Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication method and system, server, client and storage medium

A server-side and client-side technology, applied in the field of data security, can solve problems such as user data leakage, and achieve the effect of realizing security and solving security problems

Pending Publication Date: 2021-10-22
中移动信息技术有限公司 +1
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present invention provides an authentication method, system, server, client and storage medium, which solves the security problems and user data leakage problems existing in the existing 4A management platform login mode, and can realize secure login 4A management platform

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and system, server, client and storage medium
  • Authentication method and system, server, client and storage medium
  • Authentication method and system, server, client and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0073] The characteristics and exemplary embodiments of various aspects of the present invention will be described in detail below. In order to make the purpose, technical solutions and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only configured to explain the present invention, not to limit the present invention. It will be apparent to one skilled in the art that the present invention may be practiced without some of these specific details. The following description of the embodiments is only to provide a better understanding of the present invention by showing examples of the present invention.

[0074] It should be noted that in this article, relational terms such as first and second are only used to distinguish one entity or operation from another entity or operation, and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses an authentication method and system, a server, a client and a storage medium. The method comprises the following steps: generating a token according to a received first request, wherein the first request is a request which is sent by a client and is used for authenticating account information; sending the token to the client, so that the client generates a subscriber identity module (SIM) signature according to the token and a quick response identifier (QRID); receiving a second request sent by the client, wherein the second request comprises the token, the QRID and the SIM signature; and authenticating the QRID, the token and the SIM signature, so that the client accesses the server when the QRID, the token and the SIM signature pass the authentication. According to the authentication method and system, the server, the client and the storage medium provided by the embodiment of the invention, the login equipment can safely log in the 4A management platform.

Description

technical field [0001] The invention relates to the field of data security, in particular to an authentication method, system, server, client and storage medium. Background technique [0002] At present, accounting (Account), authorization (Authentication), authentication (Authorization), and audit (Audit) are referred to as 4A. The management platform is the security service barrier of the current production system. The importance of security is self-evident. The existing 4A management platform The login methods are mainly account password login, SMS verification code login, or QR code scanning login based on this. [0003] However, in the daily use process, the account password login method often has the problem of password leakage and password theft, and the SMS verification code login will also have the risk of SMS being intercepted by sniffing, fraudulent use by others, and illegal login operations. The QR code scanning login method of SMS verification code also has th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/34G06F21/62G06F21/64
CPCG06F21/34G06F21/64G06F21/6245
Inventor 王阳谢军田峰何欣韩志峰曲大林张德春卞淑王鸿元
Owner 中移动信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products