Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Time type plug-in authentication method and system

An authentication method and technology of an authentication system, applied in the field of time-based plug-in authentication, can solve problems such as no digital signature, plug-in information replay attack, plug-in information copy, etc., to prevent replay attacks, ensure that it is not used by copying, The effect of increasing safety

Inactive Publication Date: 2017-03-29
SHANGHAI PEOPLENET SECURITY TECH
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, digital signatures are often used to identify identities, but the storage and invalidation of private keys make this method flawed. Once the private key expires, all digital signatures related to it will no longer have "non-repudiation".
Then it is easy for the plug-in information to be copied, and the plug-in information replay attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Time type plug-in authentication method and system
  • Time type plug-in authentication method and system
  • Time type plug-in authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the specific implementation manners of the present invention will be described below with reference to the accompanying drawings. Obviously, the accompanying drawings in the following description are only some embodiments of the present invention, and those skilled in the art can obtain other accompanying drawings based on these drawings and obtain other implementations.

[0033] In order to make the drawing concise, each drawing only schematically shows the parts related to the present invention, and they do not represent the actual structure of the product. In addition, to make the drawings concise and easy to understand, in some drawings, only one of the components having the same structure or function is schematically shown, or only one of them is marked. Herein, "a" not only means "only one", but also means "more than one".

[0034] The presen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a time type plug-in authentication method and system. The method comprises the following steps: step S100, a client initiates request information of applying for a plug-in to a server; step S200, the server releases applied plug-in information to the client according to device identification information of the client; step S300, the client applies to the server for time information authentication in the received plug-in information; and after the authentication success of the server, step S400 is executed; and step S400, the client updates the time information in the plug-in information to the current time when the plug-in information is authenticated. The purpose is to solve the problem that the plug-in information is subjected to tampering and replay attacks by authenticating the time in the plug-in information, and the security of the system is effectively improved.

Description

technical field [0001] The invention relates to the field of secure communication, in particular to a method and system for time-based plug-in authentication. Background technique [0002] The rapid development of the Internet has brought about a series of Internet security problems. Hackers intercept the data packets sent by users and continuously send a valid data to the server fraudulently. Therefore, the server needs to determine which request is real and valid. [0003] At present, digital signatures are widely used to identify identities, but the storage and invalidation of private keys make this method flawed. Once the private key expires, all digital signatures related to it will no longer be "non-repudiable". Then it is easy for the plug-in information to be copied, and the plug-in information replay attack. [0004] Therefore, aiming at the defects of the above technical problems, the present invention provides related technical solutions for solving the problems....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L29/06
CPCH04L9/3297H04L63/108
Inventor 谈剑锋李光岩姜立稳胡剑波谢勇钱金金
Owner SHANGHAI PEOPLENET SECURITY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products