Unlock instant, AI-driven research and patent intelligence for your innovation.

Data processing method, device, access control device, authentication server and system

A technology of access control device and authentication server, applied in the field of network security

Active Publication Date: 2021-11-16
MAIPU COMM TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the current construction project of the wireless WiFi system, only attention is paid to whether the wireless service is stable and available. The service center that provides authentication services, content services, etc. is completely open to wireless access terminals, and the corresponding services can be accessed at will. Hidden danger of attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data processing method, device, access control device, authentication server and system
  • Data processing method, device, access control device, authentication server and system
  • Data processing method, device, access control device, authentication server and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. The components of the embodiments of the invention generally described and illustrated in the figures herein may be arranged and designed in a variety of different configurations.

[0030] Accordingly, the following detailed description of the embodiments of the invention provided in the accompanying drawings is not intended to limit the scope of the claimed invention, but merely represents selected embodiments of the invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art wi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a data processing method, device, access control equipment, authentication server and system. The method is applied to an access control device, and the method includes: intercepting an HTTP request from an unauthenticated terminal; obtaining characteristic parameters related to the HTTP request; adding a timestamp to the characteristic parameter to obtain the processed characteristic parameter, and using the The key shared by the authentication server encrypts the processed characteristic parameters to obtain encrypted ciphertext parameters; the ciphertext parameters and the address of the authentication server are encapsulated into a jump message and returned to the terminal. Obtain the characteristic parameters in the HTTP request by intercepting the HTTP request of the unauthenticated terminal and encrypt the characteristic parameter with the time stamp to obtain the encrypted ciphertext parameter, so that the authentication server can obtain the characteristic parameter through decryption and control the terminal's request , so as to prevent malicious attacks on the terminal, and make each request of the terminal traceable, identifiable, and controllable.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to a data processing method, device, access control equipment, authentication server and system. Background technique [0002] As the requirements for network security are getting higher and higher, for some network attacks, the corresponding network service providers need to have a certain ability to prevent attacks. However, in the current construction project of the wireless WiFi system, only attention is paid to whether the wireless service is stable and available. The service center that provides authentication services, content services, etc. is completely open to wireless access terminals, and the corresponding services can be accessed at will. risk of attack. For example: For the authentication service interface, a hacker can brute force crack the user name and password by simulating the authentication message. For the short message service interface, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/32
CPCH04L9/3297H04L63/0435H04L63/0815H04L63/0823H04L63/0876H04L63/10H04L63/1466H04L67/02
Inventor 刘刚国
Owner MAIPU COMM TECH CO LTD