Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication method and system

An authentication method and authentication result technology, which is applied in the field of information processing, can solve the problems of enterprise users being unable to use, malicious attacks, attacks, etc., and achieve the effect of improving connection security and stability

Inactive Publication Date: 2020-05-19
LENOVO (BEIJING) LTD
View PDF8 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this verification method still has the risk of being attacked by middleware, such as routers, corporate firewalls, and local hijacking software.
If the certificate is maliciously hijacked, and the client does not check whether the certificate has been tampered with, it will bring the threat of being maliciously attacked
On the other hand, if the certificate is hijacked without risk, such as a corporate firewall, and the client verifies whether the certificate is trusted by obtaining the certificate information carried by the HTTPS (Hyper Text Transfer Protocol over Secure Socket Layer) connection , the client software will think that the network is not safe, so that enterprise users cannot use the client software
In short, when the client initiates access to the server, the security and stability of the access connection is low, which affects the user experience.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and system
  • Authentication method and system
  • Authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] In order to make the purpose, features, and advantages of the application more obvious and understandable, the technical solutions in the embodiments of the application will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the application. Obviously, the described The embodiments are only some of the embodiments of the present application, but not all of them. Based on the embodiments in this application, all other embodiments obtained by those skilled in the art without making creative efforts belong to the scope of protection of this application.

[0032] In the description of this specification, descriptions referring to the terms "one embodiment", "some embodiments", "example", "specific examples", or "some examples" mean that specific features described in connection with the embodiment or example , structure, material or characteristic is included in at least one embodiment or example of the present appl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses an authentication method and system, and the method comprises the steps that a client application transmits first information to a target server, wherein thefirst information at least comprises first data obtained through the processing of an obtained first random number and / or a first graphic code; the client application receives a processing result forthe first information returned by the target server; under the condition that the processing result meets a first condition, the client application at least outputs a first authentication result, wherein the mode of processing the first random number and / or the first graphic code by the client application is at least related to the attribute of the target server, and the first authentication result represents that the target server obtains a trust certificate. According to the authentication method and system provided by the embodiment of the invention, identity authentication is carried out by sending the encrypted random number and / or graphic code to the server, so that the problem that the enterprise client cannot be normally used after the certificate is modified by software is avoided, and the connection security and stability of the client and the server are improved.

Description

technical field [0001] The present application relates to the technical field of information processing, in particular to an authentication method and system. Background technique [0002] At present, many client software needs to access online resources to provide functions. Before accessing online resources, it is necessary to confirm that the server being accessed is the server the client wants to access, that is, identity verification must be done before accessing to ensure access security and stability. [0003] Related technologies generally implement identity confirmation by means of verifying certificates, that is, to determine whether the preview file of the server certificate is in the trust list of the client. However, this verification method still has the risk of being attacked by middleware, such as routers, corporate firewalls, and local hijacking software. If the certificate is maliciously hijacked, and the client does not check whether the certificate has ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0861H04L9/0869H04L63/0442H04L63/08H04L63/12
Inventor 刘力强李小冬吴伟洪
Owner LENOVO (BEIJING) LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products