CN110430043B - An authentication method, system and device, and storage medium - Google Patents
An authentication method, system and device, and storage medium Download PDFInfo
- Publication number
- CN110430043B CN110430043B CN201910606236.2A CN201910606236A CN110430043B CN 110430043 B CN110430043 B CN 110430043B CN 201910606236 A CN201910606236 A CN 201910606236A CN 110430043 B CN110430043 B CN 110430043B
- Authority
- CN
- China
- Prior art keywords
- information
- terminal
- node server
- key
- authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3234—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Storage Device Security (AREA)
Abstract
Description
技术领域technical field
本发明涉及视联网技术领域,特别是涉及一种认证方法、系统以及一种装置和一种计算机可读存储介质。The present invention relates to the technical field of Internet of Things, in particular to an authentication method, a system, a device and a computer-readable storage medium.
背景技术Background technique
视联网是一种基于以太网硬件的用于高速传输高清视频及专用协议的专用网络,视联网是以太网的更高级形态,是一个实时网络。在基于视联网的视频会议中,视频会议客户端若登录至视频会议服务器,需要向视频会议服务器发送视频会议客户端上的用户名和密码,由视频会议服务器对用户名和密码进行验证。若验证通过,则视频会议服务器允许视频会议客户端登录至视频会议服务器。The Internet of Vision is a dedicated network based on Ethernet hardware for high-speed transmission of high-definition video and dedicated protocols. The Internet of Vision is a more advanced form of Ethernet and a real-time network. In a video conference based on the Internet of Vision, if the video conference client logs in to the video conference server, it needs to send the user name and password on the video conference client to the video conference server, and the video conference server will verify the user name and password. If the verification is passed, the video conference server allows the video conference client to log in to the video conference server.
目前,在基于视联网的视频会议中,视频会议客户端按照明文的方式将用户名和密码发送至视频会议服务器,用户名和密码容易被截获,视频会议的安全性不高。At present, in a video conference based on the Internet of Vision, the video conference client sends the user name and password to the video conference server in plain text. The user name and password are easily intercepted, and the security of the video conference is not high.
发明内容Contents of the invention
鉴于上述问题,提出了本发明实施例以便提供一种克服上述问题或者至少部分地解决上述问题的一种认证方法、系统,以及一种装置和一种计算机可读存储介质。In view of the above problems, embodiments of the present invention are proposed to provide an authentication method, system, device, and computer-readable storage medium that overcome the above problems or at least partially solve the above problems.
为了解决上述问题,本发明实施例公开了一种认证方法,所述方法应用于视联网,所述视联网中包括终端和节点服务器,所述终端上设置有第一U-Key,所述终端与所述节点服务器通信连接;所述方法包括:所述节点服务器接收来自所述终端的第一认证请求信息,所述第一认证请求信息包括用户名和所述第一U-Key的标识信息;所述节点服务器根据所述用户名和预设的用户名与U-Key之间的绑定关系查询得到与所述用户名对应的第二U-Key的标识信息;所述节点服务器在所述第一U-Key的标识信息与所述第二U-Key的标识信息相同时,生成并发送第一认证响应信息至所述终端;所述终端用于根据所述第一认证响应信息生成第二认证请求信息,并发送所述第二认证请求信息至所述节点服务器,所述第二认证请求信息包括加密后的密码信息;所述节点服务器对所述第二认证请求信息进行认证,并将认证结果返回至所述终端。In order to solve the above problems, the embodiment of the present invention discloses an authentication method, the method is applied to the Internet of Vision, the Internet of Vision includes a terminal and a node server, the terminal is provided with a first U-Key, and the terminal Communication connection with the node server; the method includes: the node server receives first authentication request information from the terminal, the first authentication request information includes a user name and identification information of the first U-Key; The node server obtains the identification information of the second U-Key corresponding to the user name according to the user name and the preset binding relationship between the user name and the U-Key; When the identification information of a U-Key is the same as the identification information of the second U-Key, generate and send the first authentication response information to the terminal; the terminal is used to generate the second authentication response information according to the first authentication response information authentication request information, and send the second authentication request information to the node server, where the second authentication request information includes encrypted password information; the node server authenticates the second authentication request information, and sends The authentication result is returned to the terminal.
可选地,所述第一认证请求信息还包括:第一随机数据、加密证书数据和所述终端的标识信息;所述节点服务器生成第一认证响应信息的步骤,包括:所述节点服务器生成第二随机数据和对称密钥;所述节点服务器从所述加密证书数据中提取得到公钥,并利用所述公钥对所述对称密钥进行加密;所述节点服务器利用预设的第一签名证书对所述第一随机数据、所述第二随机数据、加密后的对称密钥、所述节点服务器的标识信息和所述终端的标识信息进行签名,得到第一签名信息;所述节点服务器将所述第一随机数据、所述第二随机数据、加密后的对称密钥、所述终端的标识信息、所述节点服务器的标识信息、所述第一签名信息和所述第一签名证书确定为所述第一认证响应信息。Optionally, the first authentication request information further includes: first random data, encrypted certificate data, and identification information of the terminal; the step of generating the first authentication response information by the node server includes: generating the first authentication response information by the node server The second random data and a symmetric key; the node server extracts the public key from the encrypted certificate data, and uses the public key to encrypt the symmetric key; the node server uses the preset first The signing certificate signs the first random data, the second random data, the encrypted symmetric key, the identification information of the node server and the identification information of the terminal to obtain first signature information; the node The server sends the first random data, the second random data, the encrypted symmetric key, the identification information of the terminal, the identification information of the node server, the first signature information, and the first signature The certificate is determined as the first authentication response information.
可选地,所述终端用于根据所述第一签名证书对所述第一认证响应信息中的所述第一随机数据和所述所述终端的标识信息进行验签,并在验签通过的情况下利用预设的私钥对加密后的对称密钥进行解密得到所述对称密钥,利用所述对称密钥对所述密码信息进行加密,利用预设的第二签名证书对所述第一随机数据、所述第二随机数据和所述节点服务器的标识信息进行签名,得到第二签名信息,将所述第一随机数据、所述第二随机数据、加密后的密码信息、所述终端的标识信息、所述节点服务器的标识信息、所述第二签名信息和所述第二签名证书确定为所述第二认证请求信息。Optionally, the terminal is configured to perform signature verification on the first random data in the first authentication response information and the identification information of the terminal according to the first signature certificate, and when the verification passes In the case of using the preset private key to decrypt the encrypted symmetric key to obtain the symmetric key, use the symmetric key to encrypt the password information, and use the preset second signature certificate to encrypt the Sign the first random data, the second random data, and the identification information of the node server to obtain second signature information, and use the first random data, the second random data, encrypted password information, and the The identification information of the terminal, the identification information of the node server, the second signature information, and the second signature certificate are determined as the second authentication request information.
可选地,在所述节点服务器接收来自所述终端的第一认证请求信息的步骤之后,所述方法还包括:所述节点服务器根据所述用户名和预设的用户名与口令之间的绑定关系查询得到与所述用户名对应的口令信息。Optionally, after the node server receives the first authentication request information from the terminal, the method further includes: the node server according to the user name and the preset user name and password binding The password information corresponding to the user name is obtained through a certain relationship query.
可选地,所述节点服务器对所述第二认证请求信息进行认证的步骤,包括:所述节点服务器利用所述第二签名证书对所述第二认证请求信息中的所述节点服务器的标识信息和所述第二随机数据进行验签;所述节点服务器在验签通过的情况下利用所述对称密钥对加密后的密码信息进行解密,得到所述密码信息,并将所述口令信息与所述密码信息进行比对。Optionally, the step of the node server authenticating the second authentication request information includes: the node server uses the second signature certificate to identify the node server in the second authentication request information information and the second random data to perform signature verification; the node server uses the symmetric key to decrypt the encrypted password information to obtain the password information when the signature verification is passed, and the password information Compare with the password information.
本发明实施例还公开了一种认证系统,所述系统应用于视联网,所述视联网中包括终端和节点服务器,所述终端上设置有第一U-Key,所述终端与所述节点服务器通信连接;所述节点服务器包括:接收模块,用于接收来自所述终端的第一认证请求信息,所述第一认证请求信息包括用户名和所述第一U-Key的标识信息;查询模块,用于根据所述用户名和预设的用户名与U-Key之间的绑定关系查询得到与所述用户名对应的第二U-Key的标识信息;响应模块,用于在所述第一U-Key的标识信息与所述第二U-Key的标识信息相同时,生成并发送第一认证响应信息至所述终端;所述终端用于根据所述第一认证响应信息生成第二认证请求信息,并发送所述第二认证请求信息至所述节点服务器,所述第二认证请求信息包括加密后的密码信息;认证模块,用于对所述第二认证请求信息进行认证,并将认证结果返回至所述终端。The embodiment of the present invention also discloses an authentication system, the system is applied to the Internet of Vision, the Internet of Vision includes a terminal and a node server, the terminal is provided with a first U-Key, and the terminal and the node The server is connected in communication; the node server includes: a receiving module, configured to receive first authentication request information from the terminal, the first authentication request information including user name and identification information of the first U-Key; query module , for obtaining the identification information of the second U-Key corresponding to the user name according to the user name and the preset binding relationship between the user name and the U-Key; the response module is used for the first When the identification information of a U-Key is the same as the identification information of the second U-Key, generate and send the first authentication response information to the terminal; the terminal is used to generate the second authentication response information according to the first authentication response information authentication request information, and send the second authentication request information to the node server, the second authentication request information includes encrypted password information; an authentication module, configured to authenticate the second authentication request information, and Return the authentication result to the terminal.
