CN116567628A - Communication method, device, electronic equipment and storage medium - Google Patents
Communication method, device, electronic equipment and storage medium Download PDFInfo
- Publication number
- CN116567628A CN116567628A CN202310679150.9A CN202310679150A CN116567628A CN 116567628 A CN116567628 A CN 116567628A CN 202310679150 A CN202310679150 A CN 202310679150A CN 116567628 A CN116567628 A CN 116567628A
- Authority
- CN
- China
- Prior art keywords
- terminal
- target
- verification
- user account
- network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000004891 communication Methods 0.000 title claims abstract description 75
- 238000000034 method Methods 0.000 title claims abstract description 58
- 238000012795 verification Methods 0.000 claims abstract description 88
- 238000012545 processing Methods 0.000 claims description 19
- 230000006870 function Effects 0.000 description 10
- 238000010586 diagram Methods 0.000 description 6
- 238000007726 management method Methods 0.000 description 5
- 238000004590 computer program Methods 0.000 description 3
- 238000013461 design Methods 0.000 description 3
- 230000003190 augmentative effect Effects 0.000 description 2
- 238000013475 authorization Methods 0.000 description 2
- 230000006399 behavior Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 238000010295 mobile communication Methods 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 238000006467 substitution reaction Methods 0.000 description 2
- 230000001133 acceleration Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000000802 evaporation-induced self-assembly Methods 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 238000003780 insertion Methods 0.000 description 1
- 230000037431 insertion Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/068—Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The application provides a communication method, a device, electronic equipment and a storage medium, and relates to the technical field of communication. The method comprises the following steps: acquiring an access request sent by a second terminal and a terminal identification of the second terminal; under the condition that the target list does not comprise the terminal identification of the second terminal, a target page is sent to the second terminal so that the authentication server can carry out identity verification on a target user account, the target page is used for acquiring the account identification of the target user account and the account password of the target user account, and the target list comprises the terminal identifications of a plurality of authorized terminals; receiving a verification result sent by the authentication server; and accessing the second terminal into the target network under the condition that the verification result is that the verification is successful. The communication method provided by the embodiment of the application can improve the security of the terminal accessing to the network.
Description
Technical Field
The present disclosure relates to the field of communications technologies, and in particular, to a communications method, an apparatus, an electronic device, and a storage medium.
Background
Currently, some terminals may provide a network service to other terminals and set a password for the network service, and the other terminals may use the network service by inputting the password.
However, in the above method, the password may be revealed, so that any other terminal may use the network service through the password, thereby reducing the security of terminal access.
Disclosure of Invention
The application provides a communication method, a device, electronic equipment and a storage medium, which solve the technical problem that passwords set by some terminals can be leaked, so that other arbitrary terminals can use network services provided by some terminals through the passwords, and the security of terminal access is reduced.
In a first aspect, the present application provides a communication method, including: acquiring an access request sent by a second terminal and a terminal identifier of the second terminal, wherein the access request is used for requesting to access a target network, and the target network is a network provided by the first terminal; under the condition that the target list does not comprise the terminal identification of the second terminal, a target page is sent to the second terminal so that the authentication server can carry out identity verification on a target user account, the target page is used for acquiring the account identification of the target user account and the account password of the target user account, and the target list comprises the terminal identifications of a plurality of authorized terminals; receiving a verification result sent by the authentication server; and accessing the second terminal into the target network under the condition that the verification result is that the verification is successful.
Optionally, the communication method further comprises: and adding the terminal identification of the second terminal to the target list under the condition that the verification result is that the verification is successful.
Optionally, the communication method further comprises: and storing the verification result sent by the authentication server.
Optionally, the communication method further comprises: and deleting the terminal identifier of the second terminal from the target list when the target time interval is greater than or equal to the time interval threshold, wherein the target time interval is the time interval between the verification time and the current time, and the verification time is the time when the first terminal receives the verification result sent by the authentication server.
Optionally, the communication method further comprises: and accessing the second terminal to the target network under the condition that the target list comprises the terminal identification of the second terminal.
