Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Terminal authentication information generation method and system based on national cryptographic algorithm

A technology of terminal authentication and national secret algorithm, applied in the field of authentication information generation, it can solve the problems of single source of authentication information data, unable to protect software, short length of authentication information, etc. The effect of protecting safety

Active Publication Date: 2020-09-25
SHANDONG COMP SCI CENTNAT SUPERCOMP CENT IN JINAN
View PDF7 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The method of generating terminal authentication information usually uses the information generated by the terminal to generate authentication information using an encryption algorithm, but this method has the problem of short authentication information, which may be located by a third party to analyze and attack the authentication information in a targeted manner ; At the same time, the source of authentication information data is single, which cannot effectively protect the software

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal authentication information generation method and system based on national cryptographic algorithm
  • Terminal authentication information generation method and system based on national cryptographic algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0027] This embodiment provides a method for generating terminal authentication information based on a national secret algorithm;

[0028] Such as figure 1 As shown, the terminal authentication information generation method based on the national secret algorithm includes:

[0029] S104: Read and decrypt the serial number from the hardware fingerprint information; read and decrypt the verification information from the hardware fingerprint information; read and decrypt the data segment data from the hardware fingerprint information;

[0030] Calculate and verify the check value of the data segment, verify whether the calculated check value is consistent with the stored check value, if yes, go to the next step, if not, write the error message to the file, and end;

[0031] S105: Decrypt the data segment, extract the serial number, hardware fingerprint information, information generation time and CPU information from the file; perform data consistency verification, if the calcula...

Embodiment 2

[0232] This embodiment provides a system for generating terminal authentication information based on a national secret algorithm;

[0233] The terminal authentication information generation system based on the national secret algorithm, including:

[0234] The reading module is configured to: read and decrypt the serial number from the hardware fingerprint information; read and decrypt the verification information from the hardware fingerprint information; read and decrypt the data segment data from the hardware fingerprint information; calculate the data segment Check the value and verify it, verify whether the calculated check value is consistent with the stored check value, if yes, go to the next step, if not, write the error message to the file, and end;

[0235] The verification module is configured to: decrypt the data segment, extract the serial number, hardware fingerprint information, information generation time and CPU information from the file; perform data consiste...

Embodiment 3

[0241] This embodiment also provides an electronic device, including: one or more processors, one or more memories, and one or more computer programs; wherein, the processor is connected to the memory, and the one or more computer programs are programmed Stored in the memory, when the electronic device is running, the processor executes one or more computer programs stored in the memory, so that the electronic device executes the method described in Embodiment 1 above.

[0242] It should be understood that in this embodiment, the processor can be a central processing unit CPU, and the processor can also be other general-purpose processors, digital signal processors DSP, application specific integrated circuits ASIC, off-the-shelf programmable gate array FPGA or other programmable logic devices , discrete gate or transistor logic devices, discrete hardware components, etc. A general-purpose processor may be a microprocessor, or the processor may be any conventional processor, o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a terminal authentication information generation method and system based on a national cryptographic algorithm. The method comprises the following steps: reading and decryptinga serial number from hardware fingerprint information; reading and decrypting the verification information from the hardware fingerprint information; reading and decrypting the data segment data fromthe hardware fingerprint information; calculating a check value of the data segment and verifying, verifying whether the calculated check value is consistent with a stored check value or not, if so,entering the next step, and if not, writing error information into a file, and ending; decrypting the data segment, and extracting the serial number, the hardware fingerprint information, the information generation time and the CPU information from the file; performing data consistency verification, whereinif the calculated value is consistent with the stored value, verification succeeds, the nextstep is executed, and if not, error information is written into the file, and the process is ended; generating a random number; and generating data segment information based on the random number andthe file check value, writing the information segment and the data segment information into the file, and ending.

Description

technical field [0001] The present disclosure relates to the technical field of authentication information generation, in particular to a method and system for generating terminal authentication information based on a national secret algorithm. Background technique [0002] The statements in this section merely mention background art related to the present disclosure and do not necessarily constitute prior art. [0003] The method of generating terminal authentication information usually uses the information generated by the terminal to generate authentication information using an encryption algorithm, but this method has the problem of short authentication information, which may be located by a third party to analyze and attack the authentication information in a targeted manner ; At the same time, the source of authentication information data is single, which cannot effectively protect the software. Contents of the invention [0004] In order to solve the deficiencies o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/64G06F21/44
CPCG06F21/44G06F21/64
Inventor 王英龙付勇杨美红陈丽娟
Owner SHANDONG COMP SCI CENTNAT SUPERCOMP CENT IN JINAN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products