可选地,所述第一认证请求信息还包括第一随机数据、加密证书数据和所述终端的标识信息;所述响应模块,包括:生成模块,用于生成第二随机数据和对称密钥;加密模块,用于从所述加密证书数据中提取得到公钥,并利用所述公钥对所述对称密钥进行加密;签名模块,用于利用预设的第一签名证书对所述第一随机数据、所述第二随机数据、加密后的对称密钥、所述节点服务器的标识信息和所述终端的标识信息进行签名,得到第一签名信息;确定模块,用于将所述第一随机数据、所述第二随机数据、加密后的对称密钥、所述终端的标识信息、所述节点服务器的标识信息、所述第一签名信息和所述第一签名证书确定为所述第一认证响应信息。Optionally, the first authentication request information further includes first random data, encrypted certificate data, and identification information of the terminal; the response module includes: a generating module, configured to generate second random data and a symmetric key ; An encryption module, configured to extract a public key from the encrypted certificate data, and use the public key to encrypt the symmetric key; a signature module, configured to use a preset first signature certificate to encrypt the second A random data, the second random data, the encrypted symmetric key, the identification information of the node server, and the identification information of the terminal are signed to obtain first signature information; a determination module is configured to use the second signature information A random data, the second random data, the encrypted symmetric key, the identification information of the terminal, the identification information of the node server, the first signature information, and the first signature certificate are determined as the The first authentication response information.
可选地,所述终端用于根据所述第一签名证书对所述第一认证响应信息中的所述第一随机数据和所述所述终端的标识信息进行验签,并在验签通过的情况下利用预设的私钥对加密后的对称密钥进行解密得到所述对称密钥,利用所述对称密钥对所述密码信息进行加密,利用预设的第二签名证书对所述第一随机数据、所述第二随机数据和所述节点服务器的标识信息进行签名,得到第二签名信息,将所述第一随机数据、所述第二随机数据、加密后的密码信息、所述终端的标识信息、所述节点服务器的标识信息、所述第二签名信息和所述第二签名证书确定为所述第二认证请求信息;所述查询模块,还用于在所述接收模块接收来自所述终端的第一认证请求信息之后,根据所述用户名和预设的用户名与口令之间的绑定关系查询得到与所述用户名对应的口令信息;所述认证模块,包括:验签模块,用于利用所述第二签名证书对所述第二认证请求信息中的所述节点服务器的标识信息和所述第二随机数据进行验签;比对模块,用于在验签通过的情况下利用所述对称密钥对加密后的密码信息进行解密,得到所述密码信息,并将所述口令信息与所述密码信息进行比对。Optionally, the terminal is configured to perform signature verification on the first random data in the first authentication response information and the identification information of the terminal according to the first signature certificate, and when the verification passes In the case of using the preset private key to decrypt the encrypted symmetric key to obtain the symmetric key, use the symmetric key to encrypt the password information, and use the preset second signature certificate to encrypt the Sign the first random data, the second random data, and the identification information of the node server to obtain second signature information, and use the first random data, the second random data, encrypted password information, and the The identification information of the terminal, the identification information of the node server, the second signature information and the second signature certificate are determined as the second authentication request information; the query module is also used in the receiving module After receiving the first authentication request information from the terminal, query according to the binding relationship between the user name and the preset user name and password to obtain the password information corresponding to the user name; the authentication module includes: A signature verification module, configured to use the second signature certificate to verify the identity information of the node server and the second random data in the second authentication request information; a comparison module, configured to verify the signature If passed, the encrypted password information is decrypted by using the symmetric key to obtain the password information, and the password information is compared with the password information.
本发明实施例还公开了一种装置,包括:The embodiment of the invention also discloses a device, comprising:
一个或多个处理器;和one or more processors; and
其上存储有指令的一个或多个机器可读介质,当由所述一个或多个处理器执行时,使得所述装置执行如本发明实施例所述的一个或多个的认证方法。One or more machine-readable media having instructions stored thereon, when executed by the one or more processors, enables the device to execute one or more authentication methods as described in the embodiments of the present invention.
本发明实施例还公开了一种计算机可读存储介质,其存储的计算机程序使得处理器执行如本发明实施例所述的认证方法。The embodiment of the present invention also discloses a computer-readable storage medium, and the computer program stored in it enables the processor to execute the authentication method described in the embodiment of the present invention.
本发明实施例包括以下优点:Embodiments of the present invention include the following advantages:
本发明实施例提供的一种认证方案,应用于视联网中,该视联网可以包括终端和节点服务器。终端可以作为视频会议客户端,终端上设置有第一U-Key,节点服务器可以作为食品会议服务器,终端与节点服务器可以通过连接。An authentication scheme provided by an embodiment of the present invention is applied to a video network, and the video network may include a terminal and a node server. The terminal can be used as a video conferencing client, the terminal is provided with a first U-Key, the node server can be used as a food conference server, and the terminal and the node server can be connected through.
在本发明实施例中,终端向节点服务器发送第一认证请求信息,该第一认证请求信息中可以包括用户名和第一U-key的标识信息。节点服务器从预设的用户名与U-Key之间的绑定关系中查找到与第一请求认证信息中的用户名对应第二U-Key的标识信息,进而将第一U-Key的标识信息与第二U-Key的标识信息进行比较,若第一U-Key的标识信息与第二U-Key的标识信息相同,则生成并发送第一认证响应信息至终端。终端根据第一认证响应信息生成包括密码信息的第二认证请求信息,并发送第二认证请求信息至节点服务器。节点服务器对第二认证请求信息进行认证,并将认证结果返回至终端。In the embodiment of the present invention, the terminal sends the first authentication request information to the node server, and the first authentication request information may include the user name and the identification information of the first U-key. The node server finds the identification information of the second U-Key corresponding to the user name in the first request authentication information from the preset binding relationship between the user name and the U-Key, and then uses the identification information of the first U-Key The information is compared with the identification information of the second U-Key, and if the identification information of the first U-Key is the same as the identification information of the second U-Key, first authentication response information is generated and sent to the terminal. The terminal generates second authentication request information including password information according to the first authentication response information, and sends the second authentication request information to the node server. The node server authenticates the second authentication request information, and returns the authentication result to the terminal.
在本发明实施例中,一方面,终端在向节点服务器发送认证请求信息时,以加密的形式发送密码信息,提高了密码信息的安全性。另一方面,终端在第一认证请求信息中将用户名发送至节点服务器,终端在第二认证请求信息中将密码信息发送至节点服务器。终端将用户名和密码信息分开发送至节点服务器,降低了用户名和密码信息同时被截获的几率。再一方面,终端在将第一认证请求信息发送至节点服务器之后,节点服务器判断第一认证请求信息中的U-Key的标识信息与用户名绑定的U-Key的标识信息是否相同,若第一认证请求信息中的U-Key的标识信息与用户名绑定的U-Key的标识信息相同,则向终端返回第一认证响应信息。即在第一认证请求信息中的U-Key的标识信息与用户名绑定的U-Key的标识信息相同的情况下,终端根据第一认证响应信息向节点服务器发送包含密码信息的第二认证请求信息。通过节点服务器对U-Key的标识信息的验证,提高了密码信息的安全性。In the embodiment of the present invention, on the one hand, when the terminal sends the authentication request information to the node server, it sends the password information in an encrypted form, which improves the security of the password information. On the other hand, the terminal sends the user name to the node server in the first authentication request information, and the terminal sends the password information to the node server in the second authentication request information. The terminal sends the user name and password information to the node server separately, reducing the probability of the user name and password information being intercepted at the same time. On the other hand, after the terminal sends the first authentication request information to the node server, the node server judges whether the identification information of the U-Key in the first authentication request information is the same as the identification information of the U-Key bound to the user name, if The identification information of the U-Key in the first authentication request information is the same as the identification information of the U-Key bound to the user name, and the first authentication response information is returned to the terminal. That is, if the identification information of the U-Key in the first authentication request information is the same as the identification information of the U-Key bound to the user name, the terminal sends a second authentication message containing password information to the node server according to the first authentication response information. request information. Through the node server's verification of the identification information of the U-Key, the security of the password information is improved.
附图说明Description of drawings
图1是本发明的一种视联网的组网示意图;Fig. 1 is a kind of networking schematic diagram of visual networking of the present invention;
图2是本发明的一种节点服务器的硬件结构示意图;Fig. 2 is a schematic diagram of the hardware structure of a node server of the present invention;
图3是本发明的一种接入交换机的硬件结构示意图;Fig. 3 is a schematic diagram of the hardware structure of an access switch of the present invention;
图4是本发明的一种以太网协转网关的硬件结构示意图;Fig. 4 is the hardware structural representation of a kind of Ethernet protocol conversion gateway of the present invention;
图5是本发明实施例的一种认证方法的步骤流程图;Fig. 5 is a flow chart of steps of an authentication method according to an embodiment of the present invention;
图6是本发明实施例的一种基于视联网的视频会议的用户登录认证方法的交互示意图;6 is an interactive schematic diagram of a user login authentication method for a video conference based on the Internet of Things according to an embodiment of the present invention;
图7是本发明实施例的一种认证系统中节点服务器的结构示意图。FIG. 7 is a schematic structural diagram of a node server in an authentication system according to an embodiment of the present invention.
具体实施方式Detailed ways
为使本发明的上述目的、特征和优点能够更加明显易懂,下面结合附图和具体实施方式对本发明作进一步详细的说明。In order to make the above objects, features and advantages of the present invention more comprehensible, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.
视联网是网络发展的重要里程碑,是一个实时网络,能够实现高清视频实时传输,将众多互联网应用推向高清视频化,高清面对面。The Internet of Vision is an important milestone in the development of the network. It is a real-time network that can realize real-time transmission of high-definition video, and push many Internet applications to high-definition video, high-definition face-to-face.