In a second aspect, the present application provides a communication device comprising: the device comprises an acquisition module, a transmission module, an ending module and a processing module; the acquisition module is used for acquiring an access request sent by a second terminal and a terminal identifier of the second terminal, wherein the access request is used for requesting to access a target network, and the target network is a network provided by the first terminal; the sending module is used for sending a target page to the second terminal under the condition that the target list does not comprise the terminal identification of the second terminal, so that the authentication server can carry out identity verification on a target user account, the target page is used for acquiring the account identification of the target user account and the account password of the target user account, and the target list comprises the terminal identifications of a plurality of authorized terminals; the receiving module is used for receiving the verification result sent by the authentication server; and the processing module is used for accessing the second terminal into the target network under the condition that the verification result is that the verification is successful.
Optionally, the processing module is further configured to add the terminal identifier of the second terminal to the target list if the verification result is that the verification is successful.
Optionally, the communication device further comprises a storage module; the storage module is used for storing the verification result sent by the authentication server.
Optionally, the processing module is further configured to delete, from the target list, the terminal identifier of the second terminal if the target time interval is greater than or equal to a time interval threshold, where the target time interval is a time interval between a verification time and a current time, and the verification time is a time when the first terminal receives a verification result sent by the authentication server.
Optionally, the processing module is further configured to access the second terminal to the target network if the target list includes a terminal identifier of the second terminal.
In a third aspect, the present application provides an electronic device, comprising: a processor and a memory configured to store processor-executable instructions; wherein the processor is configured to execute the instructions to implement any of the alternative communication methods of the first aspect described above.
In a fourth aspect, the present application provides a computer readable storage medium having instructions stored thereon which, when executed by an electronic device, enable the electronic device to perform any one of the alternative communication methods of the first aspect described above.
According to the communication method, the device, the electronic equipment and the storage medium, the first terminal can acquire the access request sent by the second terminal and the terminal identification of the second terminal, and under the condition that the terminal identification of the second terminal is not included in the target list, the second terminal does not have the authority of accessing the target network currently, at the moment, the first terminal can send the target page to the second terminal so that the authentication server can conduct identity authentication on the target user account, and receive the authentication result sent by the authentication server, and under the condition that the authentication result is successful, the target user account has the authority of accessing the target network, and because the terminal currently logged in by the target user account is the second terminal, the second terminal has the authority of accessing the target network, and at the moment, the first terminal can access the second terminal to the target network. In the application, the first terminal sends the target page to the second terminal under the condition that the second terminal does not have the authority to access the target network at present, and because the target page is used for acquiring the account identifier of the target user account and the account password of the target user account, the authentication server can perform identity authentication on the target user account, the first terminal can receive the authentication result sent by the second terminal, and the first terminal accesses the second terminal to the target network under the condition that the target user account has the authority to access the target network and the terminal currently logged in by the target user account is the second terminal, so that the security of accessing the terminal to the network can be improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below.
Fig. 1 is a schematic diagram of a network architecture of a communication system according to an embodiment of the present application;
fig. 2 is a schematic internal structure of a first terminal according to an embodiment of the present application;
fig. 3 is a schematic flow chart of a communication method according to an embodiment of the present application;
fig. 4 is a connection schematic diagram of a connection manner between the second terminal, the first terminal and the authentication server according to the embodiment of the present application;
fig. 5 is a flow chart of another communication method according to an embodiment of the present application;
fig. 6 is a flow chart of another communication method according to an embodiment of the present application;
fig. 7 is a flow chart of another communication method according to an embodiment of the present application;
fig. 8 is a flow chart of another communication method according to an embodiment of the present application;
fig. 9 is a schematic structural diagram of a communication device according to an embodiment of the present application;
fig. 10 is a schematic structural diagram of another communication device according to an embodiment of the present application.
Detailed Description
The following describes in detail a communication method, an apparatus, an electronic device, and a storage medium provided in the embodiments of the present application with reference to the accompanying drawings.
The terms "first" and "second" and the like in the description and in the drawings of the present application are used for distinguishing between different objects and not for describing a particular sequence of objects, e.g., a first terminal and a second terminal and the like are used for distinguishing between different terminals and not for describing a particular sequence of terminals.
Furthermore, references to the terms "comprising" and "having" and any variations thereof in the description of the present application are intended to cover a non-exclusive inclusion. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those listed but may optionally include other steps or elements not listed or inherent to such process, method, article, or apparatus.
