Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security authentication system and method

A security authentication and security technology, applied in the field of security authentication systems, can solve problems such as inability to authenticate terminals, inability to timely and accurate terminals, and single-point failures, and achieve the effect of improving timeliness and accuracy and reducing the risk of single-point failures

Pending Publication Date: 2022-07-05
NSFOCUS INFORMATION TECHNOLOGY CO LTD +2
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, the existing method requires the terminal to upload its local environment information to the environment awareness server through the network, and the environment awareness server performs security authentication on the terminal based on the environment information. On the one hand, there is a single point of failure risk, for example, when the environment awareness

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security authentication system and method
  • Security authentication system and method
  • Security authentication system and method

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0066] Example 1:

[0067] figure 1 A schematic diagram of a security authentication system provided by some embodiments is shown, and the system includes: a terminal 11, an authentication server 12, and a plurality of other terminals 13 located in the same peer-to-peer network P2P network as the terminal 11;

[0068] The terminal 11 is configured to send a first authentication request to the target other terminal 13 in the P2P network when receiving an access request to any application installed in itself, wherein the first authentication request is carrying the identification information of the terminal 11;

[0069] The target other terminal 13 is used to search for the target environment information corresponding to the terminal 11 of the identification information in the saved environment information according to the identification information; according to whether the target environment information contains the set risk environment information , determine the security s...

Example Embodiment

[0144] Example 2:

[0145] Based on the same technical concept, the present application provides a security authentication method, the method is applied to a terminal (for convenience of description, referred to as the first terminal), Figure 7 A schematic diagram of the sixth security authentication process provided by some embodiments is shown, such as Figure 7 As shown, the process includes:

[0146] S701: When receiving an access request for any application installed in the terminal itself, send a first authentication request to a target other terminal among multiple other terminals located in the same peer-to-peer P2P network as the terminal, wherein , the first authentication request carries the identification information of the terminal.

[0147] S702: Receive a security score value sent by the target other terminal; wherein, the security score value is the target other terminal, according to the identification information, searches the saved environment information...

Example Embodiment

[0159] Example 3:

[0160] Based on the same technical concept, the present application provides a security authentication method, and the method is applied to a terminal (for convenience of description, referred to as a second terminal), Figure 8 A schematic diagram of the seventh security authentication process provided by some embodiments is shown, such as Figure 8 As shown, the process includes:

[0161] S801: Receive a first authentication request, wherein the first authentication request is that a first terminal located in the same peer-to-peer P2P network as the second terminal receives an authentication request for any application installed in the first terminal itself Sent when an access request is made, the first authentication request carries the identification information of the first terminal.

[0162] S802: According to the identification information, search the saved environment information for the target environment information corresponding to the terminal...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security authentication system, method, device and equipment, and a medium, which are used for improving the timeliness and accuracy of security authentication on a terminal. According to the invention, the security score value of the terminal can be determined based on the environmental information of the terminal stored in any other terminal (target other terminal) located in the same P2P network as the terminal, and then security authentication is carried out on the environmental information of the terminal based on the security score value. Compared with the prior art that the terminal needs to send the environmental information of the terminal to the environmental perception server across networks and performs security authentication on the environmental information of the terminal on the basis of one environmental perception server, on one hand, the security score value of the terminal can be determined on the basis of any other terminal, so that the risk of a single point of failure can be reduced; and on the other hand, the stability and the real-time performance based on P2P network communication are better than those of cross-network communication, so that the timeliness and the accuracy of performing security authentication on the terminal can be improved.

Description

technical field [0001] The present application relates to the technical field of network security, and in particular, to a security authentication system, method, apparatus, device and medium. Background technique [0002] "Zero Trust" is a new network security model proposed by Forrester's chief analyst in 2010. It breaks the default "trust", adheres to the principle of "continuous verification, never trust", and establishes a set of identity-based As the center, it takes continuous authentication, dynamic access control, authorization, auditing and monitoring as the method, minimizes real-time authorization as the core, and uses multi-dimensional trust algorithm as the basis to authenticate the dynamic security architecture at the end. Among them, environmental awareness and identity authentication are the core of the entire security architecture. [0003] Since the development time of "zero trust" is not very long, it is inevitable that there are shortcomings. For examp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/40H04L67/104
CPCH04L63/08H04L67/104
Inventor 杨旭吕文俊杜强薛霁李梁
Owner NSFOCUS INFORMATION TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products