视联网采用实时高清视频交换技术,可以在一个网络平台上将所需的服务,如高清视频会议、视频监控、智能化监控分析、应急指挥、数字广播电视、延时电视、网络教学、现场直播、VOD点播、电视邮件、个性录制(PVR)、内网(自办)频道、智能化视频播控、信息发布等数十种视频、语音、图片、文字、通讯、数据等服务全部整合在一个系统平台,通过电视或电脑实现高清品质视频播放。The Internet of View adopts real-time high-definition video exchange technology, which can provide required services on one network platform, such as high-definition video conferencing, video surveillance, intelligent monitoring and analysis, emergency command, digital broadcast TV, time-lapse TV, online teaching, live broadcast , VOD on demand, TV mail, personalized recording (PVR), intranet (self-managed) channel, intelligent video broadcast control, information release and other dozens of video, voice, picture, text, communication, data and other services are all integrated in one System platform, realize high-definition quality video playback through TV or computer.
为使本领域技术人员更好地理解本发明实施例,以下对视联网进行介绍:In order to enable those skilled in the art to better understand the embodiments of the present invention, the Internet of Things is introduced as follows:
视联网所应用的部分技术如下所述:Some of the technologies applied in the Internet of Things are as follows:
网络技术(Network Technology)Network Technology
视联网的网络技术创新改良了传统以太网(Ethernet),以面对网络上潜在的巨大第一视频流量。不同于单纯的网络分组包交换(Packet Switching)或网络电路交换(Circuit Switching),视联网技术采用Packet Switching满足Streaming需求。视联网技术具备分组交换的灵活、简单和低价,同时具备电路交换的品质和安全保证,实现了全网交换式虚拟电路,以及数据格式的无缝连接。The network technology innovation of the Internet of View has improved the traditional Ethernet (Ethernet) to face the potentially huge first video traffic on the network. Different from pure network packet switching (Packet Switching) or network circuit switching (Circuit Switching), video networking technology uses Packet Switching to meet Streaming requirements. The Internet of Vision technology has the flexibility, simplicity and low price of packet switching, and at the same time has the quality and security guarantee of circuit switching, realizing the seamless connection of switched virtual circuits and data formats throughout the network.
交换技术(Switching Technology)Switching Technology
视联网采用以太网的异步和包交换两个优点,在全兼容的前提下消除了以太网缺陷,具备全网端到端无缝连接,直通用户终端,直接承载IP数据包。用户数据在全网范围内不需任何格式转换。视联网是以太网的更高级形态,是一个实时交换平台,能够实现目前互联网无法实现的全网大规模高清视频实时传输,将众多网络视频应用推向高清化、统一化。Video networking adopts the two advantages of Ethernet asynchronous and packet switching, eliminates the defects of Ethernet under the premise of full compatibility, has end-to-end seamless connection of the whole network, directly connects to user terminals, and directly carries IP data packets. User data does not require any format conversion across the entire network. Video networking is a more advanced form of Ethernet. It is a real-time switching platform, which can realize the real-time transmission of large-scale high-definition video in the whole network that cannot be realized by the Internet at present, and push many network video applications to high-definition and unification.
服务器技术(Server Technology)Server Technology
视联网和统一视频平台上的服务器技术不同于传统意义上的服务器,它的流媒体传输是建立在面向连接的基础上,其数据处理能力与流量、通讯时间无关,单个网络层就能够包含信令及数据传输。对于语音和视频业务来说,视联网和统一视频平台流媒体处理的复杂度比数据处理简单许多,效率比传统服务器大大提高了百倍以上。The server technology on the Internet of View and unified video platform is different from the server in the traditional sense. Its streaming media transmission is based on connection-oriented, and its data processing capability has nothing to do with traffic and communication time. A single network layer can contain information command and data transmission. For voice and video services, the complexity of video streaming and unified video platform streaming media processing is much simpler than data processing, and the efficiency is greatly improved by more than 100 times compared with traditional servers.
储存器技术(Storage Technology)Storage Technology
统一视频平台的超高速储存器技术为了适应超大容量和超大流量的媒体内容而采用了最先进的实时操作系统,将服务器指令中的节目信息映射到具体的硬盘空间,媒体内容不再经过服务器,瞬间直接送达到用户终端,用户等待一般时间小于0.2秒。最优化的扇区分布大大减少了硬盘磁头寻道的机械运动,资源消耗仅占同等级IP互联网的20%,但产生大于传统硬盘阵列3倍的并发流量,综合效率提升10倍以上。The ultra-high-speed storage technology of the unified video platform adopts the most advanced real-time operating system in order to adapt to the super-large capacity and super-large-flow media content, and maps the program information in the server command to the specific hard disk space, and the media content no longer passes through the server. It is delivered directly to the user terminal in an instant, and the user generally waits for less than 0.2 seconds. The optimized sector distribution greatly reduces the mechanical movement of the hard disk head seeking. The resource consumption is only 20% of the IP Internet of the same level, but the concurrent traffic generated is 3 times larger than that of the traditional hard disk array, and the overall efficiency is increased by more than 10 times.
网络安全技术(Network Security Technology)Network Security Technology
视联网的结构性设计通过每次服务单独许可制、设备与用户数据完全隔离等方式从结构上彻底根除了困扰互联网的网络安全问题,一般不需要杀毒程序、防火墙,杜绝了黑客与病毒的攻击,为用户提供结构性的无忧安全网络。The structural design of the Internet of View completely eradicates the network security problems that plague the Internet through the individual licensing system for each service, complete isolation of equipment and user data, and generally does not require anti-virus programs and firewalls, preventing hackers and virus attacks , to provide users with a structured worry-free security network.
服务创新技术(Service Innovation Technology)Service Innovation Technology
统一视频平台将业务与传输融合在一起,不论是单个用户、私网用户还是一个网络的总合,都不过是一次自动连接。用户终端、机顶盒或PC直接连到统一视频平台,获得丰富多彩的各种形态的多媒体视频服务。统一视频平台采用“菜谱式”配表模式来替代传统的复杂应用编程,可以使用非常少的代码即可实现复杂的应用,实现“无限量”的新业务创新。The unified video platform integrates business and transmission together, whether it is a single user, a private network user or the sum of a network, it is just an automatic connection. User terminals, set-top boxes or PCs are directly connected to the unified video platform to obtain rich and colorful multimedia video services in various forms. The unified video platform adopts the "recipe-style" table matching mode to replace the traditional complex application programming. It can realize complex applications with very little code and realize "unlimited" new business innovations.
视联网的组网如下所述:The networking of the Internet of View is as follows:
视联网是一种集中控制的网络结构,该网络可以是树型网、星型网、环状网等等类型,但在此基础上网络中需要有集中控制节点来控制整个网络。Vision networking is a network structure with centralized control. The network can be a tree network, star network, ring network, etc., but on this basis, a centralized control node is required in the network to control the entire network.
如图1所示,视联网分为接入网和城域网两部分。As shown in Figure 1, the Internet of Things is divided into two parts: the access network and the metropolitan area network.
接入网部分的设备主要可以分为3类:节点服务器,接入交换机,终端(包括各种机顶盒、编码板、存储器等)。节点服务器与接入交换机相连,接入交换机可以与多个终端相连,并可以连接以太网。The equipment in the access network part can be mainly divided into three categories: node server, access switch, terminal (including various set-top boxes, encoding boards, storage, etc.). The node server is connected with the access switch, and the access switch can be connected with multiple terminals and can be connected with Ethernet.
其中,节点服务器是接入网中起集中控制功能的节点,可控制接入交换机和终端。节点服务器可直接与接入交换机相连,也可以直接与终端相连。Wherein, the node server is a node with centralized control function in the access network, which can control the access switches and terminals. The node server can be directly connected to the access switch, and can also be directly connected to the terminal.
类似的,城域网部分的设备也可以分为3类:城域服务器,节点交换机,节点服务器。城域服务器与节点交换机相连,节点交换机可以与多个节点服务器相连。Similarly, the devices in the MAN part can also be divided into three categories: MAN servers, node switches, and node servers. The metro server is connected to the node switch, and the node switch can be connected to multiple node servers.
其中,节点服务器即为接入网部分的节点服务器,即节点服务器既属于接入网部分,又属于城域网部分。Wherein, the node server is the node server of the access network part, that is, the node server belongs to both the access network part and the metropolitan area network part.
城域服务器是城域网中起集中控制功能的节点,可控制节点交换机和节点服务器。城域服务器可直接连接节点交换机,也可直接连接节点服务器。The metropolitan area server is a node with a centralized control function in the metropolitan area network, which can control node switches and node servers. The metro server can be directly connected to the node switch, or directly connected to the node server.
由此可见,整个视联网络是一种分层集中控制的网络结构,而节点服务器和城域服务器下控制的网络可以是树型、星型、环状等各种结构。It can be seen that the entire Vision Network is a layered centralized control network structure, while the network controlled by the node server and the metro server can be in various structures such as tree, star, and ring.
形象地称,接入网部分可以组成统一视频平台(虚线圈中部分),多个统一视频平台可以组成视联网;每个统一视频平台可以通过城域以及广域视联网互联互通。Vividly speaking, the access network part can form a unified video platform (the part in the dotted circle), and multiple unified video platforms can form a video network; each unified video platform can be interconnected through the metropolitan area and the wide area video network.
视联网设备分类Classification of Internet of Things devices
1.1本发明实施例的视联网中的设备主要可以分为3类:服务器,交换机(包括以太网协转网关),终端(包括各种机顶盒,编码板,存储器等)。视联网整体上可以分为城域网(或者国家网、全球网等)和接入网。1.1 The equipment in the video network of the embodiment of the present invention can be mainly divided into three categories: servers, switches (including Ethernet protocol conversion gateways), terminals (including various set-top boxes, encoding boards, memory, etc.). As a whole, the Internet of Things can be divided into a metropolitan area network (or a national network, a global network, etc.) and an access network.