It should be noted that, in the embodiments of the present application, words such as "exemplary" or "such as" are used to mean serving as an example, instance, or illustration. Any embodiment or design described herein as "exemplary" or "for example" should not be construed as preferred or advantageous over other embodiments or designs. Rather, the use of words such as "exemplary" or "such as" is intended to present related concepts in a concrete fashion.
The term "and/or" as used herein includes the use of either or both of these methods.
In the description of the present application, unless otherwise indicated, the meaning of "a plurality" means two or more.
Some concepts related to a communication method, a device, an electronic apparatus, and a storage medium provided in the embodiments of the present application are explained below.
In order to ensure network information security, public places (such as offices, libraries, meeting rooms, gyms and the like) for providing wireless fidelity WiFi internet service to the public should implement network security protection technical measures. The telecom operator has a strict real-name management system for the Internet of things card and the mobile phone card, and can open legal compliance, trace root and trace source to locate the user.
Currently, a 5G mobile communication terminal CPE/industrial gateway and the like can access a 5G communication network to perform communication by inserting a 5G card (mobile phone card or internet of things card, hereinafter referred to as a 5G card). After the CPE/industrial gateway is connected with the 5G communication network, wiFi and RJ45 interfaces of the terminals can provide a plurality of users with access to the 5G communication network in a wireless mode and an Ethernet port mode. When the user accesses through the WiFi of the 5G CPE, the user only needs to input the shared password set on the CPE, and can establish communication connection. Although the 5G mobile communication network has a management and control means for the 5G card, a plurality of users accessed through WiFi or Ethernet ports and the like cannot respectively carry out management and control methods such as authentication, statistics and the like, so that the internet surfing behavior of the users cannot be distinguished, identified and managed, network information safety supervision blind areas appear, the 'real-name' management requirements of information network access cannot be met, and network information safety hidden hazards exist.
Based on the description in the background art, since in the related art, the passwords set by some terminals may be revealed, so that any other terminal can use the network service provided by some terminals through the passwords, thereby reducing the security of terminal access. Based on this, the embodiment of the application provides a communication method, a device, an electronic device and a storage medium, where the first terminal sends a target page to the second terminal when the second terminal does not have the right to access to the target network, and because the target page is used to obtain the account identifier of the target user account and the account password of the target user account, the authentication server can perform identity authentication on the target user account, the first terminal can receive the authentication result sent by the second terminal, and the first terminal accesses the second terminal to the target network when the target user account has the right to access the target network, and the terminal that the target user account is currently logged in is the second terminal, so that the security of the terminal accessing to the network can be improved.
The communication method, apparatus, electronic device and storage medium provided in the embodiments of the present application may be applied to a communication system, as shown in fig. 1, where the communication system includes a terminal 101, a terminal 102 and a server 103. In general, in practical application, the connection between the above devices may be a wireless connection, and for convenience and intuitionistic representation of the connection relationship between the devices, a solid line is used in fig. 1 to illustrate.
The terminal 101 may be a mobile phone, a tablet computer, a desktop, a laptop, a handheld computer, a notebook, an ultra-mobile personal computer (ultra-mobile personal computer, UMPC), a netbook, a cellular phone, a personal digital assistant (personal digital assistant, PDA), an augmented reality (augmented reality, AR) \virtual reality (VR) device, etc., and the specific form of the terminal is not particularly limited in this disclosure. The system can perform man-machine interaction with a user through one or more modes of a keyboard, a touch pad, a touch screen, a remote controller, voice interaction or handwriting equipment and the like. In the embodiment of the present application, the terminal 101 may send an access request to the terminal 102, where the access request is used to request the network provided by the access terminal 102.
The terminal 102 may be a customer premises equipment (customer premise equipment, CPE), an industrial gateway, etc., which may provide other terminals with access to the communication network by wireless means, ethernet interface means. In this embodiment of the present application, the terminal 102 may access the terminal 101 to the network provided by the terminal 102 when the authentication result of the server 103 for performing identity authentication on the user account corresponding to the terminal 101 is that the authentication is successful.
