CN114157491B - Authentication method and device in heterogeneous network, electronic equipment and computer storage medium - Google Patents
Authentication method and device in heterogeneous network, electronic equipment and computer storage medium Download PDFInfo
- Publication number
- CN114157491B CN114157491B CN202111476642.5A CN202111476642A CN114157491B CN 114157491 B CN114157491 B CN 114157491B CN 202111476642 A CN202111476642 A CN 202111476642A CN 114157491 B CN114157491 B CN 114157491B
- Authority
- CN
- China
- Prior art keywords
- registration request
- authentication
- registration
- requests
- message stream
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 46
- 238000012545 processing Methods 0.000 claims abstract description 14
- 238000012544 monitoring process Methods 0.000 claims description 23
- 230000008569 process Effects 0.000 claims description 14
- 238000004364 calculation method Methods 0.000 abstract description 5
- 230000004807 localization Effects 0.000 description 10
- 238000004891 communication Methods 0.000 description 8
- 238000010586 diagram Methods 0.000 description 6
- 238000011161 development Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000010295 mobile communication Methods 0.000 description 2
- 238000013461 design Methods 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The application discloses an authentication method, an authentication device and related products in a heterogeneous network, wherein the authentication method in the heterogeneous network monitors a registration request of a user and performs localized caching processing on the monitored registration request so as to be added into a first message flow; sequentially carrying out identity authentication on the registration requests in the first message stream to be authenticated according to the sequence; adding the registration request passing the identity authentication into a second message stream to perform certificate authentication; if the registration request passes the authentication of the certificate authentication, the registration request is judged to be legal, and the registration request is judged to be legal, so that the complexity of the authentication is reduced, the calculation amount of the authentication is saved, and the like.
Description
Technical Field
The present application relates to the field of heterogeneous technologies, and in particular, to an authentication method, an apparatus, an electronic device, and a computer storage medium in a heterogeneous network.
Background
Along with the continuous development of the technology in the cloud computing field, various cloud platform products are also continuously enriched, and different cloud service manufacturers are in private clouds and public clouds, so that the community cloud field is provided with own basic community cloud platform products. With more and more choices, more and more cloud computing users deploy own services to different cloud platforms, and the development trend of hybrid cloud and multi-cloud deployment is presented.
The hybrid cloud and the multi-cloud deployment require identity authentication when the domains are accessed mutually, but in the multi-cloud deployment, each cloud has a personalized authentication mechanism, so that the complexity of authentication is higher when the multi-cloud is accessed, the calculation amount for realizing authentication is very large, and the security risk is higher.
Disclosure of Invention
Based on the above problems, the embodiments of the present application provide an authentication method, an apparatus, an electronic device, and a computer storage medium in a heterogeneous network.
The embodiment of the application discloses the following technical scheme:
an authentication method in a heterogeneous network, comprising:
Monitoring a registration request of a user, and carrying out localized caching processing on the monitored registration request so as to be added into a first message stream;
Sequentially carrying out identity authentication on the registration requests in the first message stream to be authenticated according to the sequence;
adding the registration request passing the identity authentication into a second message stream to perform certificate authentication;
and if the registration request passes the authentication of the certificate authentication, judging that the registration request is legal.
Optionally, the monitoring the registration request of the user includes: and monitoring the registration request in the target polling area in a set polling time range through the set timing polling interface.
Optionally, the monitoring the registration request of the user includes: and counting the registration requests from the target polling areas, and distributing polling priority to each target polling area according to the counting result so as to adjust the size of a polling time range, wherein the polling priority is inversely related to the polling time range.
Optionally, before the step of sequentially performing identity authentication on the registration requests in the first message flow to be authenticated in sequence, the method includes: parallelizing encryption is carried out on the registration request in the first message stream to be authenticated by using a first public key system parameter to obtain the registration request in a ciphertext form;
The step of sequentially carrying out identity authentication on the registration requests in the first message flow to be authenticated according to the sequence comprises the following steps: decrypting the registration request in ciphertext form using the first private key system parameter to authenticate the identity.
An authentication device in a heterogeneous network, comprising:
the request monitoring unit is used for monitoring the registration request of the user and carrying out localized caching on the monitored registration request so as to be added into the first message flow;
the first authentication unit is used for sequentially carrying out identity authentication on the registration requests in the first message stream to be authenticated according to the sequence;
a message adding unit for adding the registration request passing the identity authentication to a second message stream to perform certificate authentication;
A second authentication unit for
And the validity judging unit is used for judging that the registration request is legal if the registration request passes the authentication of the certificate authentication.
