Unlock instant, AI-driven research and patent intelligence for your innovation.

Service authentication method and system

A service authentication and service technology, applied in the field of authentication, can solve the problems of reducing the security of terminal access to operation servers and proxy servers, increasing the risk of real information being intercepted and fraudulently used, and reducing the risk of interception and fraudulent use. Risk, the effect of improving safety

Inactive Publication Date: 2013-06-26
中国广电河南网络有限公司
View PDF4 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The real information of the terminal remains in the same state for a long time for transmission, which increases the risk of the real information of the terminal being intercepted and fraudulently used, and reduces the security of the terminal accessing the operation server and proxy server

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Service authentication method and system
  • Service authentication method and system
  • Service authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0059] The operation server of this application receives the service access request sent by the terminal based on the operation server, the service access request carries the first proxy credential and service identifier of the terminal, and the first proxy credential is the The terminal is assigned when the terminal is authenticated, and the first proxy certificate assigned by the operation server each time the terminal is authenticated is different; when the operation server determ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention provides a service authentication method. The method comprises the steps that an operating server receives service access request carrying first agent certificates and service identification sent by a terminal based on the operating server, wherein the first agent certificates are distributed when the operating server performs authentication to the terminal and are different from one another when the operating server performs authentication to the terminal every time; the operating server sends response message to the terminal; the terminal fixes second agent certificates according to the response message and sends agent service access request carrying the second agent certificates to a proxy server; the proxy server sends the second agent certificates to the operating server; the operating server verifies the validity of the second agent certificates and sends verification results to the proxy server; and the proxy server processes the agent service access request according to the verification results, so that the method reduces risks that terminal information is intercepted and illegally used, and improves the security of the terminal for accessing the operating server and the proxy server.

Description

technical field [0001] The present application relates to the field of authentication, in particular to a service authentication method and system. Background technique [0002] Currently, the operation server needs to authenticate the terminal based on the operation server. When the terminal is turned off or on standby, the operation server will re-authenticate the terminal. And each time the operation server authenticates the terminal, it assigns the same terminal ID to the terminal, and the terminal ID records the real information of the terminal. Each time the terminal sends a service access request to the operation server, it carries the terminal ID. When the operation server receives the terminal’s service access request, it judges the legitimacy of the terminal according to the terminal ID. After judging that the terminal is legal, if the operation server determines that the terminal sent The service corresponding to the service access request is the service in the p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 王道谊贾鹏薄斐翔陈欣卜瑞锋王海涛
Owner 中国广电河南网络有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More