The server 103 may be an independent physical server, a server cluster or a distributed system formed by a plurality of physical servers, or a cloud server providing cloud services, cloud databases, cloud computing, cloud functions, cloud storage, network services, cloud communication, middleware services, domain name services, security services, network acceleration services (content delivery network, CDN), basic cloud computing services such as big data and an artificial intelligent platform, and the like, and has an authentication and authorization function. In the embodiment of the present disclosure, the server 103 may perform identity verification on the user account corresponding to the terminal 101.
As illustrated in fig. 2, in an implementation manner of the embodiment of the present application, a first terminal executing the communication method provided in the embodiment of the present application may include a trigger module, an identity information and authentication information processing module, a storage module, and a communication interface.
Specifically, the triggering module is used for detecting an access request sent by the second terminal; the processing module of the identity information and the authentication information is used for sending a target page to the second terminal and receiving a verification result sent by the authentication server; the storage module is used for storing the verification result sent by the authentication server and the terminal identification of the second terminal; the communication interface is used for providing a network service for the second terminal in a WiFi mode or an Ethernet interface mode.
The communication method, the device, the electronic equipment and the storage medium provided by the embodiment of the application are applied to a scene of accessing a network by a terminal, when a first terminal acquires an access request sent by a second terminal, the first terminal can acquire a terminal identifier of the second terminal, and under the condition that the terminal identifier of the second terminal is not included in a target list, the first terminal can send a target page to the second terminal so as to enable an authentication server to carry out identity authentication on a target user account, and receive an authentication result sent by the authentication server, and under the condition that the authentication result is successful in authentication, the first terminal accesses the second terminal to the target network.
As shown in fig. 3, the communication method provided in the embodiment of the present application may include S101-S104.
S101, a first terminal acquires an access request sent by a second terminal and a terminal identification of the second terminal.
The access request is used for requesting to access a target network, and the target network is a network provided by the first terminal.
In this embodiment of the present application, the first terminal may provide a network through a subscriber identity module (subscriber identity module, SIM) card or an internet of things card included in the first terminal, and other terminals may access the network provided by the first terminal through a wired access or a wireless access manner.
In one implementation, the first terminal may receive the access request sent by the second terminal by sending a WiFi signal.
In another implementation manner, the first terminal may be provided with an ethernet interface, and the first terminal may detect the insertion operation of the second terminal through the ethernet interface and then receive the access request sent by the second terminal.
It will be appreciated that the terminal identity of the second terminal is used to identify identity information of the second terminal.
Alternatively, the terminal identity of the second terminal may be a media access control (media access control, MAC) address of the second terminal.
In an alternative implementation, the first terminal may acquire the terminal identifier of the second terminal after acquiring the access request of the second terminal.
S102, under the condition that the target list does not comprise the terminal identification of the second terminal, the first terminal sends the target page to the second terminal, so that the authentication server performs identity verification on the target user account.
The target page is used for acquiring an account identifier of the target user account and an account password of the target user account, and the target list comprises terminal identifiers of a plurality of authorized terminals.
It should be understood that the target list is a list included in the first terminal, and the authorized terminal is used to characterize that the terminal has the right to access the target network.
It may be understood that, in the case that the target list does not include the terminal identifier of the second terminal, it is indicated that the second terminal does not currently have the right to access the target network, and it may be that the second terminal accesses the target network for the first time, or that the second terminal fails to access the target network in a historical period of time, where the first terminal may perform authentication on the second terminal to determine whether the second terminal may access the target network.
Specifically, the first terminal may send a target page to the second terminal, so that the target user may input an account identifier of the target user account and an account password of the target user account, and then the authentication server may perform identity verification on the target user account based on the account identifier of the user account and the account password of the target user account.
In this embodiment of the present invention, the first terminal may obtain the target page from the authentication server, and then perform authentication redirection on the target page, so that after the target user inputs the account identifier of the target user account and the account password of the target user account, the authentication server may obtain the account identifier of the target user account and the account password of the target user account.
Alternatively, the target page may be a portal page.
Alternatively, the authentication server may be an authentication, accounting (authentication, authorization, accounting, AAA) server.
S103, the first terminal receives the verification result sent by the authentication server.
It will be appreciated that the verification result is verification success or verification failure.