Optionally, the request monitoring unit is specifically configured to: and monitoring the registration request in the target polling area in a set polling time range through the set timing polling interface.
Optionally, the request monitoring unit is specifically configured to: and counting the registration requests from the target polling areas, and distributing polling priority to each target polling area according to the counting result so as to adjust the size of a polling time range, wherein the polling priority is inversely related to the polling time range.
Optionally, the apparatus further comprises: the encryption unit is used for carrying out parallelization encryption on the registration requests in the first message stream to be authenticated by using a first public key system parameter before carrying out identity authentication on the registration requests in the first message stream to be authenticated according to the sequence in sequence to obtain the registration requests in a ciphertext form;
the first authentication unit is specifically configured to: decrypting the registration request in ciphertext form using the first private key system parameter to authenticate the identity.
An electronic device, comprising: a memory, and a processor, where the memory stores a computer executable program, and the processor is configured to execute the computer executable program to implement a method according to any one of the embodiments of the present application.
A computer storage medium having a computer executable program stored thereon, which when executed performs a method according to any of the embodiments of the present application.
In the embodiment of the application, the registration request of the user is monitored, and the monitored registration request is subjected to localized caching so as to be added into the first message flow; sequentially carrying out identity authentication on the registration requests in the first message stream to be authenticated according to the sequence; adding the registration request passing the identity authentication into a second message stream to perform certificate authentication; if the registration request passes the authentication of the certificate authentication, the registration request is judged to be legal, the complexity of the authentication is reduced, the calculation amount of the authentication is saved, and the security is improved.
Drawings
In order to more clearly illustrate the embodiments of the application or the technical solutions of the prior art, the drawings which are used in the description of the embodiments or the prior art will be briefly described, it being obvious that the drawings in the description below are only some embodiments of the application, and that other drawings can be obtained according to these drawings without inventive faculty for a person skilled in the art.
Fig. 1 is a flow chart of an authentication method in a heterogeneous network according to an embodiment of the present application;
Fig. 2 is a schematic structural diagram of an authentication device in a heterogeneous network according to an embodiment of the present application;
FIG. 3 is a schematic diagram of an electronic device according to an embodiment of the present application;
Fig. 4 is a schematic diagram of a hardware structure of an electronic device according to an embodiment of the application.
Detailed Description
It is not necessary for any of the embodiments of the application to be practiced with all of the advantages described above.
In order to make the present invention better understood by those skilled in the art, the following description will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings, and it is apparent that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
In the embodiment of the application, the registration request of the user is monitored, and the monitored registration request is subjected to localized caching so as to be added into the first message flow; sequentially carrying out identity authentication on the registration requests in the first message stream to be authenticated according to the sequence; adding the registration request passing the identity authentication into a second message stream to perform certificate authentication; if the registration request passes the authentication of the certificate authentication, the registration request is judged to be legal, the complexity of the authentication is reduced, the calculation amount of the authentication is saved, and the security is improved.
In the following embodiments of the present application, the execution subject of the method may be an authentication server, which serves as an intermediate dispatch platform.
Fig. 1 is a flow chart of an authentication method in a heterogeneous network according to an embodiment of the present application; as shown in fig. 1, it includes:
S101, monitoring a registration request of a user, and carrying out localized caching on the monitored registration request so as to be added into a first message flow;
Optionally, the monitoring the registration request of the user includes: and monitoring the registration request in the target polling area in a set polling time range through the set timing polling interface, so that the resources of an authentication server are saved, and the data processing efficiency is improved.
Optionally, the monitoring the registration request of the user includes: and counting the registration requests from each target polling area, and distributing polling priority to each target polling area according to a counting result to adjust the size of a polling time range, wherein the polling priority is in inverse proportion to the polling time range, which is equivalent to personalized processing of the registration requests, and flexibly adjusts the polling time and the target polling area, thereby improving the generalization performance of polling. For example, if the total number of registration requests is small, or if the initiation frequency is small (particularly, if the threshold is set to determine that the number is small), the polling priority of the target polling area may be adjusted down, and conversely, the polling priority may be adjusted up.
In this embodiment, the target polling area may be one data field, or may be a set of multiple data fields.
Optionally, before the locally caching the monitored registration request for adding to the first message stream, the method includes: creating a registration request list to add the monitored registration request to the registration request list in real time.
In this embodiment, a registration request list is created, so that the monitored registration request is managed in real time, and the efficiency of data processing is improved.
