Unlock instant, AI-driven research and patent intelligence for your innovation.

An authentication method, device and system

An authentication method and authentication server technology, applied in transmission systems, closed-circuit television systems, electrical components, etc., can solve problems such as affecting user experience, unavailability of monitoring services, and inability to transmit legitimate messages from front-end equipment, ensuring security. The effect of improving the feeling of use

Active Publication Date: 2020-11-17
ZHEJIANG UNIVIEW TECH CO LTD
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Since the 802.1X authentication of the front-end device is passed, the packets of the front-end device are allowed to be sent to the management server. Therefore, before the 802.1X authentication of the front-end device is passed, the legal packets of the front-end device cannot be transmitted to the management server. Causes the entire monitoring service to be unavailable, affecting user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An authentication method, device and system
  • An authentication method, device and system
  • An authentication method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The terminology used in the present invention is for the purpose of describing specific embodiments only, not limiting the present invention. As used herein and in the claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the term "and / or" as used herein is meant to include any and all possible combinations of one or more of the associated listed items.

[0045] It should be understood that although the terms first, second, third, etc. may be used in the present invention to describe various information, the information should not be limited to these terms. These terms are only used to distinguish information of the same type from one another. For example, without departing from the scope of the present invention, first information may also be called second information, and similarly, second information may also be called first information. Dep...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an authentication method, device and system. The method comprises the following steps: transmitting a designated strategy to safety equipment; receiving a registration message from terminal equipment before the terminal equipment is authenticated, obtaining a scanning result for the terminal equipment after login of the terminal equipment is finished, and obtaining loophole identification with need of adding with patches according to the scanning result and patch server information corresponding to the loophole identification; transmitting the loophole identification and the patch server information to the terminal equipment, so that the terminal equipment completes patch updating by utilizing the loophole identification and the patch server information; and receiving a live-keeping message which comes from the terminal equipment and used for indicating that patch updating of the terminal equipment is completed, and transmitting a strategy of initiating authentication to the safety equipment, wherein the safety equipment starts the authentication process. According to the technical scheme disclosed by the invention, the whole monitoring service can be normally used, so that use feeling of the user can be promoted, and the safety of a video monitoring system can be guaranteed.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to an authentication method, device and system. Background technique [0002] In recent years, with the rapid development of computers, networks, image processing, and transmission technologies, the trend of popularization of video surveillance systems has become more and more obvious. Video surveillance systems are gradually becoming high-definition and intelligent. Video surveillance systems can be applied to many Fields, such as intelligent transportation, smart parks, safe cities, etc. With the development of video surveillance, monitoring technology based on IP and network has become the mainstream of video surveillance system. [0003] Such as figure 1 As shown in the figure, it is a schematic diagram of the network of the video surveillance system. For the message sent by the front-end equipment (such as network camera, analog camera, encoder, etc.) to the ma...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04N7/18
CPCH04L63/1433H04L63/20H04N7/18
Inventor 周迪余剑声
Owner ZHEJIANG UNIVIEW TECH CO LTD