In an optional implementation manner, the authentication server stores account identifiers of a plurality of user accounts and account passwords corresponding to each user account in the plurality of user accounts, the authentication server stores the account identifier of the target user account in the authentication server, and the authentication server can determine that the authentication result of the target user account is successful in authentication when the account passwords of the target user account are the same as the account passwords corresponding to the target user account stored in the authentication server.
Optionally, in the case that the account identifier of the target user account is not stored in the authentication server and/or the account password of the target user account is different from the account password corresponding to the target user account stored in the authentication server, the authentication server may determine that the authentication result of the target user account is authentication failure.
Optionally, the second terminal may be connected to the authentication server through the internet, or may be connected to the authentication server through an intranet.
The connection method between the second terminal, the first terminal and the authentication server will be described below by taking the first terminal as a CPE and the authentication server as an AAA server as an example.
Illustratively, assuming the first terminal is a CPE, as shown in fig. 4, the AAA server 307 may be connected to the terminal 301 through the internet 306, a user plane function (user plane function, UPF) resource pool 305, a transport network 304, a base station 303, and a CPE302, and the AAA server 307 may be connected to the terminal 308 through a customer intranet 313, a UPF private network 312, a transport network 311, a base station 310, and a CPE 309; the CPE302 may send a page one to the terminal 301, then the terminal 301 may connect to the base station 303 through a network provided by the CPE302, and then send the account identifier one of the user account one and the account password one of the user account one to the AAA server 307 through the transport network 304, the UPF resource pool 305 and the internet 306, so that the AAA server 307 may perform identity authentication on the user account one; the CPE309 may send the second page to the terminal 308, and then the terminal 308 may connect to the base station 310 through a network provided by the CPE309, and then send the account identifier of the second user account and the account password of the second user account to the AAA server 307 through the transport network 311, the UPF private network 312, and the customer intranet 313, so that the AAA server 307 may perform authentication on the second user account.
And S104, the first terminal accesses the second terminal to the target network under the condition that the verification result is that the verification is successful.
It can be understood that, when the verification result is that the verification is successful, it is indicated that the target user account has the right to access the target network, and because the terminal currently logged in by the target user account is the second terminal, the second terminal has the right to access the target network, and at this time, the first terminal can access the second terminal to the target network.
In an alternative implementation manner, when the verification result is that the verification fails, it is indicated that the target user account does not have the authority to access the target network, and because the terminal currently logged in by the target user account is the second terminal, the second terminal also does not have the authority to access the target network, at this time, the first terminal may refuse to access the second terminal to the target network, and send an access failure notification to the second terminal.
The technical scheme provided by the embodiment at least has the following beneficial effects: as known from S101-S104, the first terminal may acquire the access request sent by the second terminal and the terminal identifier of the second terminal, and indicate that the second terminal does not have the right to access the target network currently under the condition that the target list does not include the terminal identifier of the second terminal, at this time, the first terminal may send a target page to the second terminal, so that the authentication server performs identity authentication on the target user account, and receive the authentication result sent by the authentication server, and if the authentication result is successful, indicate that the target user account has the right to access the target network, and because the terminal to which the target user account is currently logged is the second terminal, the second terminal has the right to access the target network, and at this time, the first terminal may access the second terminal to the target network. In this embodiment of the present invention, when the second terminal does not currently have the authority to access the target network, the first terminal sends a target page to the second terminal, and because the target page is used to obtain the account identifier of the target user account and the account password of the target user account, the authentication server may perform identity authentication on the target user account, the first terminal may receive the authentication result sent by the second terminal, and the first terminal accesses the second terminal to the target network when the target user account has the authority to access the target network, and when the terminal currently logged in by the target user account is the second terminal, the security of accessing the terminal to the network may be improved.
Referring to fig. 3, as shown in fig. 5, the communication method provided in the embodiment of the present application further includes S105.
And S105, adding the terminal identification of the second terminal to the target list when the verification result is that the verification is successful.
In connection with the above description of the embodiments, it should be understood that, in the case that the verification result is that the verification is successful, it is explained that the target user account has the right to access the target network, and because the terminal that the target user account is currently logged in is the second terminal, the second terminal has the right to access the target network, at this time, the first terminal may further determine the second terminal as an authorized terminal, and add the terminal identifier of the second terminal to the target list.
