Unlock instant, AI-driven research and patent intelligence for your innovation.

System and method for terminal security access authentication

An access authentication and terminal security technology, applied in the field of communication, can solve the problems of poor security, sensitive information leakage, illegal occupation of server resources, etc., and achieve the effect of ensuring safe transmission, ensuring security, and improving security.

Active Publication Date: 2018-08-21
SHANDONG SENTER ELECTRONICS
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the authentication process and data transmission of the existing terminal and server are independent of each other. Once the authentication is illegally skipped, the data transmission can proceed normally, so that the server resources will be further illegally occupied, which not only has poor security, but also easily leads to sensitive information. leaked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for terminal security access authentication
  • System and method for terminal security access authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] Embodiments of the present invention are further described below in conjunction with accompanying drawings:

[0026] Such as figure 1 As shown, the system for terminal security access authentication described in the present invention includes a terminal 1 and a server 2, and the terminal 1 and the server 2 are connected through a network;

[0027] The terminal 1 includes a terminal application module 3 and a terminal identification information module 4, and the terminal application module 3 and the terminal identification information module 4 are connected by a data communication line;

[0028] Described server 2 comprises service end service module 5 and service end access authentication module 6, service end service module 5 and service end access authentication module 6 are connected by data communication line;

[0029] The terminal application module 3 is connected to the server service module 5 through a network;

[0030] Such as figure 2 As shown, the authenti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a communication technology, in particular to a system and method for terminal security access authentication. The system comprises a terminal and a server. The terminal and the server are connected through a network. The terminal comprises a terminal application module and a terminal identification information module. The terminal application module and the terminal identification information module are connected through a data communication line. The server comprises a server side service module and a server side access authentication module. The server side service module and the server side access authentication module are connected through a data communication line. The terminal application module and the server side service module are connected through a network. According to the system and method for terminal security access authentication, authentication is easy, information transmission is safe and reliable, sensitive information leakage can be effectively avoided, and the high practicability is achieved.

Description

technical field [0001] The invention relates to a communication technology, in particular to a system and method for terminal security access authentication. Background technique [0002] At present, for the resource sharing service mode, when the terminal accesses and obtains the right to use resources, the server needs to perform access authentication on the terminal, that is, to confirm the authority of the terminal to access the system, to block illegal terminals from accessing the server, and to further protect limited resources. Resources are not illegally occupied. In addition, in order to ensure the security and reliability of the access authentication mechanism, the interaction information between the terminal and the server needs to be encrypted and transmitted to ensure that valid and sensitive information is not leaked. However, the authentication process and data transmission of the existing terminal and server are independent of each other. Once the authentica...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L9/0625H04L9/0631H04L9/0643H04L9/0869H04L63/062H04L63/083H04L63/0876
Inventor 王汉磊蔡富东刘在平李在学崔利
Owner SHANDONG SENTER ELECTRONICS