Specifically, in this embodiment, in the registration request list, the registration requests may be managed based on the ID of the data domain, and all the registration requests from the same data domain are sequentially listed in the registration request list according to the sequence of the time stamps.
Specifically, in this embodiment, a plurality of pages may be created in the registration request list, each page corresponding to one data field, so that all registration requests of the same data field are stored in the same page.
Alternatively, in other embodiments, the monitored registration requests may be managed in the form of key-value pairs, for example, an ID of a data field in which the registration request is generated is used as a key, and all the registration requests generated in the data field are used as a value. By means of the key value pair, management of the registration request can be achieved rapidly, storage resources are saved, the registration request is directly obtained from the key value pair when the registration request is to be used later, and data processing efficiency is improved.
In this embodiment, the performing a localized caching process on the monitored registration request to add the localized caching process to the first message flow includes: and synchronizing the monitored registration request to a localization cache queue in real time, and distributing a first packet identification in the localization cache array according to the polling priority so as to be added into a first message flow.
In this embodiment, the security of the registration request is actually ensured through the localization cache queue, and the original registration request is stored in the registration request list, even if the registration request in the localization cache queue is tampered, the registration request in the registration request list is not tampered, so that the localization cache queue can be synchronized in real time.
S102, sequentially carrying out identity authentication on the registration requests in the first message stream to be authenticated according to the sequence;
Optionally, before the step of sequentially performing identity authentication on the registration requests in the first message flow to be authenticated in sequence, the method includes: parallelizing encryption is carried out on the registration request in the first message stream to be authenticated by using a first public key system parameter to obtain the registration request in a ciphertext form;
The step of sequentially carrying out identity authentication on the registration requests in the first message flow to be authenticated according to the sequence comprises the following steps: decrypting the registration request in ciphertext form using the first private key system parameter to authenticate the identity.
In this embodiment, the security of the registration request is ensured by the encryption.
In this embodiment, the first public key system parameter and the first private key system parameter are generated by the first authenticator according to a preset hyperbolic algorithm. The identity signature of the registration request is realized by the first public key system parameter, and the identity authentication of the registration request is realized based on the first private key system parameter.
S103, adding the registration request passing the identity authentication into a second message stream to perform certificate authentication;
Optionally, the adding the registration request authenticated by the identity to the second message stream for certificate authentication includes:
And responding to the registration request passing the identity authentication, and distributing a second packet identifier to the registration request passing the identity authentication according to the polling priority so as to be added into a second message stream for certificate authentication.
Optionally, before the certificate authentication, the method includes: parallelizing encryption is carried out on the registration request in the second message flow by using a second public key system parameter to obtain the registration request in a ciphertext form;
the certificate authentication comprises the following steps: decrypting the registration request in ciphertext form using a second private key system parameter to authenticate the certificate.
And S104, if the registration request passes the authentication of the certificate authentication, judging that the registration request is legal.
In this embodiment, the above-mentioned identity authentication is a localized authentication process, and the registration request passing through the localized authentication process also needs to pass through the certificate authentication of the external domain, and only through the certificate authentication process, the corresponding registration request can be determined to be legal. Specifically, the localization authentication process is performed by a localization authentication server, and the certificate authentication of the foreign domain is performed by a foreign domain authentication server.
Further, after determining that the registration request is legal, the registration request may be responded, for example, if the local data of the registration request is to be accessed, a session key is constructed between the registration request and the target address, the data to be accessed is encrypted by using the session key, and the data is returned to the user through a data security channel.
Fig. 2 is a schematic structural diagram of an authentication device in a heterogeneous network according to an embodiment of the present application; as shown in fig. 2, it includes:
a request monitoring unit 201, configured to monitor a registration request of a user, and perform a localized caching process on the monitored registration request, so as to add the localized caching process to a first message stream;
an identity authentication unit 202, configured to sequentially perform identity authentication on the registration requests in the first message stream to be authenticated according to a sequence;
A certificate authentication unit 203, configured to add a registration request passing through the identity authentication to a second message stream, so as to perform certificate authentication;
And a validity judging unit 204 configured to judge that the registration request is valid if the registration request passes the authentication of the certificate authentication.
The first authentication unit 202 is configured to: and monitoring the registration request in the target polling area in a set polling time range through the set timing polling interface.
A first authentication unit 202 for: and counting the registration requests from the target polling areas, and distributing polling priority to each target polling area according to the counting result so as to adjust the size of a polling time range, wherein the polling priority is inversely related to the polling time range.