In this embodiment of the present invention, when the target user account has the authority of accessing the target network based on a certain terminal, and when the target user account accesses the target network based on the second terminal, the terminal identifier of the second terminal is added to the target list, so that whether the second terminal has the authority of accessing the target network can be accurately determined, and when the second terminal requests to access the target network next time, whether the second terminal accesses the target network can be determined based on the terminal identifier of the second terminal, without performing authentication again, thereby improving the efficiency of terminal access.
Referring to fig. 3, as shown in fig. 6, after the first terminal receives the verification result sent by the authentication server, the communication method provided in the embodiment of the present application further includes S106.
S106, the first terminal stores the verification result sent by the authentication server.
In an optional implementation manner, the first terminal may store a correspondence between the terminal identifier of the second terminal and a verification result of identity verification of the second terminal, so that the first terminal may determine, based on the terminal identifier of the second terminal, a verification result of identity verification of the second terminal, and further determine, based on the verification result, whether to access the second terminal to the target network, thereby improving efficiency of terminal access.
In an implementation manner of the embodiment of the present application, the verification result may further include an account identifier of the target user account and an account password of the target user account, so that after the first terminal stores the verification result, real-name management may be performed on the first terminal, and further, the internet surfing behavior of the target user account is monitored, and effectiveness of network information security supervision is improved.
Referring to fig. 5, as shown in fig. 7, the communication method provided in the embodiment of the present application further includes S107.
And S107, the first terminal deletes the terminal identification of the second terminal from the target list when the target time interval is greater than or equal to the time interval threshold.
The target time interval is a time interval between verification time and current time, and the verification time is a time when the first terminal receives a verification result sent by the authentication server.
It should be understood that when the first terminal receives the verification result transmitted by the authentication server, the time when the first terminal receives the verification result transmitted by the authentication server may be stored.
In this embodiment of the present application, the time interval threshold may also be understood as a validity period of the right of the second terminal to access to the target network, and when the target time interval is greater than or equal to the time interval threshold, it is indicated that the target time interval exceeds the validity period of the right of the second terminal to access to the target network, and the second terminal does not have the right to access to the target network at the current moment, and at this time, the first terminal may delete the terminal identifier of the second terminal from the target list.
Optionally, the first terminal may also delete the verification result of the target user account by the authentication server.
In this embodiment of the present invention, when the second terminal no longer has the right to access the target network, the first terminal deletes the terminal identifier of the second terminal from the target list, so as to improve the validity of the target list, and further, the first terminal can accurately determine whether a certain terminal has the right to access the target network based on the target list.
Referring to fig. 3, as shown in fig. 8, the communication method provided in the embodiment of the present application further includes S108.
S108, the first terminal accesses the second terminal to the target network under the condition that the target list comprises the terminal identification of the second terminal.
It can be understood that, in the case that the target list includes the terminal identifier of the second terminal, the second terminal is described as an authorized terminal, and the second terminal has the right to access the target network, where the first terminal accesses the second terminal to the target network.
In an optional implementation manner, in the case that the target list includes the terminal identifier of the second terminal, the first terminal may further determine a verification result corresponding to the terminal identifier of the second terminal, and in the case that the verification result corresponding to the terminal identifier of the second terminal stored in the second terminal is verification success, the second terminal is accessed to the target network, so that whether the second terminal has the authority to access to the target network can be determined more accurately.
In an alternative implementation, the second terminal may have access to the network provided by the plurality of first terminals, at which time the second terminal may automatically switch among the networks provided by the plurality of first terminals without authentication.
The embodiment of the present application may divide functional modules of an electronic device or the like according to the above method example, for example, each functional module may be divided corresponding to each function, or two or more functions may be integrated into one processing module. The integrated modules may be implemented in hardware or in software functional modules. It should be noted that, in the embodiment of the present application, the division of the modules is schematic, which is merely a logic function division, and other division manners may be implemented in actual implementation.
In the case of dividing the respective functional modules with the respective functions, fig. 9 shows a schematic diagram of one possible configuration of the communication apparatus involved in the above-described embodiment, and as shown in fig. 9, the communication apparatus 40 may include: an acquisition module 401, a transmission module 402, a reception module 403, and a processing module 404.
The obtaining module 401 is configured to obtain an access request sent by a second terminal and a terminal identifier of the second terminal, where the access request is used to request access to a target network, and the target network is a network provided by the first terminal.