1.2其中接入网部分的设备主要可以分为3类:节点服务器,接入交换机(包括以太网协转网关),终端(包括各种机顶盒,编码板,存储器等)。1.2 The equipment in the access network can be mainly divided into three categories: node server, access switch (including Ethernet protocol conversion gateway), terminal (including various set-top boxes, encoding boards, storage, etc.).
各接入网设备的具体硬件结构为:The specific hardware structure of each access network device is:
节点服务器:Node server:
如图2所示,主要包括网络接口模块201、交换引擎模块202、CPU模块203、磁盘阵列模块204;As shown in Figure 2, it mainly includes a
其中,网络接口模块201、CPU模块203、磁盘阵列模块204进来的包均进入交换引擎模块202;交换引擎模块202对进来的包进行查地址表205的操作,从而获得包的导向信息;并根据包的导向信息把该包存入对应的包缓存器206的队列;如果包缓存器206的队列接近满,则丢弃;交换引擎模块202轮询所有包缓存器队列,如果满足以下条件进行转发:1)该端口发送缓存未满;2)该队列包计数器大于零。磁盘阵列模块204主要实现对硬盘的控制,包括对硬盘的初始化、读写等操作;CPU模块203主要负责与接入交换机、终端(图中未示出)之间的协议处理,对地址表205(包括下行协议包地址表、上行协议包地址表、数据包地址表)的配置,以及,对磁盘阵列模块204的配置。Wherein, the bag that network
接入交换机:Access switch:
如图3所示,主要包括网络接口模块(下行网络接口模块301、上行网络接口模块302)、交换引擎模块303和CPU模块304;As shown in Figure 3, mainly comprise network interface module (downlink
其中,下行网络接口模块301进来的包(上行数据)进入包检测模块305;包检测模块305检测包的目地地址(DA)、源地址(SA)、数据包类型及包长度是否符合要求,如果符合,则分配相应的流标识符(stream-id),并进入交换引擎模块303,否则丢弃;上行网络接口模块302进来的包(下行数据)进入交换引擎模块303;CPU模块304进来的数据包进入交换引擎模块303;交换引擎模块303对进来的包进行查地址表306的操作,从而获得包的导向信息;如果进入交换引擎模块303的包是下行网络接口往上行网络接口去的,则结合流标识符(stream-id)把该包存入对应的包缓存器307的队列;如果该包缓存器307的队列接近满,则丢弃;如果进入交换引擎模块303的包不是下行网络接口往上行网络接口去的,则根据包的导向信息,把该数据包存入对应的包缓存器307的队列;如果该包缓存器307的队列接近满,则丢弃。Wherein, the packet (upstream data) that the downstream network interface module 301 comes in enters the packet detection module 305; Whether the destination address (DA), source address (SA), data packet type and packet length of the packet detection module 305 detection packet meet the requirements, if Meet, then distribute corresponding flow identifier (stream-id), and enter switching engine module 303, otherwise discard; The packet (downstream data) that upstream network interface module 302 comes in enters switching engine module 303; The data packet that CPU module 304 comes in Enter switching engine module 303; Switching engine module 303 carries out the operation of looking into address table 306 to the bag that comes in, thereby obtains the guiding information of packet; If the bag that enters switching engine module 303 is that downlink network interface goes to uplink network interface, then combines Flow identifier (stream-id) stores this packet into the queue of corresponding packet cache 307; If the queue of this packet cache 307 is close to full, then discards; If the packet that enters switching engine module 303 is not downlink network interface, goes up If the data packet is sent to the network interface, the data packet is stored in the queue of the corresponding packet buffer 307 according to the direction information of the packet; if the queue of the packet buffer 307 is nearly full, it is discarded.
交换引擎模块303轮询所有包缓存器队列,可以包括两种情形:The switching
如果该队列是下行网络接口往上行网络接口去的,则满足以下条件进行转发:1)该端口发送缓存未满;2)该队列包计数器大于零;3)获得码率控制模块产生的令牌;If the queue goes from the downlink network interface to the uplink network interface, the following conditions are met for forwarding: 1) the port sending buffer is not full; 2) the queue packet counter is greater than zero; 3) the token generated by the code rate control module is obtained ;
如果该队列不是下行网络接口往上行网络接口去的,则满足以下条件进行转发:1)该端口发送缓存未满;2)该队列包计数器大于零。If the queue does not go from the downlink network interface to the uplink network interface, the following conditions are met for forwarding: 1) the sending buffer of the port is not full; 2) the packet counter of the queue is greater than zero.
码率控制模块308是由CPU模块304来配置的,在可编程的间隔内对所有下行网络接口往上行网络接口去的包缓存器队列产生令牌,用以控制上行转发的码率。The code
CPU模块304主要负责与节点服务器之间的协议处理,对地址表306的配置,以及,对码率控制模块308的配置。The
以太网协转网关: Ethernet protocol conversion gateway :
如图4所示,主要包括网络接口模块(下行网络接口模块401、上行网络接口模块402)、交换引擎模块403、CPU模块404、包检测模块405、码率控制模块408、地址表406、包缓存器407和MAC添加模块409、MAC删除模块410。As shown in Figure 4, it mainly includes network interface modules (downlink
其中,下行网络接口模块401进来的数据包进入包检测模块405;包检测模块405检测数据包的以太网MAC DA、以太网MAC SA、以太网length or frame type、视联网目地地址DA、视联网源地址SA、视联网数据包类型及包长度是否符合要求,如果符合则分配相应的流标识符(stream-id);然后,由MAC删除模块410减去MAC DA、MAC SA、length or frame type(2byte),并进入相应的接收缓存,否则丢弃;Wherein, the data packet coming in from the downlink
下行网络接口模块401检测该端口的发送缓存,如果有包则根据包的视联网目地地址DA获知对应的终端的以太网MAC DA,添加终端的以太网MAC DA、以太网协转网关的MACSA、以太网length or frame type,并发送。The downlink
以太网协转网关中其他模块的功能与接入交换机类似。The functions of other modules in the Ethernet protocol conversion gateway are similar to those of the access switch.
终端:terminal:
主要包括网络接口模块、业务处理模块和CPU模块;例如,机顶盒主要包括网络接口模块、视音频编解码引擎模块、CPU模块;编码板主要包括网络接口模块、视音频编码引擎模块、CPU模块;存储器主要包括网络接口模块、CPU模块和磁盘阵列模块。It mainly includes a network interface module, a business processing module and a CPU module; for example, a set-top box mainly includes a network interface module, an video and audio codec engine module, and a CPU module; an encoding board mainly includes a network interface module, an video and audio encoding engine module, and a CPU module; It mainly includes network interface module, CPU module and disk array module.
1.3城域网部分的设备主要可以分为2类:节点服务器,节点交换机,城域服务器。其中,节点交换机主要包括网络接口模块、交换引擎模块和CPU模块;城域服务器主要包括网络接口模块、交换引擎模块和CPU模块构成。1.3 The equipment of the metropolitan area network can be mainly divided into two categories: node server, node switch, and metropolitan area server. Among them, the node switch mainly includes a network interface module, a switching engine module and a CPU module; the metro server mainly includes a network interface module, a switching engine module and a CPU module.
2、视联网数据包定义2. Definition of Internet of Vision data packets
2.1接入网数据包定义2.1 Definition of access network data packet
接入网的数据包主要包括以下几部分:目的地址(DA)、源地址(SA)、保留字节、payload(PDU)、CRC。The data packet of the access network mainly includes the following parts: destination address (DA), source address (SA), reserved bytes, payload (PDU), and CRC.
如下表所示,接入网的数据包主要包括以下几部分:As shown in the table below, the data packets of the access network mainly include the following parts:
其中:in:
目的地址(DA)由8个字节(byte)组成,第一个字节表示数据包的类型(例如各种协议包、组播数据包、单播数据包等),最多有256种可能,第二字节到第六字节为城域网地址,第七、第八字节为接入网地址;The destination address (DA) consists of 8 bytes (byte), the first byte indicates the type of data packet (such as various protocol packets, multicast data packets, unicast data packets, etc.), there are up to 256 possibilities, The second byte to the sixth byte is the address of the metropolitan area network, and the seventh and eighth bytes are the address of the access network;
源地址(SA)也是由8个字节(byte)组成,定义与目的地址(DA)相同;The source address (SA) is also composed of 8 bytes (byte), and the definition is the same as that of the destination address (DA);
保留字节由2个字节组成;Reserved bytes consist of 2 bytes;
payload部分根据不同的数据报的类型有不同的长度,如果是各种协议包的话是64个字节,如果是单组播数据包话是32+1024=1056个字节,当然并不仅仅限于以上2种;The payload part has different lengths according to different datagram types. If it is a variety of protocol packets, it is 64 bytes. If it is a single multicast data packet, it is 32+1024=1056 bytes. Of course, it is not limited to Above 2 types;
CRC有4个字节组成,其计算方法遵循标准的以太网CRC算法。CRC consists of 4 bytes, and its calculation method follows the standard Ethernet CRC algorithm.
2.2城域网数据包定义2.2 MAN packet definition
城域网的拓扑是图型,两个设备之间可能有2种、甚至2种以上的连接,即节点交换机和节点服务器、节点交换机和节点交换机、节点交换机和节点服务器之间都可能超过2种连接。但是,城域网设备的城域网地址却是唯一的,为了精确描述城域网设备之间的连接关系,在本发明实施例中引入参数:标签,来唯一描述一个城域网设备。The topology of the metropolitan area network is a graph. There may be two or even more than two types of connections between two devices, that is, there may be more than 2 connections between node switches and node servers, node switches and node switches, and node switches and node servers. kind of connection. However, the MAN address of the MAN device is unique. In order to accurately describe the connection relationship between MAN devices, a parameter: label is introduced in the embodiment of the present invention to uniquely describe a MAN device.
