Supercharge Your Innovation With Domain-Expert AI Agents!

Authentication method and device of access permission

A technology for access rights and authentication requests, applied in user identity/authority verification, secure communication devices, and key distribution, which can solve problems such as leakage of online account passwords, interception by criminals, and low security.

Active Publication Date: 2018-10-16
北京明朝万达科技股份有限公司
View PDF6 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the authentication request may be intercepted by criminals during the transmission process, which will cause the user's online account and password to be leaked, and then use the online account and password to access the network server under a pseudonym, which is less secure.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and device of access permission
  • Authentication method and device of access permission
  • Authentication method and device of access permission

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0088] In order to make the above objects, features and advantages of the present invention more comprehensible, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0089] see figure 1 , shows a structural block diagram of an embodiment of an authentication system for access rights in the present invention, the system includes a terminal 01 and an authentication server 02, the terminal 01 and the authentication server 02 are connected in communication, and the terminal 01 and the authentication server 02 can be Interaction is performed through the communication connection, and the terminal 01 includes devices such as mobile phones, tablet computers, and desktop computers.

[0090] refer to figure 2 , shows a flow chart of the steps of an embodiment of an access right authentication method in the present invention, the method is applied to figure 1 In the system shown, specifically, the fol...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides an authentication method and device of access permission. In the embodiment of the invention, information carried in an authentication request sent to a serverby a terminal is encrypted identity information obtained by encrypting user identity information of a user and terminal identity information of the terminal by using symmetric keys, therefore, even if the authentication request is intercepted by a lawbreaker in the transmission process and the encrypted identity information is extracted from the authentication request, the encrypted identity information cannot be decrypted to obtain the user identity information of the user and the terminal identity information of the terminal since the lawbreaker cannot obtain the symmetric keys. The condition that the lawbreaker accesses a network server by personating the user identity information of the user and the terminal identity information of the terminal is avoided, and the security is improved.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a method and device for authenticating access rights. Background technique [0002] Currently, more and more users use terminals to access the Internet, for example, use terminals to access a network server located on the Internet. However, before using a terminal to access a network server, it is often necessary to first obtain an access right to the server. [0003] In the prior art, when it is necessary to obtain the access authority to access the server, the user needs to enter the user's online account and online password on the terminal, and then send an authentication request carrying the online account and the online password to the authentication server, and the authentication server Receive the authentication request, extract the online account and the online password from the authentication request, and compare whether the online password is the online p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08H04L9/32
CPCH04L9/0822H04L9/3236H04L63/0435H04L63/0876H04L63/10
Inventor 孙铂王志华喻波王志海秦凯安鹏
Owner 北京明朝万达科技股份有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More