And the sending module 402 is configured to send a target page to the second terminal if the target list does not include the terminal identifier of the second terminal, so that the authentication server performs identity verification on the target user account, where the target page is used to obtain the account identifier of the target user account and the account password of the target user account, and the target list includes terminal identifiers of multiple authorized terminals.
And the receiving module 403 is configured to receive a verification result sent by the authentication server.
And a processing module 404, configured to access the second terminal to the target network if the verification result is that the verification is successful.
Optionally, the processing module 404 is further configured to add the terminal identifier of the second terminal to the target list if the verification result is that the verification is successful.
Optionally, the communication device 40 further comprises a storage module 405.
And the storage module 405 is configured to store a verification result sent by the authentication server.
Optionally, the processing module 404 is further configured to delete the terminal identifier of the second terminal from the target list if the target time interval is greater than or equal to the time interval threshold, where the target time interval is a time interval between a verification time and a current time, and the verification time is a time when the first terminal receives the verification result sent by the authentication server.
Optionally, the processing module 404 is further configured to access the second terminal to the target network if the target list includes the terminal identifier of the second terminal.
In the case of an integrated unit, fig. 10 shows a schematic diagram of one possible configuration of the communication device involved in the above-described embodiment. As shown in fig. 10, the communication device 50 may include: a processing module 501 and a communication module 502. The processing module 501 may be used to control and manage the operation of the communication device 50. The communication module 502 may be used to support communication of the communication device 50 with other entities. Optionally, as shown in fig. 10, the communication device 50 may further comprise a storage module 503 for storing program code and data of the communication device 50.
Wherein the processing module 501 may be a processor or a controller. The communication module 502 may be a transceiver, a transceiver circuit, a communication interface, or the like. The storage module 503 may be a memory.
Where the processing module 501 is a processor, the communication module 502 is a transceiver, and the storage module 503 is a memory, the processor, the transceiver, and the memory may be connected by a bus. The bus may be a peripheral component interconnect standard (peripheral component interconnect, PCI) bus or an extended industry standard architecture (extended industry standard architecture, EISA) bus, or the like. The buses may be divided into address buses, data buses, control buses, etc.
It should be understood that, in various embodiments of the present application, the sequence numbers of the foregoing processes do not mean the order of execution, and the order of execution of the processes should be determined by the functions and internal logic thereof, and should not constitute any limitation on the implementation process of the embodiments of the present application.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, and are not repeated herein.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented using a software program, it may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on a computer, the processes or functions described in accordance with embodiments of the present application are produced in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable apparatus. The computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center by a wired (e.g., coaxial cable, fiber optic, digital subscriber terminal line (Digital Subscriber Line, DSL)) or wireless (e.g., infrared, wireless, microwave, etc.) means. The computer readable storage medium may be any available medium that can be accessed by a computer or a data storage device including one or more servers, data centers, etc. that can be integrated with the medium. The usable medium may be a magnetic medium (e.g., a floppy Disk, a hard Disk, a magnetic tape), an optical medium (e.g., a DVD), or a semiconductor medium (e.g., a Solid State Disk (SSD)), or the like.
The foregoing is merely specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily think about changes or substitutions within the technical scope of the present application, and the changes and substitutions are intended to be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.
Claims (10)
1. A communication method, applied to a first terminal, comprising:
acquiring an access request sent by a second terminal and a terminal identifier of the second terminal, wherein the access request is used for requesting to access a target network, and the target network is a network provided by the first terminal;
under the condition that the target list does not comprise the terminal identification of the second terminal, a target page is sent to the second terminal so that an authentication server can carry out identity verification on a target user account, the target page is used for acquiring the account identification of the target user account and the account password of the target user account, and the target list comprises the terminal identifications of a plurality of authorized terminals;
receiving a verification result sent by the authentication server;
and accessing the second terminal into the target network under the condition that the verification result is that the verification is successful.
2. The communication method according to claim 1, characterized in that the method further comprises:
and adding the terminal identification of the second terminal to the target list under the condition that the verification result is that the verification is successful.
3. The communication method according to claim 1, characterized in that the method further comprises:
and storing the verification result sent by the authentication server.