本说明书中标签的定义和MPLS(Multi-Protocol Label Switch,多协议标签交换)的标签的定义类似,假设设备A和设备B之间有两个连接,那么数据包从设备A到设备B就有2个标签,数据包从设备B到设备A也有2个标签。标签分入标签、出标签,假设数据包进入设备A的标签(入标签)是0x0000,这个数据包离开设备A时的标签(出标签)可能就变成了0x0001。城域网的入网流程是集中控制下的入网过程,也就意味着城域网的地址分配、标签分配都是由城域服务器主导的,节点交换机、节点服务器都是被动的执行而已,这一点与MPLS的标签分配是不同的,MPLS的标签分配是交换机、服务器互相协商的结果。The definition of labels in this manual is similar to the definition of labels in MPLS (Multi-Protocol Label Switch, Multi-Protocol Label Switching). Assuming that there are two connections between device A and device B, then the data packets from device A to device B have 2 labels, the packet from device B to device A also has 2 labels. The label is divided into an incoming label and an outgoing label. Assuming that the label (incoming label) of the data packet entering device A is 0x0000, the label (outgoing label) of the data packet when it leaves device A may become 0x0001. The network access process of the metropolitan area network is a network access process under centralized control, which means that the address allocation and label allocation of the metropolitan area network are all dominated by the metropolitan area server, and the node switches and node servers are all passively executed. Different from MPLS label allocation, MPLS label allocation is the result of mutual negotiation between switches and servers.
如下表所示,城域网的数据包主要包括以下几部分:As shown in the table below, the data packet of the MAN mainly includes the following parts:
即目的地址(DA)、源地址(SA)、保留字节(Reserved)、标签、payload(PDU)、CRC。其中,标签的格式可以参考如下定义:标签是32bit,其中高16bit保留,只用低16bit,它的位置是在数据包的保留字节和payload之间。That is, destination address (DA), source address (SA), reserved byte (Reserved), label, payload (PDU), and CRC. Among them, the format of the label can refer to the following definition: the label is 32bit, of which the high 16bit is reserved, and only the low 16bit is used, and its position is between the reserved byte of the data packet and the payload.
参考图5,示出了本发明实施例的一种认证方法的步骤流程图,所述方法可以应用于视联网,视联网中可以包括终端和节点服务器,终端上设置有第一U-Key,终端可以与节点服务器通信连接。该认证方法具体可以包括如下步骤:Referring to FIG. 5 , it shows a flow chart of steps of an authentication method according to an embodiment of the present invention. The method can be applied to the Internet of Vision, which can include a terminal and a node server, and the terminal is provided with a first U-Key. The terminal can communicate with the node server. The authentication method may specifically include the following steps:
步骤501,节点服务器接收来自终端的第一认证请求信息。
在本发明实施例中,终端上可以预先安装有视频会议客户端应用程序,即终端可以作为视频会议客户端。终端可以生成第一认证请求信息,并通过视联网发送第一认证请求信息至节点服务器。节点服务器上可以预先安装有视频会议服务器端应用程序,即节点服务器可以作为视频会议服务器端。In the embodiment of the present invention, a video conference client application program may be pre-installed on the terminal, that is, the terminal may serve as a video conference client. The terminal may generate the first authentication request information, and send the first authentication request information to the node server through the Internet of Things. A video conference server application program may be pre-installed on the node server, that is, the node server may serve as a video conference server.
为了提高视频会议的安全性,终端上可以设置有第一U-Key。可以理解为,在设置有第一U-Key的终端上才可以登录至节点服务器。第一U-Key的标识信息可以为第一U-Key的身份信息,用于唯一确定第一U-Key。U-Key的全称为USB Key。它是一种USB接口的硬件存储设备。USB Key的模样跟普通的U盘差不多,不同的是它里面存放了单片机或智能卡芯片,USB Key有一定的存储空间,可以存储用户的私钥以及数字证书,利用USB Key内置的公钥算法可以实现对用户身份的认证。In order to improve the security of the video conference, a first U-Key may be set on the terminal. It can be understood that the node server can only be logged in on the terminal provided with the first U-Key. The identification information of the first U-Key may be identity information of the first U-Key, and is used to uniquely determine the first U-Key. The full name of U-Key is USB Key. It is a hardware storage device with USB interface. The appearance of the USB Key is similar to that of an ordinary U disk. The difference is that it stores a single-chip microcomputer or a smart card chip. The USB Key has a certain storage space and can store the user's private key and digital certificate. Using the built-in public key algorithm of the USB Key can Realize the authentication of user identity.
在本发明实施例中,第一认证请求信息可以包括用户在终端上输入的用户名以及第一U-Key的标识信息。除此之外,第一认证请求信息还可以包括:终端随机生成的第一随机数据、终端的标识信息和加密证书数据。其中,加密证书数据中可以包括公钥。In this embodiment of the present invention, the first authentication request information may include the user name input by the user on the terminal and the identification information of the first U-Key. In addition, the first authentication request information may further include: first random data randomly generated by the terminal, identification information of the terminal, and encrypted certificate data. Wherein, the encrypted certificate data may include a public key.
步骤502,节点服务器根据用户名和预设的用户名与U-Key之间的绑定关系查询得到与用户名对应的第二U-Key的标识信息。
在本发明实施例中,节点服务器上可以预先设置有用户名与U-Key之间的绑定关系,该绑定关系可以通过用户名与U-Key的标识信息之间的一一对应关系体现。节点服务器接收到第一认证请求信息之后,可以在用户名与U-Key之间的绑定关系中查找与第一认证请求信息中的用户名具有一一对应关系的第二U-Key的标识信息。进而,节点服务器可以将查找到的第二U-Key的标识信息与第一认证请求信息中的第一U-Key的标识信息进行比对,若第二U-Key的标识信息与第一U-Key的标识信息相同,则表示第二U-Key与第一U-Key为同一个U-Key。可以理解为,终端上设置的第一U-Key为与终端上的用户名具有一一对应关系的U-Key。In the embodiment of the present invention, the binding relationship between the user name and the U-Key can be preset on the node server, and the binding relationship can be reflected by the one-to-one correspondence between the user name and the identification information of the U-Key . After receiving the first authentication request information, the node server can search for the identifier of the second U-Key that has a one-to-one correspondence with the username in the first authentication request information in the binding relationship between the user name and the U-Key information. Furthermore, the node server may compare the found identification information of the second U-Key with the identification information of the first U-Key in the first authentication request information, if the identification information of the second U-Key is the same as that of the first U-Key - if the identification information of the Key is the same, it means that the second U-Key and the first U-Key are the same U-Key. It can be understood that the first U-Key set on the terminal is a U-Key that has a one-to-one correspondence with the user name on the terminal.
在本发明的一种优选实施例中,节点服务器接收到第一认证请求信息之后,除了可以查询得到与用户名对应的第二U-Key的标识信息之外,还可以根据用户名和预设的用户名和口令之间的绑定关系查询得到与用户名对应的口令信息。节点服务器上除了可以预先设置有用户名与U-Key之间的绑定关系之外,还可以设置有用户名与口令之间的绑定关系。节点服务器接收到第一认证请求信息之后,可以在用户名与口令之间的绑定关系中查找与第一认证请求信息中的用户名具有一一对应关系的口令信息。In a preferred embodiment of the present invention, after the node server receives the first authentication request information, in addition to querying to obtain the identification information of the second U-Key corresponding to the user name, it can also use the user name and the preset The binding relationship between the user name and the password is queried to obtain the password information corresponding to the user name. In addition to the binding relationship between the user name and the U-Key, the binding relationship between the user name and the password can also be set on the node server. After receiving the first authentication request information, the node server may search the binding relationship between the user name and the password for password information having a one-to-one correspondence with the user name in the first authentication request information.
步骤503,节点服务器在第一U-Key的标识信息与第二U-Key的标识信息相同时,生成并发送第一认证响应信息至终端。Step 503, when the identification information of the first U-Key is the same as the identification information of the second U-Key, the node server generates and sends first authentication response information to the terminal.
在本发明实施例中,在终端上设置的第一U-Key为与用户名一一对应的U-Key时,节点服务器可以生成第一认证响应信息,并发送第一认证响应信息至终端。In the embodiment of the present invention, when the first U-Key set on the terminal is a U-Key corresponding to a user name one-to-one, the node server may generate first authentication response information and send the first authentication response information to the terminal.
在实际应用中,节点服务器在生成第一认证响应信息时,可以生成第二随机数据和对称密钥,从第一认证请求信息中的加密证书数据中提取得到公钥,并利用公钥对生成的对称密钥进行加密,再利用预设的第一签名证书中的私钥对第一随机数据、第二随机数据、加密后的对称密钥、节点服务器的标识信息和终端的标识信息进行签名得到第一签名信息,然后将第一随机数据、第二随机数据、加密后的对称密钥、终端的标识信息、节点服务器的标识信息、第一签名信息和第一签名证书确定为第一认证响应信息。In practical applications, when the node server generates the first authentication response information, it can generate the second random data and the symmetric key, extract the public key from the encrypted certificate data in the first authentication request information, and use the public key pair to generate Encrypt the symmetric key, and then use the private key in the preset first signature certificate to sign the first random data, the second random data, the encrypted symmetric key, the identification information of the node server and the identification information of the terminal Obtain the first signature information, and then determine the first random data, the second random data, the encrypted symmetric key, the identification information of the terminal, the identification information of the node server, the first signature information and the first signature certificate as the first authentication Response message.
