Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An authentication method, server, and access control device

An access control and server technology, applied in the field of information security, can solve problems such as reducing the security of inherent private key transmission and leakage of inherent private key

Active Publication Date: 2021-05-28
TENCENT TECH (SHENZHEN) CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the existing technical solutions, the cloud service management platform needs to generate a signature for the access request, and send the signature and the access request to the server so that the server can verify the signature. However, the signature in the cloud service management platform is generated by encrypting the access request based on the user's inherent private key. Since the user's inherent private key is saved by the server, when the cloud service management platform needs to generate a signature, it will Obtain the user's inherent private key directly from the server, so that in the process of transmitting the inherent private key, it is easy to cause the risk of the inherent private key being leaked, reducing the security of the user's inherent private key transmission

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An authentication method, server, and access control device
  • An authentication method, server, and access control device
  • An authentication method, server, and access control device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0038] It should be noted that the terms used in the embodiments of the present invention are only for the purpose of describing specific embodiments, and are not intended to limit the present invention. As used in the embodiments of the present invention and the appended claims, the singular forms "a", "said" and "the" are also intended to include the plural forms unless the context clearly indicates otherwise. It should also be understood that the term "and / ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An embodiment of the present invention provides an authentication method, a server, and an access control device. The method includes the following steps: the server receives a resource access request and a first signature sent by the access control device, and the first signature is a temporary password stored by the access control device. generated by encrypting the resource access request with the key; the server obtains the stored temporary key assigned to the access control device, and uses the temporary key to encrypt the resource access request to generate the first verification data; if the first signature and the first verification data If the matching is consistent, the server authenticates the resource access request; if the authentication result of the resource access request is that the authentication is passed, the server processes the resource access request. With this application, by using the temporary key to generate a signature for authentication, the risk of the inherent private key being leaked can be avoided, and the security of the inherent private key is guaranteed.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to an authentication method, a server, and an access control device. Background technique [0002] With the increasing popularity and massive application of cloud computing technology, the advantages of cloud computing in terms of high availability of services and scalability of processing capabilities are increasingly recognized by the industry. Among them, in the cloud service authentication system, users can access cloud resources through the cloud service management platform, but not every user is qualified to access cloud resources, so it is necessary to authenticate the access user to determine whether the user has access permission. [0003] In the existing technical solutions, the cloud service management platform needs to generate a signature for the access request, and send the signature and the access request to the server so that the server can verify the s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3247H04L63/062H04L63/08H04L63/10
Inventor 袁哲
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products