Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication method, server, terminal equipment and storage medium

A technology for server storage and terminal equipment, which is applied in the field of network security, can solve the problem of low security of interaction between terminal equipment and servers, and achieve the effect of improving message interaction security and improving security

Pending Publication Date: 2022-03-22
ZTE CORP
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing authentication basically uses different algorithms to encrypt and decrypt the fixed information on the terminal device, which can easily cause the fixed information on the terminal device to be forged after the encryption algorithm is cracked, and the authentication information is calculated and then Attacks, resulting in low security for terminal devices to interact with servers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method, server, terminal equipment and storage medium
  • Authentication method, server, terminal equipment and storage medium
  • Authentication method, server, terminal equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0022] The flow charts shown in the drawings are just illustrations, and do not necessarily include all contents and operations / steps, nor must they be performed in the order described. For example, some operations / steps can be decomposed, combined or partly combined, so the actual order of execution may be changed according to the actual situation.

[0023] It should be understood that the terminology used in the description of the present invent...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides an authentication method, a server, terminal equipment and a storage medium, and belongs to the field of network security. The method comprises: extracting a first authentication password in an access request sent by a terminal device, the first authentication password being generated by the terminal device according to a preset authentication algorithm and an obtained dynamic password; generating a second authentication password of the terminal equipment according to a dynamic password corresponding to the terminal equipment stored in the server and a preset authentication algorithm; and authenticating the terminal equipment according to the first authentication password and the second authentication password. According to the technical scheme of the embodiment of the invention, the security of interaction between the terminal equipment and the server can be improved.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to an authentication method, a server, a terminal device and a storage medium. Background technique [0002] Currently, a terminal device can interact with a server through a mobile network to transmit various information. For protocols such as the OMA protocol, TR069 protocol, and MQTT protocol, when the terminal device interacts with the server, it has its own authentication method. For example, use HTTPS addresses and certificate files to allow terminal devices and servers to trust each other and use encrypted channels, or different protocols use different encryption algorithms to encrypt and decrypt information for authentication. However, the existing authentication basically uses different algorithms to encrypt and decrypt the fixed information on the terminal device, which can easily cause the fixed information on the terminal device to be forged after the encryptio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/40H04W12/06H04W12/041
CPCH04L63/0846
Inventor 张杰
Owner ZTE CORP