and mobile terminal technology, which is applied in the field of wireless security identity verification, can solve problems affecting system security, achieve the effects of preventing malicious registration, reducing the risk of malicious access, and reducing pressure

Inactive Publication Date: 2014-09-03
HANGZHOU NORMAL UNIVERSITY
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If TTP becomes untrustworthy due to attacks and other reasons, it will become a stronghold for man-in-the-middle attacks, seriously affecting the security of the entire system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless safety authentication method orienting to mobile terminal
  • Wireless safety authentication method orienting to mobile terminal
  • Wireless safety authentication method orienting to mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The present invention will be further described below in conjunction with accompanying drawing.

[0040] Step (1). Mobile terminal registration:

[0041] 1-1. Fill in the registration form on the mobile terminal, and send the user information of the registration form to the authentication server.

[0042] 1-2. After receiving the user information sent by the mobile terminal, the authentication server searches the local database for the record of the user name (Email) in the user information. If the user name already exists, it prompts that the user has registered; if the user name does not If present, registration is allowed.

[0043] 1-3. During the registration process, the authentication server generates the user identity certificate, the user RSA private key, the Diffie-Hellman (DH) key pair belonging to the mobile terminal C and the Diffie-Hellman (DH) key pair belonging to the authentication server CS ;Such as figure 2As shown, the authentication server invoke...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a mobile terminal-oriented wireless security authentication method. Existing mobile terminals have relatively low computing power and security. The invention uses Diffie-Hellman security key exchange algorithm, digital certificate technology, DES symmetric encryption algorithm, and combines certificate local verification technology, secondary login technology and time stamp technology. Firstly, the mobile terminal is registered; secondly, the user identity certificate is verified locally and the mobile terminal logs in to the authentication server, so as to realize the functions of the mobile terminal registering and logging in to the authentication server in the wireless network. The invention has the advantages of strong security, simple operation, etc., and provides a new and reliable method for mobile terminals to access intranet resources.

Description

technical field [0001] The present invention belongs to the technical field of wireless security identity verification, and in particular relates to a mobile terminal-oriented wireless security identity verification method, in particular to a traditional wireless public key infrastructure (WPKI) based security algorithm and security algorithm used by WPKI Architecture for an improved authentication method for wireless communication networks. Background technique [0002] With the continuous acceleration of the construction of government informatization projects, more and more government departments tend to network their business, such as information collection, data sharing, business acceptance, public opinion feedback, etc., can all be realized through the Internet. At the same time, with the rapid development of wireless communication network technology and the improvement of people's requirements for the convenience of various services, more and more application services ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04W12/069
Inventor 夏莹杰邝砾孙才俊吴佳明
Owner HANGZHOU NORMAL UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products