Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication server, system and method, and to-be-authenticated terminal

An authentication server and technology to be authenticated, applied in the computer field, can solve problems such as cloud management system platform loss, static password interception or cracking, and destruction of cloud management system resources

Inactive Publication Date: 2017-02-22
ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, the identity authentication method of the cloud management system mainly uses static passwords, that is, identity authentication is performed through user accounts and fixed passwords. The security of this identity authentication method mainly depends on static passwords. The password can be used to log in, access and operate the cloud management system, and the static password is easily intercepted or cracked by illegal users such as hackers when it is transmitted to the cloud management system through the network, so that illegal users can log in to the cloud through the intercepted or cracked static password. Management system, obtain various data stored in the cloud management system or destroy the resources of the cloud management system, causing unpredictable losses to the cloud management system platform
Therefore, the identity authentication security of the existing cloud management system is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication server, system and method, and to-be-authenticated terminal
  • Authentication server, system and method, and to-be-authenticated terminal
  • Authentication server, system and method, and to-be-authenticated terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0064] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work belong to the protection of the present invention. scope.

[0065] like figure 1 As shown, the embodiment of the present invention provides an authentication server, which may include: a dynamic password unit 101 and an authentication unit 102, wherein,

[0066] The dynamic password unit 101 is configured to receive a dynamic password calling instruction sent by a terminal to be authenticated, generate a first ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides an authentication server, system and method, and a to-be-authenticated terminal. The authentication server comprises a dynamic password unit and an authentication unit. The dynamic password unit is used for receiving a dynamic password invoking instruction sent from the to-be-authenticated terminal, generating a first dynamic password corresponding to a target user, and sending the first dynamic password to the authentication unit. The authentication unit is used for storing attribute information of at least one user, receiving login request information of the target users and a second dynamic password that are sent from the to-be-authenticated terminal, receiving the first dynamic password, generating an authentication success instruction when it is determined that the first dynamic password and the second dynamic password are matched and each piece of login request information and the attribute information of the corresponding target user are matched, and sending the authentication success instruction to the to-be-authenticated terminal, so as to enable the to-be-authenticated terminal to allow the target user to login. The authentication server provided in the present invention can improve the identity authentication security of the to-be-authenticated terminal.

Description

technical field [0001] The present invention relates to the field of computer technology, and in particular, to an authentication server, system and method, and a terminal to be authenticated. Background technique [0002] With the continuous development of cloud computing technology, cloud management systems emerge as the times require, and cloud management systems are widely used in various industries. In order to restrict illegal users from accessing resources in cloud management systems, identity authentication technology is widely used in cloud management systems. , as the first line of defense to protect the security of cloud management systems. [0003] At present, the identity authentication method of the cloud management system mainly uses static passwords, that is, identity authentication through user accounts and fixed passwords. The security of this identity authentication method mainly relies on static passwords. Anyone who has an account number and fixed passwo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0815H04L63/0807H04L63/083
Inventor 王永坤
Owner ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products