Method for authenticating and binding device, computer storage medium and server

A computer storage and server technology, applied in the field of network security, can solve the problems of inconvenient application, complicated process, and inability to guarantee the legitimacy of equipment safely and effectively, and achieve the effect of simplifying the authentication and binding process and increasing security

Active Publication Date: 2018-09-28
成都市联洲国际技术有限公司
View PDF8 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Most of the authentication and binding methods provided by the prior art ensure the legitimacy of devices accessing the network through an authentication mechanism that binds Internet Protocol (IP) addresses and Media Access Control (MAC) addresses. It is easy for a device to access the network environment of a legitimate device by spoofing the IP address and MAC address of a legitimate device, so that the legitimacy of the device cannot be guaranteed safely and effectively, resulting in low security in the authentication and binding process, and the connection between the device and the server requires After repeated communication verification, the process is complicated and the application is inconvenient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for authenticating and binding device, computer storage medium and server
  • Method for authenticating and binding device, computer storage medium and server
  • Method for authenticating and binding device, computer storage medium and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0036] see figure 1 Shown is a flow chart of a preferred embodiment of a device authentication and binding method provided by the present invention, the method is executed by the server, including steps S11 to S14:

[0037] Step S11, receiving the authentication information of the device to be bound sent by the computing device; the authentication information includes the device identifier of the device to be bound;

[0038] Step S12, judging whether the device to...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for authenticating and binding a device, a computer storage medium and a server. The method is executed by a server and comprises the following steps: receiving authentication information of a device to be bound sent by a computing device; the authentication information comprises a device identifier of the device to be bound; it is judged whether the device to be bound is legal according to the device identifier; when the device to be bound is legal, binding information carrying an account to be bound is sent to the device to be bound, so that the device to bebound is configured to perform the account binding according to the account to be bound and return binding success information after the binding is successful; when the binding success information isreceived, a binding record between the device to be bound and the account to be bound is stored. The technical scheme of the present invention can increase the security of the authenticating and binding process and simplify the authenticating and binding process.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a device authentication and binding method, a computer storage medium, and a server. Background technique [0002] With the rapid development of network technology, there are more and more devices in the network. In order to establish a communication connection between each device in the network and the server, it is necessary to implement authentication and binding between the device and the server. [0003] Most of the authentication and binding methods provided by the prior art ensure the legitimacy of devices accessing the network through an authentication mechanism that binds Internet Protocol (IP) addresses and Media Access Control (MAC) addresses. It is easy for a device to access the network environment of a legitimate device by spoofing the IP address and MAC address of a legitimate device, so that the legitimacy of the device cannot be guaranteed safely and eff...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/0876
Inventor 曾东彪
Owner 成都市联洲国际技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products