Unlock instant, AI-driven research and patent intelligence for your innovation.

A client-led client authentication method

A client and authentication technology, applied in location information-based services, electrical components, wireless communications, etc., can solve problems such as poor service quality, slow operation, and increased server load, and reduce performance hits Effects of demand, cost reduction, and flow saving

Active Publication Date: 2018-03-13
BEIJING SAPLING TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] For the C / S structure, since each server is connected to a large number of clients, it undertakes a heavy service task. When a large number of clients connect to the server at the same time, the load on the server will increase, the operation will slow down, and the service quality will deteriorate. Poor, server maintenance costs increase substantially
[0006] One of the most important functions of the server is the authentication function of the client, so that the client can obtain the corresponding service. When the server is congested due to overload, the authentication process will be affected, so that the user cannot log in to the server, and the user experience will deteriorate.
Moreover, a large amount of information is transmitted during the authentication process, which will generate a large amount of traffic for mobile client users and increase the economic burden of users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A client-led client authentication method
  • A client-led client authentication method
  • A client-led client authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0033] Embodiment 1 of the present invention provides a client-led client authentication method, which is applied to a server / client architecture network, and is characterized in that it includes:

[0034] Step 202, the server stores in the authentication database the identification serial numbers and geographical locations of the clients that have successfully authenticated;

[0035] Step 204, the first client applying for authentication to the server sends an authentication request to the server, which includes the identification serial number and geographic location of the first client and the identification serial number of the second client;

[0036] Step 206, when the server receives the authentication request, it judges whether it contains an authentication failure message, if not, then enters step 208; if yes, then enters step 222;

[0037] Step 208, the server looks up the identification serial number of the second client in the authentication database; if no matching...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a client authentication method led by the client. In the present invention, the client to be authenticated specifies other clients for authentication, and uses the resources of the nearby clients applied for to delegate the authentication tasks that should be undertaken by the server to nearby clients with good qualifications middle. This method of completing the authentication process by obtaining authentication information from one client to another client reduces the burden on the server, enables the server to use resources for more important services, and reduces the burden on the server. Performance requirements. Moreover, the near-field communication is used for authentication between clients, which saves the traffic of the mobile network and reduces the cost of the user.

Description

technical field [0001] The invention relates to the technical field of communication network security, in particular to an authentication method between devices. Background technique [0002] With the vigorous development of Internet services and the wide application of wireless networks, the security of mobile users has put forward more and more requirements for wireless systems: in addition to device authentication, user authentication and service authorization, wireless users and access The establishment of secure channels between entry points or base stations, the exchange of confidential information, and the confidential channels between BS and authenticator, authenticator and authentication server, the exchange of confidential information, etc. Issues that do not need to be considered and currently require a lot of attention. [0003] In the prior art, the network structure mainly includes two types of C / S structure and B / S structure. [0004] C / S (Client / Server) str...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04W4/02
CPCH04W4/02H04W12/06
Inventor 苏长君段彬
Owner BEIJING SAPLING TECH