Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication method and system, server and client

An authentication method and client technology, applied in the field of information security

Inactive Publication Date: 2012-12-12
HUAWEI DIGITAL TECH SUZHOU
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At this time, adopting the existing authentication process will increase the load on the server and put forward higher requirements for the processing speed of the server and network bandwidth. If the processing speed and network bandwidth of the server cannot be guaranteed, there may be Causes network congestion and takes longer to complete the authentication process
Therefore, the existing authentication methods have technical defects such as large waste of network bandwidth resources and low authentication efficiency.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and system, server and client
  • Authentication method and system, server and client
  • Authentication method and system, server and client

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The technical solutions of the present invention will be described in further detail below with reference to the accompanying drawings and embodiments.

[0047] figure 2 It is a flow chart of the authentication method in the embodiment of the present invention. Such as figure 2 As shown, this embodiment includes the following steps:

[0048] Step 11, the server generates an authentication code according to the stored client identification, legal user identity information and security configuration information corresponding to the legal user identity information;

[0049] Step 12, the server establishes the corresponding relationship between the authentication code and the client ID, legal user identity information and security configuration information, stores the authentication code, and sends the authentication code to the corresponding client;

[0050] Step 13, the server receives the authentication request sent by the client that includes the client ID and the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an authentication method, a system, a server and a client terminal. The authentication method comprises the steps: receiving an authentication request which contains client identifier, inquiring an authentication code corresponding to the prestored client identifier when the authentication request also contains the authentication code, testing the legality of the authentication code contained in the authentication request, instructing the client terminal to carry out security check according to the stored security configuration information after the authentication code contained in the authentication request passes through legality testing. The authentication method, the system, the server and the client terminal of the invention authenticate the authentication code contained in the authentication request, which avoids repeating authentication of the same authentication request to the authentication request with the same client identification information, simplifies authentication procedure, improves authentication efficiency, meanwhile instructs the client terminal to carry out security check according to the stored security configuration information, avoids repeat sending the same security configuration information, reduces the amount of data exchange between the server and the client terminal and is favorable for saving network band width resource.

Description

technical field [0001] The invention relates to the field of information security, in particular to an authentication method and system, a server and a client. Background technique [0002] Authentication systems are widely used in the field of information security. like figure 1 The authentication system corresponding to the authentication method shown is composed of a client and a server. The general process of using this authentication system for authentication is as follows: figure 1 Shown: [0003] Step a1, the client sends an authentication request including user identity information to the server; [0004] Step a2, the server receives the authentication request, performs identity verification on the user identity information included in the authentication request, and judges whether the user identity information is legal, and if the user identity information is legal, execute step a3; if the user identity information is invalid, execute step a6 ; [0005] Step a3...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 史晓磊谢永方
Owner HUAWEI DIGITAL TECH SUZHOU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products