Optionally, the apparatus further includes a list creation unit configured to create a registration request list before performing a localization caching process on the monitored registration request to add to the first message stream, so as to add the monitored registration request to the registration request list in real time.
Optionally, the request monitoring unit 201 is specifically configured to: and synchronizing the monitored registration request to a localization cache queue in real time, and distributing a first packet identification in the localization cache array according to the polling priority so as to be added into a first message flow.
The device further comprises a first encryption unit, configured to, before sequentially authenticating the identities of the registration requests in the first message stream to be authenticated in sequence, include: and carrying out parallelization encryption on the registration request in the first message flow to be authenticated by using a first public key system parameter to obtain the registration request in a ciphertext form.
Optionally, the identity authentication unit 202 is specifically configured to: decrypting the registration request in ciphertext form using the first private key system parameter to authenticate the identity.
Optionally, the certificate authentication unit 203 is specifically configured to: and responding to the registration request passing the identity authentication, and distributing a second packet identifier to the registration request passing the identity authentication according to the polling priority so as to be added into a second message stream for certificate authentication.
The apparatus further comprises a second encryption unit for, before performing certificate authentication, including: and parallelizing and encrypting the registration request in the second message stream by using a second public key system parameter to obtain the registration request in a ciphertext form.
Optionally, the certificate authentication unit 203 is specifically configured to: decrypting the registration request in ciphertext form using a second private key system parameter to authenticate the certificate.
The embodiment of the application also provides a computer storage medium, and a computer executable program is stored on the computer storage medium, and when the computer executable program is executed, the method of any one of the embodiments of the application is implemented.
FIG. 3 is a schematic diagram of an electronic device according to an embodiment of the present application; as shown in fig. 3, it includes: a memory 301 having stored thereon a computer executable program and a processor 302 for executing the computer executable program to implement the method according to any of the embodiments of the present application.
FIG. 4 is a schematic diagram of a hardware structure of an electronic device according to an embodiment of the present application; as shown in fig. 4, the hardware structure of the electronic device may include: a processor 401, a communication interface 402, a computer readable medium 403 and a communication bus 404;
Wherein the processor 401, the communication interface 402, and the computer readable medium 403 perform communication with each other through the communication bus 404;
alternatively, the communication interface 402 may be an interface of a communication module, such as an interface of a GSM module;
Wherein the processor 401 may in particular be configured to run an executable program stored on a memory, thereby performing all or part of the processing steps of any of the method embodiments described above.
The processor 401 may be a general-purpose processor, including a central processing unit (Central Processing Unit, CPU for short), a network processor (Network Processor, NP for short), and the like; but may also be a Digital Signal Processor (DSP), application Specific Integrated Circuit (ASIC), an off-the-shelf programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic device, discrete hardware components. The disclosed methods, steps, and logic blocks in the embodiments of the present application may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The electronic device of the embodiments of the present application exists in a variety of forms including, but not limited to:
(1) Mobile communication devices, which are characterized by mobile communication functionality and are aimed at providing voice, data communication. Such terminals include smart phones (e.g., iPhone), multimedia phones, functional phones, and low-end phones, among others.
(2) Ultra mobile personal computer equipment, which belongs to the category of personal computers, has the functions of calculation and processing and generally has the characteristic of mobile internet surfing. Such terminals include PDA, MID and UMPC devices, etc., such as iPad.
(3) Portable entertainment devices such devices can display and play multimedia content. Such devices include audio, video players (e.g., iPod), palm game consoles, electronic books, and smart toys and portable car navigation devices.
(4) The server, which is a device for providing computing services, is composed of a processor 710, a hard disk, a memory, a system bus, etc., and is similar to a general computer architecture, but is required to provide highly reliable services, and thus has high requirements in terms of processing power, stability, reliability, security, scalability, manageability, etc.
(5) Other electronic devices with data interaction function.
It should be noted that, according to implementation requirements, each component/step described in the embodiments of the present application may be split into more components/steps, or two or more components/steps or part of operations of the components/steps may be combined into new components/steps, so as to achieve the objects of the embodiments of the present application.
