Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Terminal, server side, and terminal access management method

A terminal access and server-side technology, applied in the field of communications, can solve the problems of being easily attacked, downtime, and poor push request connection access security.

Active Publication Date: 2016-08-24
NUBIA TECHNOLOGY CO LTD
View PDF5 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The main purpose of the present invention is to propose a terminal, server, and terminal access management method, aiming to solve the problem that the server cannot perform effective access control due to the imperfect existing security verification, and it is easy to be attacked by people. Downtime, resulting in poor security of push request connection access

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal, server side, and terminal access management method
  • Terminal, server side, and terminal access management method
  • Terminal, server side, and terminal access management method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0062] This embodiment proposes a terminal, please refer to image 3 , including: a first acquisition module 11, an encapsulation module 12 and a first sending module 13, the first acquisition module 11 is used to acquire a token from the server; the encapsulation module 12 is used to encapsulate the information containing the token into an access request message ; The first sending module 13 is used to send the access request message to the server.

[0063] See Figure 4 , the terminal further includes a second obtaining module 14, and the second obtaining module 14 is configured to obtain an access address and a security verification code.

[0064] Specifically, before the push project or other project is connected to the real access server, it needs to visit the interface of the routing server first, and the first obtaining module 11 obtains the request token, that is, the terminal first sends a request message to the server to obtain the token , and the second obtaining ...

Embodiment 2

[0067] This embodiment provides a server, please refer to Figure 5 , including: a token generating module 21, a second sending module 22, a receiving module 23 and a judging module 24, further, the token generating module 21 is used to generate a token; the second sending module 22 is used to receive After obtaining the request, the token is sent to the terminal; the receiving module 23 is used to receive the access request message sent by the terminal, and the access request message contains the token; the judging module 24 is used to judge whether the access request message is based on the access request message Allow terminal access.

[0068] Further, the access request message also includes an access address and a security verification code.

[0069] Further, see Figure 6 , the judging module 24 includes an access location determination submodule 241, a first verification submodule 242 and a second verification submodule 243, specifically, the location determination su...

Embodiment 3

[0075] This embodiment provides a terminal access management method. For details, please refer to Figure 8 ,include:

[0076] Step 101, the terminal obtains a token from the server, encapsulates information including the token into an access request message, and sends the access request message to the server;

[0077] Step 102, after receiving the access request message, the server determines whether to allow terminal access according to the access request message.

[0078] Specifically, for step 101, before the push project or other project is connected to the real access server, it is necessary to visit the interface of the routing server once to obtain the request token, that is, the terminal first sends a request message to the server to obtain the token, and Request routing list information. After the server receives the request message, it obtains information such as the number of online users and the performance of the push access server for analysis, and the routing s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a terminal, a server side, and a terminal access management method. The method comprises: a terminal obtains a token form a server side, information including the token is packaged into an access request message, and then the access request message is sent to the server side; and after the server side receives the access request message, whether the terminal access is allowed is determined based on the access request message. With the method, a secure verification mechanism is provided and thus the server side can carry out effective access controlling on the terminal, so that security of push request connection access is improved.

Description

technical field [0001] The present invention relates to the communication field, in particular to a terminal, a server and a terminal access management method. Background technique [0002] Currently, in many systems or APPs, there is a function of using message push. That is, by establishing a stable and reliable long-term connection between the cloud and the client, it provides developers with the service of pushing real-time messages to client applications, helping developers to effectively motivate users. And all message push needs to be supported by the background server to be able to realize it. Only by maintaining a long link can the real-time nature of message sending and receiving be realized. [0003] Due to the need to maintain the communication between the server and the client for a long time, it is necessary to maintain a long connection between the client and the server. If the number of clients is large, the server needs to maintain a large number of long co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0428H04L63/068H04L63/0846
Inventor 郑秋燕
Owner NUBIA TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products