Method for verifying authority of network communication user

A technology of user authority and verification method, which is applied in the field of verification of network communication user authority, can solve the problems of communication information leakage, lack of prevention mechanism, lack of identity authentication mechanism, etc., and achieves the effect of improving legality and

Inactive Publication Date: 2015-12-02
MEIBEIKE TECH CO LTD
View PDF8 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, these existing service systems lack a complete identity authentication mechanis

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for verifying authority of network communication user
  • Method for verifying authority of network communication user
  • Method for verifying authority of network communication user

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] Embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0027] Such as Figure 1 to Figure 4 As shown, the embodiment of the present invention provides a verification method for network communication user rights, the method includes the client registration server, the client login server, the client sends the communication information of the function protocol request to the server and The server receives the communication information sent by the client and judges whether the current communication is legal and whether the current protocol is legal. Wherein, the functional protocol includes user ID, sessionkey, current timestamp of the server and other business protocols, wherein the specific steps for obtaining the current timestamp of the server are: the client obtains the timestamp before the current sending functional protocol, plus The user login time obtains the timestamp difference obtained by subtrac...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of computer network communication, and discloses a method for verifying the authority of a network communication user. A client sends communication information of a functional protocol request to a server, and the functional protocol comprises user ID, sessionkey, current time stamp of the server and other business protocols. The step of obtaining the current time stamp of the server includes the client obtains the time stamp before the current functional protocol is sent, adding the user login time obtaining the client time stamp and subtracting the time stamp of the serve to obtain the time stamp difference. The server receives the communication information sent by the client, and determines whether the current communication is legal and whether the current protocol is legal. The validity of a service request sponsor and the requested protocol is completed, and the current communication is strictly protected against leakage.

Description

technical field [0001] The invention belongs to the technical field of computer network communication, and in particular relates to a verification method for network communication user rights. Background technique [0002] With the continuous development of network technology and the continuous popularization of various network applications, sharing specific files between people through network communication has gradually become an indispensable part of people's daily work and life. In a complex network communication environment, there is the possibility of leaking important file transmission content, monitoring the communication process, and stealing core technologies, as well as malicious attacks on terminal transmission equipment. Therefore, ensuring the security of terminal network communication is paramount. important. [0003] At present, most terminal communication methods do not pay enough attention to the security of communication. Most of the account management a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0815H04L63/0876H04L65/1073
Inventor 张涢王会
Owner MEIBEIKE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products