Safety authentication method and authentication certification server

An authentication server and security authentication technology, applied in the field of security authentication methods and authentication authentication servers, can solve the problems of low authentication efficiency, easy to be cracked, and reduced user experience, so as to improve authentication efficiency, save authentication time, and improve user experience. Effect

Active Publication Date: 2015-06-24
NANJING ZHONGXING XIN SOFTWARE CO LTD
View PDF7 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Moreover, the existing security authentication methods are complicated to use. For example, for the USBKEY method, an additional U-shield must be carried; SMS password input for SMS notification, which reduces user experience
[0005] Based on the above-mentioned security authentication methods, the existing government and enterprise applications all implement identity authentication at the ap

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety authentication method and authentication certification server
  • Safety authentication method and authentication certification server
  • Safety authentication method and authentication certification server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In order to make the purpose, technical solution and advantages of the present invention more clear, the embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined arbitrarily with each other.

[0038] figure 1 It is a flowchart of the security authentication method of the present invention, such as figure 1 As shown, the present invention is applied to a scenario where a mobile terminal SIM card is used, such as a data card of a mobile phone, a PAD, a notebook computer, a PC, and the like. Include the following steps:

[0039] Step 100: When the terminal establishes the bearer connection, activate the user state through the authentication server.

[0040] In this step, the terminal establishes a bearer connection with the network through the communication network...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Disclosed are a security authentication method and an authorization authentication server. The method comprises: in the process of establishing a bearer connection by a terminal, activating, by an authorization authentication server, a user state; and when a terminal user accesses a campus network application, authenticating, by an application server, a user identity via the authorization authentication server. By means of the security authentication method in the embodiments of the present invention, security authentication is completed by a device in a network, the participation of a user is reduced, the authentication efficiency is significantly increased, and the authentication time of the user is saved. What's more, by conducting security authentication activation via a campus network with a carrier class (generally referring to an organized network of a government, an enterprise, a public service and the like), a carrier-class security authentication level, i.e. a security authentication manner of a SIM card and an authentication and authentication server, is achieved, thereby significantly improving the user experience.

Description

technical field [0001] The invention relates to network security technology, in particular to a security authentication method and an authentication authentication server. Background technique [0002] With the rapid development of the global information and communication technology (ICT, Information and Communication Technology) industry (including the organic combination of telecommunication services, information services, IT services and applications), network security and information security have increasingly become one of the core issues that people pay attention to. . How to carry out reliable authentication to protect the security of key areas such as information, finance, and business secrets has become one of the most important technologies in the communication and information industries. [0003] At present, there are many popular security authentication methods in the industry, which can be summarized into the following four basic types: one is the security mech...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/0853H04L63/0884H04W12/068H04W12/069H04W12/72
Inventor 孙枕戈田锋张军岳旭鹏陈亚红
Owner NANJING ZHONGXING XIN SOFTWARE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products