Terminal legality verifying method and device

A legality and terminal technology, applied in the field of network security, can solve problems such as ineffectiveness in solving malicious users, poor verification effect, and key leakage, so as to avoid malicious access to servers by illegal users, improve security, and avoid malicious access to servers Effect

Inactive Publication Date: 2017-05-10
MIDEA SMART TECH CO LTD +1
View PDF2 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, there are problems: the set key and password are generally fixed, and as long as they interact, they may be intercepted and cracked, which may easily lead to key leakage; the method of verifying based on user identity or password also has the risk of being stolen , resulting in poor security verification, and cannot effectively solve the problem of malicious users forging legal identities to access the application server to control household appliances

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal legality verifying method and device
  • Terminal legality verifying method and device
  • Terminal legality verifying method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0020] In the description of the present invention, it should be understood that the term "plurality" refers to two or more than two; sex.

[0021] The method and device for checking the validity of a terminal according to the embodiments of the present invention will be described below with reference to the accompanying drawings.

[0022] In order to solve the existing security problems when the terminal accesses the server in the prior art, the present invention proposes a method for verifying the legitimacy of the terminal. hardware...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a terminal legality verifying method and device. The method comprises the following steps of obtaining a signature, a hardware equipment identification and a random number which are burned on specific locations of a terminal in advance; according to a preset deciphering rule, the signature is decrypted so as to obtain corresponding plaintext information; the hardware equipment identification and the random number are spliced to obtain a splicing character string; the plaintext information is matched with the splicing character string; if the plaintext information is not matched with the splicing character string, it is judged that the terminal is not legal; if the plaintext information is matched with the splicing character string, it is judged that the terminal is legal. By means of the method, the safety of the terminal to access a server is improved, it is ensured that all terminals accessing the server are legal, and the verifying effect of the safety is improved.

Description

technical field [0001] The present invention relates to the technical field of network security, in particular to a method and device for checking terminal legitimacy. Background technique [0002] With the rapid development of the Internet and smart homes, more and more users access the server through the terminal to achieve various functions. purpose of household appliances. When accessing the server of the application program through the terminal to control the household appliances, it is necessary to check the legitimacy of the terminal through the verification server. However, during the process of verifying the terminal, the verification server may be maliciously accessed by illegal users, causing legitimate users to be unable to normally access the application server to control household appliances, and even lead to leakage of private information of legitimate users. [0003] In related technologies, the authentication server usually uses the following methods to ve...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/44
CPCG06F21/44
Inventor 刘复鑫
Owner MIDEA SMART TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products