The above-described methods according to embodiments of the present application may be implemented in hardware, firmware, or as software or computer code storable in a recording medium such as a CD ROM, RAM, floppy disk, hard disk, or magneto-optical disk, or as computer code originally stored in a remote recording medium or a non-transitory machine-readable medium and to be stored in a local recording medium downloaded through a network, so that the methods described herein may be stored on such software processes on a recording medium using a general purpose computer, special purpose processor, or programmable or special purpose hardware such as an ASIC or FPGA. It is understood that a computer, processor, microprocessor controller, or programmable hardware includes a memory component (e.g., RAM, ROM, flash memory, etc.) that can store or receive software or computer code that, when accessed and executed by the computer, processor, or hardware, implements the methods of generating the check code described herein. Further, when the general-purpose computer accesses code for implementing the check code generation method shown herein, execution of the code converts the general-purpose computer into a special-purpose computer for executing the check code generation method shown herein.
Those of ordinary skill in the art will appreciate that the elements and method steps of the examples described in connection with the embodiments disclosed herein can be implemented as electronic hardware, or as a combination of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the embodiments of the present application.
The above embodiments are only for illustrating the embodiments of the present application, but not for limiting the embodiments of the present application, and various changes and modifications may be made by one skilled in the relevant art without departing from the spirit and scope of the embodiments of the present application, so that all equivalent technical solutions also fall within the scope of the embodiments of the present application, and the scope of the embodiments of the present application should be defined by the claims.
Claims (8)
1. An authentication method in a heterogeneous network, comprising:
monitoring a registration request of a user, and carrying out localized caching processing on the monitored registration request so as to be added into a first message stream; the method for performing localized caching processing on the monitored registration request before adding the localized caching processing to the first message flow comprises the following steps: creating a registration request list to add the monitored registration request to the registration request list in real time; in a registration request list, managing registration requests based on IDs of data domains, sequentially adding all registration requests from the same data domain into the registration request list according to the sequence of time stamps, creating a plurality of pages in the registration request list, wherein each page corresponds to one data domain, so that all registration requests of the same data domain are stored in the same page;
Sequentially carrying out identity authentication on the registration requests in the first message stream according to the sequence;
adding the registration request passing the identity authentication into a second message stream to perform certificate authentication;
if the registration request passes the authentication of the certificate authentication, judging that the registration request is legal;
The identity authentication is a localized authentication process, the registration request through the localized authentication process also requires authentication through a certificate of the external domain, the localized authentication process is performed by a localized authentication server, and the certificate authentication of the external domain is performed by an external domain authentication server.
2. The method of claim 1, wherein monitoring the registration request of the user comprises: and monitoring the registration request in the target polling area in a set polling time range through the set timing polling interface.
3. The method according to claim 1, wherein before the sequentially authenticating the registration requests in the first message stream, the method comprises: parallelizing encryption is carried out on the registration request in the first message flow by using a first public key system parameter to obtain the registration request in a ciphertext form;
The step of sequentially carrying out identity authentication on the registration requests in the first message flow according to the sequence comprises the following steps: decrypting the registration request in ciphertext form using the first private key system parameter to authenticate the identity.
4. An authentication apparatus in a heterogeneous network, comprising:
the request monitoring unit is used for monitoring the registration request of the user and carrying out localized caching on the monitored registration request so as to be added into the first message flow;
A list creation unit, configured to create a registration request list before performing a localized caching process on a monitored registration request to add the registration request to a first message stream, so as to add the monitored registration request to the registration request list in real time; in a registration request list, managing registration requests based on IDs of data domains, sequentially adding all registration requests from the same data domain into the registration request list according to the sequence of time stamps, creating a plurality of pages in the registration request list, wherein each page corresponds to one data domain, so that all registration requests of the same data domain are stored in the same page;
the identity authentication unit is used for sequentially carrying out local authentication on the registration requests in the first message stream according to the sequence;
a certificate authentication unit, configured to add a registration request that passes the identity authentication to a second message stream, so as to perform external domain authentication;
And the validity judging unit is used for judging that the registration request is legal if the registration request passes the authentication of the certificate authentication.
5. The apparatus of claim 4, wherein the request monitoring unit is specifically configured to: and monitoring the registration request in the target polling area in a set polling time range through the set timing polling interface.
6. The apparatus of claim 5, wherein the apparatus further comprises: the first encryption unit is used for carrying out parallelization encryption on the registration requests in the first message stream by using a first public key system parameter before carrying out identity authentication on the registration requests in the first message stream according to the sequence in turn to obtain the registration requests in a ciphertext form;
The identity authentication unit is specifically configured to: decrypting the registration request in ciphertext form using the first private key system parameter to authenticate the identity.
7. An electronic device, comprising: a memory having stored thereon a computer executable program, and a processor for executing the computer executable program to implement the method of any of claims 1-3.