4. The communication method according to claim 2, characterized in that the method further comprises:
and deleting the terminal identifier of the second terminal from the target list when the target time interval is greater than or equal to a time interval threshold, wherein the target time interval is a time interval between verification time and current time, and the verification time is the time when the first terminal receives the verification result sent by the authentication server.
5. The communication method according to claim 1, characterized in that the method further comprises:
and accessing the second terminal into the target network under the condition that the target list comprises the terminal identification of the second terminal.
6. A communication device, comprising: the device comprises an acquisition module, a sending module, a receiving module and a processing module;
the acquisition module is used for acquiring an access request sent by a second terminal and a terminal identifier of the second terminal, wherein the access request is used for requesting to access a target network, and the target network is a network provided by the first terminal;
the sending module is configured to send a target page to the second terminal when the target list does not include the terminal identifier of the second terminal, so that the authentication server performs identity verification on a target user account, where the target page is used to obtain an account identifier of the target user account and an account password of the target user account, and the target list includes terminal identifiers of multiple authorized terminals;
the receiving module is used for receiving the verification result sent by the authentication server;
and the processing module is used for accessing the second terminal into the target network under the condition that the verification result is that the verification is successful.
7. The communication device of claim 6, wherein the communication device comprises a communication device,
and the processing module is further configured to add a terminal identifier of the second terminal to the target list when the verification result is that the verification is successful.
8. The communication device of claim 6, further comprising a memory module;
the storage module is used for storing the verification result sent by the authentication server.
9. An electronic device, the electronic device comprising:
a processor;
a memory configured to store the processor-executable instructions;
wherein the processor is configured to execute the instructions to implement the communication method of any of claims 1-5.
10. A computer readable storage medium having instructions stored thereon, which, when executed by an electronic device, cause the electronic device to perform the communication method of any of claims 1-5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310679150.9A CN116567628A (en) | 2023-06-08 | 2023-06-08 | Communication method, device, electronic equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310679150.9A CN116567628A (en) | 2023-06-08 | 2023-06-08 | Communication method, device, electronic equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN116567628A true CN116567628A (en) | 2023-08-08 |
Family
ID=87489994
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310679150.9A Pending CN116567628A (en) | 2023-06-08 | 2023-06-08 | Communication method, device, electronic equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116567628A (en) |
-
2023
- 2023-06-08 CN CN202310679150.9A patent/CN116567628A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9197639B2 (en) | Method for sharing data of device in M2M communication and system therefor | |
EP3319293A1 (en) | Cross-terminal login-free method and device | |
CN106716956B (en) | Method, related device and system for sharing cloud operation interface | |
CN104158824A (en) | Method and system of network real name authentication | |
CN102891826A (en) | Control method, equipment and system for webpage access | |
CN105306203A (en) | Account login method, device and system | |
CN103686651A (en) | Emergency call based authentication method, device and system | |
US11683312B2 (en) | Client device authentication to a secure network | |
CN113271299B (en) | Login method and server | |
CN104837134A (en) | Web authentication user registration method, device and system | |
CN116248351A (en) | Resource access method and device, electronic equipment and storage medium | |
CN101697550A (en) | Method and system for controlling access authority of double-protocol-stack network | |
CN101594615B (en) | Method, system and equipment for network management of terminal triple information security | |
CN103138935A (en) | Identity authentication system based on telecom operators | |
CN104753774A (en) | Distributed enterprise integrated access gateway | |
CN116567628A (en) | Communication method, device, electronic equipment and storage medium | |
CN116318911A (en) | Domain name access method and device, electronic equipment and storage medium | |
CN117395131A (en) | Abnormality notification method and device, electronic equipment and storage medium | |
CN105163335B (en) | A kind of network access management method, server, mobile terminal and system | |
CN112804403B (en) | Information interaction method, electronic equipment and readable storage medium | |
CN116390096A (en) | Mobile hotspot access method, device, equipment and storage medium | |
KR101160903B1 (en) | Blacklist extracting system and method thereof | |
CN110048864B (en) | Method and apparatus for authenticating an administrator of a device-specific message group | |
CN115766130B (en) | Conference encryption method and device, electronic equipment and storage medium | |
CN116155772B (en) | Abnormality determination method and device, electronic equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |