Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Service access method and system, authentication method and system, client and authentication server

An authentication server and business access technology, which is applied in client, business access, authentication server, authentication method and corresponding system fields, can solve the problem of low security of business access

Active Publication Date: 2012-03-14
CHINA MOBILE COMM CO LTD
View PDF5 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Embodiments of the present invention provide a service access, authentication method and corresponding system, client, and authentication server, which are used to solve the problem of low security of service access in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Service access method and system, authentication method and system, client and authentication server
  • Service access method and system, authentication method and system, client and authentication server
  • Service access method and system, authentication method and system, client and authentication server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0044] Such as figure 1 As shown, it is the configuration process of the service password provided by Embodiment 1 of the present invention, and the specific content includes:

[0045] Step 101, the client terminal judges whether there is a valid service password configuration.

[0046] There may be various trigger conditions for this step, including but not limited to: periodically judging whether there is a valid service password configuration, and judging whether there is a valid business password configuration when receiving a service access request.

[0047] The specific judgment method can be as follows: set the business password configuration success flag in the client, if there is currently a valid business password configuration, set the business password configuration success flag to 1; otherwise, the business password configuration success flag position 0.

[0048] If there is currently a valid service password configuration, then end the service password configur...

Embodiment 2

[0061] Such as figure 2 As shown, it is a schematic flow diagram of the service access method provided in Embodiment 2 of the present invention, and the specific content includes:

[0062] Step 201, the client receives a service access request from a user.

[0063] When the user logs in to the client, a service access request is initiated to the client, and the service access request carries a user account representing the user's identity.

[0064] This step can be used as the trigger condition of step 101 in Embodiment 1. When the client receives the service access request, it judges whether there is a valid service password configuration corresponding to the user account. If there is no valid service password configuration, enter the The service password configuration process recorded in Embodiment 1, otherwise, directly enter the service access process.

[0065] Step 202: The client determines the serial number corresponding to the user account in the service access requ...

Embodiment 3

[0080] Embodiment 3 of the present invention also provides an authentication method under the same inventive concept as Embodiment 2, such as image 3 As shown, the method includes the following steps:

[0081] Step 301: the authentication server receives a first authentication request from a client.

[0082] The first authentication request includes a user account.

[0083] Before this step is performed, the authentication server and the client have performed a configuration process for the service password of the user account.

[0084] Step 302: According to the user account carried in the first authentication request, the authentication server determines the service password corresponding to the user account which has been saved by itself.

[0085] In this step, the authentication server determines the service password corresponding to the user account carried in the first authentication request according to the correspondence between the user account and the service pass...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a service access method, a service access system, an authentication method, an authentication system, a client and an authentication server. The specific content is that: the authentication server generates and stores a service password corresponding to a user account according to the user account, a sequence number and an identifier of terminal equipment which are submitted by the client; when a subsequent user requests for service access, the client generates a service password corresponding to the user account according to the user account, the sequence number and the identifier of the terminal equipment, and indicates the authentication server to authenticate according to the pre-stored service password and the service password generated by the client; the service password is relevant to the identifier of the terminal equipment in which the client is positioned and relevant to the sequence number, the identifier of the terminal equipment is difficult to steal maliciously and the sequence number has longer bits from 64 to 128 and is difficult to peep, so the safety of accessed service can be improved by adopting the scheme of the embodiment of the invention.

Description

technical field [0001] The present invention relates to the communication field, in particular to a service access and authentication method and a corresponding system, client, and authentication server. Background technique [0002] A client, or client, refers to a program that corresponds to a server and provides local services for users. In order to ensure the security of the business, in the operation process of using the client to access the server, in order to verify the identity of the user, the client / server usually requires the user to enter login information, including the user account and the user password corresponding to the user account. When the login information entered by the user is consistent with the login information saved by the client / server, the user can access the server through the client through authentication of the user's identity. [0003] In the above authentication methods for user identities, the security of the user password is very importa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 黄海彭青立朱春梅
Owner CHINA MOBILE COMM CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products