Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Authorization control method aimed at server

An authorization control and server technology, which is applied in the field of authorization control for servers, can solve problems such as illegal cracking, destruction, and authorization is not guaranteed, and achieves the effect of improving reliability and encryption strength.

Inactive Publication Date: 2008-02-06
北京意科能源技术有限公司
View PDF0 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the continuous development of information industry technology, the transfer and service mechanism between communication networks has been paid more and more attention by users. As an important part of the communication system, the server, the customer's concern for its security when it is used and controlled Attention has also reached an unprecedented height. Now, more methods are used to authorize the server to control the authorization file, but most of the authorization files are in plain text. Even after encryption, it is easy to be illegally cracked, and once cracked , caused huge damage to the users of the application server, and also destroyed the normal data and information exchange order, which to some extent resulted in the expected authorization not being guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authorization control method aimed at server
  • Authorization control method aimed at server
  • Authorization control method aimed at server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The above and other technical features and advantages of the present invention will be described in more detail below in conjunction with the accompanying drawings.

[0032] First of all, the present invention controls the number of users using the server and divides them into four types. Of course, this can be increased or decreased according to actual needs. In this system, users are subdivided according to business needs, divided into four types: The four types are controlled separately, and these four types of users are the number of super users, the number of data maintenance users, the number of VIP users, and the number of online ordinary users.

[0033] Please refer to FIG. 1, which is a flow chart of a preferred embodiment of the authorization control method for the server of the present invention; the steps it includes are:

[0034] Step a: generating an identification code for authorization information;

[0035] Step b: Perform server verification;

[0036]...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to an authorization controlling method aiming at the servers. The present invention controls the quantity of the users who are using the servers, solves the problem that the control of the server admitting authorization is easy to be cracked, realizes the controls of the users with different categories, namely the quantity of the super users, the quantity of the data maintaining users, the quantity of the VIP users and the quantity of the normal users who are on line; the double restoring of the softdog and the disk document is adopted for the admitting authorizing document restoring medium; a the double validating of the softdog and the local document is also adopted for the validation of the admitting authorizing document and the encrypting methods are used by mixing variety of encryptions so as to elevate the reliability of the authorization.

Description

technical field [0001] The present invention relates to an authorization authentication method, in particular to an authorization control method for a server. Background technique [0002] With the continuous development of information industry technology, the transfer and service mechanism between communication networks has been paid more and more attention by users. As an important part of the communication system, the server, the customer's concern for its security when it is used and controlled Attention has also reached an unprecedented height. Now, more methods are used to authorize the server to control the authorization file, but most of the authorization files are in plain text. Even after encryption, it is easy to be illegally cracked, and once cracked , has caused huge damage to the users of the application server, and also disrupted the normal data and information exchange order, resulting in the expected authorization not being guaranteed to some extent. [000...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L29/06
Inventor 宋斌方晓波赵龙依陈明孟令伟李晓
Owner 北京意科能源技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products