在本发明实施例中,终端接收到第一认证响应信息之后,可以对第一认证响应信息进行一系列处理,生成第二认证请求信息,进而将第二认证请求信息发送至节点服务器。终端在对第一认证响应信息进行一系列处理时,可以利用第一认证响应信息中的第一签名证书的公钥对第一认证响应信息中的第一随机数据和终端的标识信息进行验签,以验证第一随机数据和终端的标识信息未被篡改,证明第一认证响应信息来源于节点服务器。在验签通过的情况下,终端利用预设的私钥对加密后的对称密钥进行解密得到对称密钥。该预设的私钥可以为与加密证书数据中的公钥成对的私钥,可以理解为,只有该预设的私钥才可以对加密后的对称密钥进行解密。终端在解密得到对称密钥之后,可以利用对称密钥对用户名的密码信息进行加密得到加密后的密码信息。终端再利用预设的第二签名证书中的私钥对第一随机数据、第二随机数据和节点服务器的标识信息进行签名得到第二签名信息,进而将第一随机数据、第二随机数据、加密后的密码信息、终端的标识信息、节点服务器的标识信息、第二签名信息和第二签名证书作为第二认证请求信息。In the embodiment of the present invention, after receiving the first authentication response information, the terminal may perform a series of processing on the first authentication response information to generate the second authentication request information, and then send the second authentication request information to the node server. When the terminal performs a series of processing on the first authentication response information, it can use the public key of the first signature certificate in the first authentication response information to verify the first random data in the first authentication response information and the identification information of the terminal , to verify that the first random data and the identification information of the terminal have not been tampered with, and prove that the first authentication response information comes from the node server. When the signature verification is passed, the terminal uses the preset private key to decrypt the encrypted symmetric key to obtain the symmetric key. The preset private key may be a private key paired with the public key in the encrypted certificate data, and it can be understood that only the preset private key can decrypt the encrypted symmetric key. After decrypting to obtain the symmetric key, the terminal may use the symmetric key to encrypt the password information of the user name to obtain encrypted password information. The terminal then uses the private key in the preset second signature certificate to sign the first random data, the second random data, and the identification information of the node server to obtain the second signature information, and then the first random data, the second random data, The encrypted password information, the identification information of the terminal, the identification information of the node server, the second signature information and the second signature certificate are used as the second authentication request information.
步骤504,节点服务器对第二认证请求信息进行认证,并将认证结果返回至终端。
在本发明实施例中,节点服务器在接收到第二认证请求信息之后,可以利用第二签名证书中的公钥对第二认证请求信息中的节点服务器的标识信息和第二随机数据进行验签,以验证节点服务器的标识信息和第二随机数据未被篡改,证明第二认证请求信息来源于终端。在验签通过的情况下,节点服务器可以利用对称密钥对加密后的密码信息进行解密,得到用户名的密码信息。进而,节点服务器将解密得到的密码信息与上述查找得到的口令信息进行比对,若密码信息与口令信息一致,则表示节点服务器对第二认证请求信息认证通过,即允许终端利用输入的用户名和密码信息登录至节点服务器,可以向终端发送表示认证通过的认证结果;若密码信息与口令信息不一致,则表示节点服务器对第二认证请求信息认证未通过,即禁止终端利用输入的用户名和密码信息登录至节点服务器,可以向终端发送表示认证未通过的认证结果。In the embodiment of the present invention, after receiving the second authentication request information, the node server can use the public key in the second signature certificate to verify the identity information of the node server and the second random data in the second authentication request information , to verify that the identification information of the node server and the second random data have not been tampered with, and prove that the second authentication request information originates from the terminal. When the signature verification is passed, the node server can use the symmetric key to decrypt the encrypted password information to obtain the password information of the user name. Furthermore, the node server compares the decrypted password information with the password information obtained from the search above. If the password information is consistent with the password information, it means that the node server has passed the authentication of the second authentication request information, that is, the terminal is allowed to use the input user name and password. The password information is logged into the node server, and an authentication result indicating that the authentication is passed can be sent to the terminal; if the password information is inconsistent with the password information, it means that the node server fails to authenticate the second authentication request information, that is, the terminal is prohibited from using the input user name and password information. After logging in to the node server, an authentication result indicating that the authentication failed can be sent to the terminal.
基于上述关于一种认证方法的相关说明,下面介绍一种基于视联网的视频会议的用户登录认证方法。如图6所示,视频会议的客户端上安装有应用程序Pamir,该应用程序Pamir用于控制视频会议。应用程序Pamir生成随机数RB之后,将客户端上的U-Key的ID、用户名、随机数RB、客户端的IDB和加密证书数据发送至服务器。服务器接收到U-Key的ID、用户名、随机数RB、客户端的IDB和加密证书数据之后,根据用户名查找到与用户名绑定的U-Key的ID和密码信息。如果与用户名绑定的U-Key的ID与客户端上的U-Key的ID相匹配,服务器生成随机数RA和对称密钥S1。服务器从加密证书数据中提取出公钥PKB,然后利用公钥PKB加密对称密钥S1得到E(PKB+S1)。服务器再使用服务器端的签名证书对随机数RA、随机数RB、E(PKB+S1)、客户端的IDB、服务器的IDA进行签名得到sign(RA+RB+E(PKB+S1)+IDA+IDB),然后将随机数RA、随机数RB、E(PKB+S1)、客户端的IDB、服务器的IDA、sign(RA+RB+E(PKB+S1)+IDA+IDB)和服务器端的签名证书发送至客户端。客户端使用服务器端的签名证书验签随机数RB和客户端的IDB,使用本地私钥对E(PKB+S1)解密得到对称密钥S1,然后使用对称密钥S1对登录口令进行加密得到E(S1+登录口令),再使用客户端的签名证书对随机数RB、随机数RA和服务器的IDA进行签名得到sign(RB+RA+IDA),将随机数RB、随机数RA、E(S1+登录口令)、服务器的IDA、sign(RB+RA+IDA)和客户端的签名证书发送至服务器。服务器对随机数RA和服务器的IDA进行验签通过后,验证口令信息与密码信息是否一致,并将包含验证通过或验证未通过的验证结果返回至客户端。Based on the above description about an authentication method, a user login authentication method for a video conference based on the Internet of Vision is introduced below. As shown in FIG. 6 , an application program Pamir is installed on the video conference client, and the application program Pamir is used to control the video conference. After the application program Pamir generates the random number RB, it sends the U-Key ID, user name, random number RB, client's IDB and encrypted certificate data on the client to the server. After receiving the U-Key's ID, user name, random number RB, client's IDB and encrypted certificate data, the server finds the U-Key's ID and password information bound to the user name according to the user name. If the ID of the U-Key bound to the username matches the ID of the U-Key on the client, the server generates a random number RA and a symmetric key S1. The server extracts the public key PKB from the encrypted certificate data, and then uses the public key PKB to encrypt the symmetric key S1 to obtain E(PKB+S1). The server then uses the signature certificate on the server side to sign the random number RA, random number RB, E(PKB+S1), the client's IDB, and the server's IDA to obtain sign(RA+RB+E(PKB+S1)+IDA+IDB) , and then send the random number RA, random number RB, E(PKB+S1), IDB of the client, IDA of the server, sign(RA+RB+E(PKB+S1)+IDA+IDB) and the signature certificate of the server to client. The client uses the server-side signature certificate to verify the random number RB and the client's IDB, uses the local private key to decrypt E(PKB+S1) to obtain the symmetric key S1, and then uses the symmetric key S1 to encrypt the login password to obtain E(S1+ login password), and then use the signature certificate of the client to sign the random number RB, random number RA, and server’s IDA to obtain sign(RB+RA+IDA), and use the random number RB, random number RA, E(S1+login password), The server's IDA, sign(RB+RA+IDA) and the client's signature certificate are sent to the server. After the server passes the signature verification of the random number RA and the server's IDA, it verifies whether the password information is consistent with the password information, and returns a verification result including verification passed or verification failed to the client.
本发明实施例提供的一种认证方案,应用于视联网中,该视联网可以包括终端和节点服务器。终端可以作为视频会议客户端,终端上设置有第一U-Key,节点服务器可以作为食品会议服务器,终端与节点服务器可以通过连接。An authentication scheme provided by an embodiment of the present invention is applied to a video network, and the video network may include a terminal and a node server. The terminal can be used as a video conferencing client, the terminal is provided with a first U-Key, the node server can be used as a food conference server, and the terminal and the node server can be connected through.
在本发明实施例中,终端向节点服务器发送第一认证请求信息,该第一认证请求信息中可以包括用户名和第一U-key的标识信息。节点服务器从预设的用户名与U-Key之间的绑定关系中查找到与第一请求认证信息中的用户名对应第二U-Key的标识信息,进而将第一U-Key的标识信息与第二U-Key的标识信息进行比较,若第一U-Key的标识信息与第二U-Key的标识信息相同,则生成并发送第一认证响应信息至终端。终端根据第一认证响应信息生成包括密码信息的第二认证请求信息,并发送第二认证请求信息至节点服务器。节点服务器对第二认证请求信息进行认证,并将认证结果返回至终端。In the embodiment of the present invention, the terminal sends the first authentication request information to the node server, and the first authentication request information may include the user name and the identification information of the first U-key. The node server finds the identification information of the second U-Key corresponding to the user name in the first request authentication information from the preset binding relationship between the user name and the U-Key, and then uses the identification information of the first U-Key The information is compared with the identification information of the second U-Key, and if the identification information of the first U-Key is the same as the identification information of the second U-Key, first authentication response information is generated and sent to the terminal. The terminal generates second authentication request information including password information according to the first authentication response information, and sends the second authentication request information to the node server. The node server authenticates the second authentication request information, and returns the authentication result to the terminal.