8. A computer storage medium, characterized in that it has stored thereon a computer executable program which when run implements the method of any of claims 1-3.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111476642.5A CN114157491B (en) | 2021-12-02 | 2021-12-02 | Authentication method and device in heterogeneous network, electronic equipment and computer storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111476642.5A CN114157491B (en) | 2021-12-02 | 2021-12-02 | Authentication method and device in heterogeneous network, electronic equipment and computer storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114157491A CN114157491A (en) | 2022-03-08 |
CN114157491B true CN114157491B (en) | 2024-10-18 |
Family
ID=80452841
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111476642.5A Active CN114157491B (en) | 2021-12-02 | 2021-12-02 | Authentication method and device in heterogeneous network, electronic equipment and computer storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114157491B (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108200134A (en) * | 2017-12-25 | 2018-06-22 | 腾讯科技(深圳)有限公司 | Request message management method and device, storage medium |
CN112468517A (en) * | 2021-01-25 | 2021-03-09 | 广州大学 | Tracing-resistant anonymous communication network access method, system and device |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090260070A1 (en) * | 2008-04-15 | 2009-10-15 | Elevate Technologies Pty Ltd. | Systems and Methods for Secure Sign-Up Procedures for Application Servers in Wired and Wireless Environments |
CN104683299A (en) * | 2013-11-28 | 2015-06-03 | 中兴通讯股份有限公司 | Control method for software registration, authentication server and terminal |
CN110855627B (en) * | 2019-01-16 | 2021-04-09 | 星环信息科技(上海)股份有限公司 | Application deployment method, device, equipment and medium |
CN112073188B (en) * | 2020-08-31 | 2023-01-24 | 北京市商汤科技开发有限公司 | Authentication method, device, equipment and computer readable storage medium |
CN112187470B (en) * | 2020-09-22 | 2023-04-07 | 青岛海尔科技有限公司 | Internet of things certificate distribution method, device and system, storage medium and electronic device |
-
2021
- 2021-12-02 CN CN202111476642.5A patent/CN114157491B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108200134A (en) * | 2017-12-25 | 2018-06-22 | 腾讯科技(深圳)有限公司 | Request message management method and device, storage medium |
CN112468517A (en) * | 2021-01-25 | 2021-03-09 | 广州大学 | Tracing-resistant anonymous communication network access method, system and device |
Also Published As
Publication number | Publication date |
---|---|
CN114157491A (en) | 2022-03-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107483509B (en) | A kind of auth method, server and readable storage medium storing program for executing | |
CN111556006B (en) | Third-party application system login method, device, terminal and SSO service platform | |
CN111064757B (en) | Application access method and device, electronic equipment and storage medium | |
CN112131021B (en) | Access request processing method and device | |
US9787478B2 (en) | Service provider certificate management | |
CN109005538B (en) | Message authentication method between unmanned vehicle and multi-mobile-edge computing server | |
CN111147472A (en) | Lightweight authentication method and system for intelligent electric meter under edge computing scene | |
WO2011073516A1 (en) | System, method, and apparatus for performing reliable network, capability, and service discovery | |
CN111404695B (en) | Token request verification method and device | |
CN114978635B (en) | Cross-domain authentication method and device, user registration method and device | |
CN111241492A (en) | Product multi-tenant secure credit granting method, system and electronic equipment | |
WO2019056971A1 (en) | Authentication method and device | |
CN111800377A (en) | Mobile terminal identity authentication system based on safe multi-party calculation | |
CN111683090A (en) | Block chain digital signature method and device based on distributed storage | |
CN112423300A (en) | Wireless network access authentication method and device | |
WO2020058577A1 (en) | Media content control | |
CN104918245B (en) | A kind of identity identifying method, device, server and client | |
CN111866993B (en) | Wireless local area network connection management method, device, software program and storage medium | |
CN114157491B (en) | Authentication method and device in heterogeneous network, electronic equipment and computer storage medium | |
CN110048842B (en) | Session key processing method, device and computer readable storage medium | |
CN112738043B (en) | Method, system and related products for legality authentication of user identity in big data system | |
CN114205129B (en) | Lightweight authentication method and device in heterogeneous network and related products | |
CN111107550A (en) | Dual-channel access registration method and device for 5G terminal equipment and storage medium | |
CN102075933B (en) | Method and system for running application software on intelligent terminal as well as related equipment | |
CN111132167B (en) | Method for 5G user terminal to access 5G network, user terminal equipment and medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |