Method, apparatus and system for accessing server to terminal by authentication, server and computer readable storage medium

A technology for accessing terminals and servers, applied in the field of communications, can solve the problems of data leakage, easy to read and modify, low reliability, etc., and achieve the effect of avoiding access, high reliability, and avoiding data leakage

Active Publication Date: 2017-12-15
SHENZHEN UCLOUDLINK NETWORK TECH CO LTD
View PDF15 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present invention provides a method for a server to authenticate an access terminal, aiming to solve the problems of low reliability, easy to be read and modified, and risk of data leakage in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, apparatus and system for accessing server to terminal by authentication, server and computer readable storage medium
  • Method, apparatus and system for accessing server to terminal by authentication, server and computer readable storage medium
  • Method, apparatus and system for accessing server to terminal by authentication, server and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0043] figure 2 It shows the implementation flow of a method for authenticating an access terminal provided by a server in Embodiment 1 of the present invention, which is applied to a server, and is described in detail as follows:

[0044] In step S110, a connection request sent by the terminal is received, and the connection request carries terminal operation information.

[0045] In the embodiment of the present invention, the terminal running information includes terminal running information including one or any combination of process information, code segment hash, stack feature information, or application signature information.

[0046]In the embodiment of the present invention, the process information includes but not limited to the creator, authority, debugging information, open file and socket list, process ID, parent process ID, assigned user ID, group ID, user group list, owned Capability, permission (capability), the list of Android permissions applied by the APP....

Embodiment 2

[0060] image 3 It shows the implementation process of a method for authenticating an access terminal provided by a server in Embodiment 2 of the present invention, which is similar to Embodiment 1, except that the Dangdang terminal operation information is the same as the pre-stored terminal When the running information matches the same, send the detection result information to the terminal, and establish communication with the terminal, including:

[0061] In step S210, when the terminal operation information matches the pre-stored terminal operation information, an authentication instruction is obtained, and corresponding expected output information is generated according to the authentication instruction.

[0062] In the embodiment of the present invention, after the terminal operation information sent by the terminal is successfully matched with the pre-stored terminal operation information, the authentication instruction is obtained, and the corresponding expected output...

Embodiment 3

[0070] Figure 4 It shows the implementation process of a method for authenticating an access terminal provided by a server in Embodiment 3 of the present invention, which is similar to Embodiment 1, except that the connection request sent by the terminal is received, and the connection request carries terminal operation information , which previously also included:

[0071] In step S310, a session request sent by the terminal is received.

[0072] In step S320, a random number is generated and sent to the terminal, so that the terminal generates a corresponding negotiation key according to the random number.

[0073] In the embodiment of the present invention, when the server receives the session request sent by the terminal, the server triggers the server to generate a corresponding random number according to the random number generation algorithm, and sends it to the terminal to generate the negotiation key, wherein the random number generation algorithm It can include mu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention is applied to the field of communications, and provides a method, an apparatus and a system for accessing a server to a terminal by authentication, the server and a computer readable storage medium. The method comprises the steps of receiving a connection request sent by the terminal, wherein the connection request carries terminal operation information; obtaining pre-stored terminal operation information, and performing matching on the terminal operation information and the pre-stored terminal operation information according to a preset matching strategy; and when the terminal operation information and the pre-stored terminal operation information are matched consistently, sending authentication successful information to the terminal, and establishing communication with the terminal. In the embodiment of the invention, since the terminal operation information is not read and modified easily, by detecting the terminal operation information, the access of a host program in which legal communication data are counterfeited can be effectively avoided, being very secure and reliable; and the terminal operation information is detected by the preset matching strategy, so the legality of the terminal can be detected in multiple aspects; the method, the apparatus and the system for accessing the server to the terminal by the authentication, the server and the computer readable storage medium provided by the invention have pertinence, the reliability is higher, and the risk of data leakage can be avoided

Description

technical field [0001] The invention belongs to the technical field of communication, and in particular relates to a method, device, system, server and computer-readable storage medium for authenticating an access terminal by a server. Background technique [0002] With the development of science and technology, more and more terminals need to connect to remote servers through the Internet to provide services to users, including M2M and other equipment for the Internet of Things. However, after the data source passes through the network, there will be various forged Possibility, the connected terminal may be a legitimate terminal, or it may just be a host program that forges legal communication data. Therefore, in order to ensure that the access terminal is a legitimate terminal, the remote server often needs to authenticate the terminal requesting access before further processing. provide services to it. [0003] At present, when authenticating a terminal, the following me...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/0876H04W12/06H04W12/03H04W12/71H04L9/0838H04L9/0869H04L9/3247
Inventor 曾祥舜陈景冰
Owner SHENZHEN UCLOUDLINK NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products