在本发明实施例中,一方面,终端在向节点服务器发送认证请求信息时,以加密的形式发送密码信息,提高了密码信息的安全性。另一方面,终端在第一认证请求信息中将用户名发送至节点服务器,终端在第二认证请求信息中将密码信息发送至节点服务器。终端将用户名和密码信息分开发送至节点服务器,降低了用户名和密码信息同时被截获的几率。再一方面,终端在将第一认证请求信息发送至节点服务器之后,节点服务器判断第一认证请求信息中的U-Key的标识信息与用户名绑定的U-Key的标识信息是否相同,若第一认证请求信息中的U-Key的标识信息与用户名绑定的U-Key的标识信息相同,则向终端返回第一认证响应信息。即在第一认证请求信息中的U-Key的标识信息与用户名绑定的U-Key的标识信息相同的情况下,终端根据第一认证响应信息向节点服务器发送包含密码信息的第二认证请求信息。通过节点服务器对U-Key的标识信息的验证,提高了密码信息的安全性。In the embodiment of the present invention, on the one hand, when the terminal sends the authentication request information to the node server, it sends the password information in an encrypted form, which improves the security of the password information. On the other hand, the terminal sends the user name to the node server in the first authentication request information, and the terminal sends the password information to the node server in the second authentication request information. The terminal sends the user name and password information to the node server separately, reducing the probability of the user name and password information being intercepted at the same time. On the other hand, after the terminal sends the first authentication request information to the node server, the node server judges whether the identification information of the U-Key in the first authentication request information is the same as the identification information of the U-Key bound to the user name, if The identification information of the U-Key in the first authentication request information is the same as the identification information of the U-Key bound to the user name, and the first authentication response information is returned to the terminal. That is, if the identification information of the U-Key in the first authentication request information is the same as the identification information of the U-Key bound to the user name, the terminal sends a second authentication message containing password information to the node server according to the first authentication response information. request information. Through the node server's verification of the identification information of the U-Key, the security of the password information is improved.
需要说明的是,对于方法实施例,为了简单描述,故将其都表述为一系列的动作组合,但是本领域技术人员应该知悉,本发明实施例并不受所描述的动作顺序的限制,因为依据本发明实施例,某些步骤可以采用其他顺序或者同时进行。其次,本领域技术人员也应该知悉,说明书中所描述的实施例均属于优选实施例,所涉及的动作并不一定是本发明实施例所必须的。It should be noted that, for the method embodiment, for the sake of simple description, it is expressed as a series of action combinations, but those skilled in the art should know that the embodiment of the present invention is not limited by the described action sequence, because According to the embodiment of the present invention, certain steps may be performed in other orders or simultaneously. Secondly, those skilled in the art should also know that the embodiments described in the specification belong to preferred embodiments, and the actions involved are not necessarily required by the embodiments of the present invention.
参考图7,示出了本发明实施例的一种认证系统,所述系统应用于视联网,所述视联网中包括终端和节点服务器,所述终端上设置有第一U-Key,所述终端与所述节点服务器通信连接;所述节点服务器可以包括如下模块:Referring to FIG. 7 , it shows an authentication system according to an embodiment of the present invention. The system is applied to the Internet of Vision, and the Internet of Vision includes a terminal and a node server. The terminal is provided with a first U-Key, and the The terminal communicates with the node server; the node server may include the following modules:
接收模块701,用于接收来自所述终端的第一认证请求信息,所述第一认证请求信息包括用户名和所述第一U-Key的标识信息;查询模块702,用于根据所述用户名和预设的用户名与U-Key之间的绑定关系查询得到与所述用户名对应的第二U-Key的标识信息;响应模块703,用于在所述第一U-Key的标识信息与所述第二U-Key的标识信息相同时,生成并发送第一认证响应信息至所述终端;所述终端用于根据所述第一认证响应信息生成第二认证请求信息,并发送所述第二认证请求信息至所述节点服务器,所述第二认证请求信息包括加密后的密码信息;认证模块704,用于对所述第二认证请求信息进行认证,并将认证结果返回至所述终端。The receiving
可选地,所述第一认证请求信息还包括第一随机数据、加密证书数据和所述终端的标识信息;所述响应模块703,包括:生成模块7031,用于生成第二随机数据和对称密钥;加密模块7032,用于从所述加密证书数据中提取得到公钥,并利用所述公钥对所述对称密钥进行加密;签名模块7033,用于利用预设的第一签名证书对所述第一随机数据、所述第二随机数据、加密后的对称密钥、所述节点服务器的标识信息和所述终端的标识信息进行签名,得到第一签名信息;确定模块7034,用于将所述第一随机数据、所述第二随机数据、加密后的对称密钥、所述终端的标识信息、所述节点服务器的标识信息、所述第一签名信息和所述第一签名证书确定为所述第一认证响应信息。Optionally, the first authentication request information further includes first random data, encrypted certificate data, and identification information of the terminal; the
可选地,所述终端用于根据所述第一签名证书对所述第一认证响应信息中的所述第一随机数据和所述所述终端的标识信息进行验签,并在验签通过的情况下利用预设的私钥对加密后的对称密钥进行解密得到所述对称密钥,利用所述对称密钥对所述密码信息进行加密,利用预设的第二签名证书对所述第一随机数据、所述第二随机数据和所述节点服务器的标识信息进行签名,得到第二签名信息,将所述第一随机数据、所述第二随机数据、加密后的密码信息、所述终端的标识信息、所述节点服务器的标识信息、所述第二签名信息和所述第二签名证书确定为所述第二认证请求信息。Optionally, the terminal is configured to perform signature verification on the first random data in the first authentication response information and the identification information of the terminal according to the first signature certificate, and when the verification passes In the case of using the preset private key to decrypt the encrypted symmetric key to obtain the symmetric key, use the symmetric key to encrypt the password information, and use the preset second signature certificate to encrypt the Sign the first random data, the second random data, and the identification information of the node server to obtain second signature information, and use the first random data, the second random data, encrypted password information, and the The identification information of the terminal, the identification information of the node server, the second signature information, and the second signature certificate are determined as the second authentication request information.
所述查询模块702,还用于在所述接收模块接收来自所述终端的第一认证请求信息之后,根据所述用户名和预设的用户名与口令之间的绑定关系查询得到与所述用户名对应的口令信息;The
所述认证模块704,包括:验签模块7041,用于利用所述第二签名证书对所述第二认证请求信息中的所述节点服务器的标识信息和所述第二随机数据进行验签;比对模块7042,用于在验签通过的情况下利用所述对称密钥对加密后的密码信息进行解密,得到所述密码信息,并将所述口令信息与所述密码信息进行比对。The
对于认证系统实施例而言,由于其与认证方法实施例基本相似,所以描述的比较简单,相关之处参见认证方法实施例的部分说明即可。As for the embodiment of the authentication system, because it is basically similar to the embodiment of the authentication method, the description is relatively simple, and for the related parts, please refer to the part of the description of the embodiment of the authentication method.
本发明实施例还提供了一种装置,包括:The embodiment of the present invention also provides a device, including:
一个或多个处理器;和one or more processors; and
其上存储有指令的一个或多个机器可读介质,当由所述一个或多个处理器执行时,使得所述装置执行如本发明实施例所述的一个或多个的认证方法。One or more machine-readable media having instructions stored thereon, when executed by the one or more processors, enables the device to execute one or more authentication methods as described in the embodiments of the present invention.
本发明实施例还提供了一种计算机可读存储介质,其存储的计算机程序使得处理器执行如本发明实施例所述的认证方法。The embodiment of the present invention also provides a computer-readable storage medium, the computer program stored in it causes the processor to execute the authentication method as described in the embodiment of the present invention.
本说明书中的各个实施例均采用递进的方式描述,每个实施例重点说明的都是与其他实施例的不同之处,各个实施例之间相同相似的部分互相参见即可。Each embodiment in this specification is described in a progressive manner, each embodiment focuses on the difference from other embodiments, and the same and similar parts of each embodiment can be referred to each other.
本领域内的技术人员应明白,本发明实施例的实施例可提供为方法、装置、或计算机程序产品。因此,本发明实施例可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本发明实施例可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。Those skilled in the art should understand that the embodiments of the present invention may be provided as methods, devices, or computer program products. Accordingly, embodiments of the invention may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, embodiments of the invention may take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
本发明实施例是参照根据本发明实施例的方法、终端设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理终端设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理终端设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。Embodiments of the present invention are described with reference to flowcharts and/or block diagrams of methods, terminal devices (systems), and computer program products according to embodiments of the present invention. It should be understood that each procedure and/or block in the flowchart and/or block diagram, and a combination of procedures and/or blocks in the flowchart and/or block diagram can be realized by computer program instructions. These computer program instructions may be provided to a general purpose computer, special purpose computer, embedded processor or processor of other programmable data processing terminal equipment to produce a machine such that instructions executed by the computer or processor of other programmable data processing terminal equipment Produce means for realizing the functions specified in one or more procedures of the flowchart and/or one or more blocks of the block diagram.
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理终端设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。These computer program instructions may also be stored in a computer-readable memory capable of directing a computer or other programmable data processing terminal to operate in a specific manner, such that the instructions stored in the computer-readable memory produce an article of manufacture comprising instruction means, the The instruction means implements the functions specified in one or more procedures of the flowchart and/or one or more blocks of the block diagram.
这些计算机程序指令也可装载到计算机或其他可编程数据处理终端设备上,使得在计算机或其他可编程终端设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程终端设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。These computer program instructions can also be loaded into a computer or other programmable data processing terminal equipment, so that a series of operational steps are performed on the computer or other programmable terminal equipment to produce computer-implemented processing, thereby The instructions executed above provide steps for implementing the functions specified in one or more procedures of the flowchart and/or one or more blocks of the block diagram.
尽管已描述了本发明实施例的优选实施例,但本领域内的技术人员一旦得知了基本创造性概念,则可对这些实施例做出另外的变更和修改。所以,所附权利要求意欲解释为包括优选实施例以及落入本发明实施例范围的所有变更和修改。Having described preferred embodiments of embodiments of the present invention, additional changes and modifications to these embodiments can be made by those skilled in the art once the basic inventive concept is appreciated. Therefore, the appended claims are intended to be construed to cover the preferred embodiment and all changes and modifications which fall within the scope of the embodiments of the present invention.
