Terminal access authentication authorization method and terminal access authentication authorization system

A technology of authentication authorization and terminal access, applied in the field of network security, can solve the problem that the terminal authentication method is difficult to ensure the overall security of the system, and achieve the effect of ensuring security and eliminating attacks

Active Publication Date: 2015-04-01
WUHAN OPTICS VALLEY INFORMATION TECH
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a terminal access authentication and authorization method and a terminal access authentication and authoriza

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal access authentication authorization method and terminal access authentication authorization system
  • Terminal access authentication authorization method and terminal access authentication authorization system
  • Terminal access authentication authorization method and terminal access authentication authorization system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] Embodiments of the present invention provide a terminal access authentication and authorization method and a terminal access authentication and authorization system, which solve the problem that a single terminal authentication method in the prior art cannot guarantee the overall security of the system itself. The general idea is as follows:

[0021] The first is to identify the type and attribute of the terminal device, authenticate the entity identity of the terminal device, and then perform reasonable software authorization according to the authentication result, so that the correct media information can be played on the correct terminal, which solves the problem of terminal device access control. The problem of "soft" or "hard" makes the terminal device perform access control management as a complete entity.

[0022] In order to better understand the above-mentioned technical solution, the above-mentioned technical solution will be described in detail below in conjun...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a terminal access authentication authorization method and a terminal access authentication authorization system, which are applied to terminal equipment. The method comprises the following steps of carrying out hardware authentication on the terminal equipment; if the terminal equipment is authenticated by the hardware authentication, sending an authorization application to an authentication server; receiving a software authentication feedback sent by the authentication server, wherein the software authentication feedback is generated aiming at the authorization application by the authentication server and the terminal equipment obtains business operation authorization from the authentication server when the received software authentication feedback shows that the terminal equipment is allowed to access.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to a terminal access authentication authorization method and a terminal access authentication authorization system. Background technique [0002] The traditional or existing terminal access control focuses on terminal authentication, and mainly verifies the client software, and realizes the identification and authentication of the client through the local encryption and decryption of the client authentication string; the second is to use the terminal user name Password-based login authentication method, this authentication method is more for identity authentication of terminal accounts; other terminal software application encryption authentication with external hardware devices such as U-KEY also mostly stays at the software level for verification and identification , or encrypt the transmitted data, or encrypt the terminal client message for transmission, etc. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0876H04L63/0892
Inventor 范贤昌
Owner WUHAN OPTICS VALLEY INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products