Unlock instant, AI-driven research and patent intelligence for your innovation.

Security authentication method, client side, server side and system

A security authentication and client-side technology, applied in the field of computer network security, can solve problems such as information theft or tampering, server insecurity, etc., and achieve the effect of improving security and avoiding theft

Inactive Publication Date: 2017-11-24
INSPUR SOFTWARE CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, most network information is transmitted in clear text, and network information is easily obtained by a third party during transmission, that is to say, a third party can access the server based on illegally obtained network information, resulting in a large was stolen or altered, resulting in insecurity on the server side

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security authentication method, client side, server side and system
  • Security authentication method, client side, server side and system
  • Security authentication method, client side, server side and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work belong to the protection of the present invention. scope.

[0053] Such as figure 1 As shown, the embodiment of the present invention provides a security authentication method applied to the client, including:

[0054] Step 101: Encrypting the username to generate username ciphertext;

[0055] Step 102: concatenate the user name and the corresponding password to generate a concatenated value;

[0056] Step 10...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a security authentication method applied to a client side. The security authentication method comprises the following steps: carrying out encryption processing on a user name to generate a user name ciphertext; serially connecting the user name with a corresponding password to generate a serial connecting value; carrying out serial connection encryption processing on the serial connecting value to generate a password file; transmitting the user name ciphertext and the password file to an external server side so that the external server side judges whether access is permitted or not according to the user name ciphertext and the password file; and when access of the external server side is permitted, visiting the external server side. By the scheme, the safety of network information transmission can be improved.

Description

technical field [0001] The invention relates to the field of computer network security, in particular to a security authentication method, client, server and system. Background technique [0002] With the development of information science and technology, the Internet has played an increasingly important role in information transmission and resource sharing, and ensuring network information security has gradually become the focus of computer science workers. [0003] At present, most network information is transmitted in clear text, and network information is easily obtained by a third party during transmission, that is to say, a third party can access the server based on illegally obtained network information, resulting in a large It has been stolen or tampered with, which has caused the insecurity of the server. Contents of the invention [0004] The embodiment of the present invention provides a security authentication method, a client terminal, a server terminal and a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3226H04L63/0428H04L63/083
Inventor 伊同超
Owner INSPUR SOFTWARE CO LTD