最后,还需要说明的是,在本文中,诸如第一和第二等之类的关系术语仅仅用来将一个实体或者操作与另一个实体或操作区分开来,而不一定要求或者暗示这些实体或操作之间存在任何这种实际的关系或者顺序。而且,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者终端设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者终端设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、物品或者终端设备中还存在另外的相同要素。Finally, it should also be noted that in this text, relational terms such as first and second etc. are only used to distinguish one entity or operation from another, and do not necessarily require or imply that these entities or operations, any such actual relationship or order exists. Furthermore, the term "comprises", "comprises" or any other variation thereof is intended to cover a non-exclusive inclusion such that a process, method, article, or terminal equipment comprising a set of elements includes not only those elements, but also includes elements not expressly listed. other elements identified, or also include elements inherent in such a process, method, article, or end-equipment. Without further limitations, an element defined by the phrase "comprising a ..." does not exclude the presence of additional identical elements in the process, method, article or terminal device comprising said element.
以上对本发明所提供的一种认证方法、系统,以及一种装置和一种计算机可读存储介质进行了详细介绍,本文中应用了具体个例对本发明的原理及实施方式进行了阐述,以上实施例的说明只是用于帮助理解本发明的方法及其核心思想;同时,对于本领域的一般技术人员,依据本发明的思想,在具体实施方式及应用范围上均会有改变之处,综上所述,本说明书内容不应理解为对本发明的限制。An authentication method, a system, a device, and a computer-readable storage medium provided by the present invention have been described above in detail. In this paper, specific examples are used to illustrate the principle and implementation of the present invention. The above implementation The description of the example is only used to help understand the method of the present invention and its core idea; at the same time, for those of ordinary skill in the art, according to the idea of the present invention, there will be changes in the specific implementation and scope of application. In summary As stated above, the content of this specification should not be construed as limiting the present invention.
Claims (8)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910606236.2A CN110430043B (en) | 2019-07-05 | 2019-07-05 | An authentication method, system and device, and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910606236.2A CN110430043B (en) | 2019-07-05 | 2019-07-05 | An authentication method, system and device, and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110430043A CN110430043A (en) | 2019-11-08 |
CN110430043B true CN110430043B (en) | 2022-11-08 |
Family
ID=68410315
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910606236.2A Active CN110430043B (en) | 2019-07-05 | 2019-07-05 | An authentication method, system and device, and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110430043B (en) |
Families Citing this family (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111147471B (en) * | 2019-12-20 | 2023-02-28 | 视联动力信息技术股份有限公司 | Terminal network access authentication method, device, system and storage medium |
CN111131912B (en) * | 2019-12-30 | 2023-04-18 | 视联动力信息技术股份有限公司 | Communication method, broadcasting method, communication device and broadcasting device |
CN111291043A (en) * | 2020-01-09 | 2020-06-16 | 中国信息通信研究院 | Identification value query method, identification resolution server and storage medium |
CN111404680B (en) * | 2020-03-11 | 2021-01-26 | 杭州海康威视数字技术股份有限公司 | Password management method and device |
CN111556376B (en) * | 2020-03-23 | 2022-06-14 | 视联动力信息技术股份有限公司 | Digital certificate signing and issuing method and device and computer readable storage medium |
CN111835716B (en) * | 2020-06-04 | 2023-05-30 | 视联动力信息技术股份有限公司 | Authentication communication method, server, device and storage medium |
CN111737679B (en) * | 2020-06-29 | 2022-07-08 | 苏州浪潮智能科技有限公司 | A security authentication method, device, electronic device and storage medium |
CN114257387A (en) * | 2020-09-11 | 2022-03-29 | 中移物联网有限公司 | Login authentication method and device |
CN112134881B (en) * | 2020-09-22 | 2023-03-21 | 宏图智能物流股份有限公司 | Network request tamper-proof method based on serial number |
CN114390242A (en) * | 2022-01-19 | 2022-04-22 | 京东方科技集团股份有限公司 | Conference management method, video terminal, external storage device and conference system |
CN114760500B (en) * | 2022-03-24 | 2024-09-13 | 海南乾唐视联信息技术有限公司 | Audio and video data encryption method and device |
CN114745115A (en) * | 2022-04-25 | 2022-07-12 | 北京市商汤科技开发有限公司 | Information transmission method and device, computer equipment and storage medium |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007121490A2 (en) * | 2006-04-19 | 2007-10-25 | Deepdive Technologies, Inc. | System and method of identifying shared resources on a network |
CN103581184A (en) * | 2013-10-31 | 2014-02-12 | 中国电子科技集团公司第十五研究所 | Method and system for mobile terminal to get access to intranet server |
CN103929307A (en) * | 2014-04-02 | 2014-07-16 | 天地融科技股份有限公司 | Password input method, intelligent secret key device and client device |
CN105262594A (en) * | 2015-10-10 | 2016-01-20 | 山东超越数控电子有限公司 | Method and device for identity authentication |
CN108259407A (en) * | 2016-12-28 | 2018-07-06 | 航天信息股份有限公司 | A kind of symmetric encryption method and system based on timestamp |
CN109672664A (en) * | 2018-11-13 | 2019-04-23 | 视联动力信息技术股份有限公司 | A kind of authentication method and system regarding networked terminals |
CN109698966A (en) * | 2018-11-30 | 2019-04-30 | 视联动力信息技术股份有限公司 | A kind of method and apparatus logging in Streaming Media and data interaction encryption |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CA2622625A1 (en) * | 2005-09-14 | 2007-03-22 | O-Ya!, Inc. | Networked information indexing and search apparatus and method |
CA2742705C (en) * | 2008-11-10 | 2017-09-12 | Sms Passcode A/S | Method and system protecting against identity theft or replication abuse |
CN102811203B (en) * | 2011-06-01 | 2016-04-27 | 北京唯致动力网络信息科技有限公司 | Method for identifying ID, system and user terminal in the Internet |
CN106936760A (en) * | 2015-12-30 | 2017-07-07 | 航天信息股份有限公司 | A kind of apparatus and method of login Openstack cloud system virtual machines |
-
2019
- 2019-07-05 CN CN201910606236.2A patent/CN110430043B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007121490A2 (en) * | 2006-04-19 | 2007-10-25 | Deepdive Technologies, Inc. | System and method of identifying shared resources on a network |
CN103581184A (en) * | 2013-10-31 | 2014-02-12 | 中国电子科技集团公司第十五研究所 | Method and system for mobile terminal to get access to intranet server |
CN103929307A (en) * | 2014-04-02 | 2014-07-16 | 天地融科技股份有限公司 | Password input method, intelligent secret key device and client device |
CN105262594A (en) * | 2015-10-10 | 2016-01-20 | 山东超越数控电子有限公司 | Method and device for identity authentication |
CN108259407A (en) * | 2016-12-28 | 2018-07-06 | 航天信息股份有限公司 | A kind of symmetric encryption method and system based on timestamp |
CN109672664A (en) * | 2018-11-13 | 2019-04-23 | 视联动力信息技术股份有限公司 | A kind of authentication method and system regarding networked terminals |
CN109698966A (en) * | 2018-11-30 | 2019-04-30 | 视联动力信息技术股份有限公司 | A kind of method and apparatus logging in Streaming Media and data interaction encryption |
Non-Patent Citations (1)
Title |
---|
基于USBKey网上认证系统设计;廖云等;《信息安全与通信保密》;20130910(第09期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN110430043A (en) | 2019-11-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110430043B (en) | An authentication method, system and device, and storage medium | |
CN111083425B (en) | Video stream processing method, device, server, electronic device and storage medium | |
CN111107060B (en) | Login request processing method, server, electronic equipment and storage medium | |
CN110661784B (en) | User authentication method, device and storage medium | |
CN110809026B (en) | File processing method and device, electronic equipment and storage medium | |
CN111431966B (en) | Service request processing method and device, electronic equipment and storage medium | |
CN110061962B (en) | Method and device for transmitting video stream data | |
CN110602266A (en) | Domain name resolution method and system | |
CN111786778B (en) | A method and device for updating a key | |
CN110224988B (en) | Image data processing method, system and device and storage medium | |
CN110719247B (en) | Terminal network access method and device | |
CN110535856B (en) | User authentication method, device and storage medium | |
CN111556376B (en) | Digital certificate signing and issuing method and device and computer readable storage medium | |
CN112291072B (en) | Secure video communication method, device, equipment and medium based on management plane protocol | |
CN110445759A (en) | A kind of electronic whiteboard sharing method and device | |
CN112203149B (en) | Video networking software updating method and device based on domestic password | |
CN111478880B (en) | A method and device for data processing | |
CN110636044A (en) | Network access method, system, device and storage medium of a virtual terminal | |
CN109376507B (en) | Data security management method and system | |
CN110661783B (en) | A terminal registration method, device and storage medium | |
CN111565294B (en) | A method, system, electronic device and storage medium for front-end device authentication | |
CN112291592B (en) | Control plane protocol-based secure video communication method, device, equipment and medium | |
CN113162910B (en) | Resource transmission method, device, electronic device and storage medium | |
CN111654728B (en) | Certificate updating method and device | |
CN110620936B (en) | A kind of backup method and device, electronic device and storage medium of video network video |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP03 | Change of name, title or address | ||
CP03 | Change of name, title or address |
Address after: 33rd Floor, No.1 Huasheng Road, Yuzhong District, Chongqing 400013 Patentee after: VISIONVERA INFORMATION TECHNOLOGY Co.,Ltd. Country or region after: China Address before: 100000 Beijing Dongcheng District Qinglong Hutong 1 Song Hua Building A1103-1113 Patentee before: VISIONVERA INFORMATION TECHNOLOGY Co.,Ltd. Country or region before: China |