CN107404485B - Self-verification cloud connection method and system thereof - Google Patents
Self-verification cloud connection method and system thereof Download PDFInfo
- Publication number
- CN107404485B CN107404485B CN201710652299.2A CN201710652299A CN107404485B CN 107404485 B CN107404485 B CN 107404485B CN 201710652299 A CN201710652299 A CN 201710652299A CN 107404485 B CN107404485 B CN 107404485B
- Authority
- CN
- China
- Prior art keywords
- cloud
- module
- authentication
- client
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000012795 verification Methods 0.000 title claims abstract description 62
- 238000000034 method Methods 0.000 title claims abstract description 35
- 238000004891 communication Methods 0.000 claims abstract description 30
- 238000003860 storage Methods 0.000 claims description 28
- 230000000149 penetrating effect Effects 0.000 claims 1
- 230000007547 defect Effects 0.000 abstract description 4
- 238000007726 management method Methods 0.000 description 20
- 230000006870 function Effects 0.000 description 18
- 108010029660 Intrinsically Disordered Proteins Proteins 0.000 description 11
- 102100037845 Isocitrate dehydrogenase [NADP], mitochondrial Human genes 0.000 description 11
- 230000003993 interaction Effects 0.000 description 11
- 230000008569 process Effects 0.000 description 10
- 238000013475 authorization Methods 0.000 description 6
- 239000003795 chemical substances by application Substances 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 6
- 230000006855 networking Effects 0.000 description 5
- 230000005540 biological transmission Effects 0.000 description 4
- 238000013459 approach Methods 0.000 description 3
- 238000012550 audit Methods 0.000 description 3
- 238000001514 detection method Methods 0.000 description 2
- 230000010354 integration Effects 0.000 description 2
- 238000012423 maintenance Methods 0.000 description 2
- 238000004080 punching Methods 0.000 description 2
- 230000011664 signaling Effects 0.000 description 2
- 241001520299 Phascolarctos cinereus Species 0.000 description 1
- 239000008186 active pharmaceutical agent Substances 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000000295 complement effect Effects 0.000 description 1
- 230000010485 coping Effects 0.000 description 1
- 230000008878 coupling Effects 0.000 description 1
- 238000010168 coupling process Methods 0.000 description 1
- 238000005859 coupling reaction Methods 0.000 description 1
- 238000007405 data analysis Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 238000002955 isolation Methods 0.000 description 1
- 210000001503 joint Anatomy 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000005192 partition Methods 0.000 description 1
- 230000008447 perception Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000005855 radiation Effects 0.000 description 1
- 239000010979 ruby Substances 0.000 description 1
- 229910001750 ruby Inorganic materials 0.000 description 1
- 238000005070 sampling Methods 0.000 description 1
- 238000013341 scale-up Methods 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 238000000060 site-specific infrared dichroism spectroscopy Methods 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1001—Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
A method of self-verifying cloud connectivity, the method comprising the steps of: the client is connected to the Internet through an intelligent gateway, and a communication channel is established between the client and a third party server through the Internet; the client sends an access request to a third party server; the third party server sends out a verification request after receiving the access request; after receiving the verification request, the intelligent gateway verifies with the third party server; and the third-party server passes the verification, and the client access is successful. Aiming at the defects and defects in the prior art, the invention provides the integrated device which is convenient, quick and low-cost and uses cloud resources through one-key login, cloud identity recognition and authentication service is added by utilizing the existing cloud AC and cloud network, the cloud user experience of a user is further improved, the control modes of the cloud network structure and the authentication service are optimized, the stable operation of the cloud service and the wireless network is ensured, and the device which automatically connects cloud computing resources is popularized and applied in a high-speed wireless network environment.
Description
Technical Field
The invention belongs to the technical field of network platform connection verification, and particularly relates to a self-verification cloud connection method and a system thereof.
Background
Currently, users are working more and more popular in wireless network environments. The wireless network provides WiFi signals through a wireless Access Point (AP), a user needs to log in through equipment such as a notebook, a mobile phone and a desktop computer, and meanwhile, the user also logs in through cloud service or application software.
The background technology related to the invention comprises: wiFi, cloud network, portal authentication, directory service, single sign-on, identity protocol, saaS/PaaS/IaS, cloud network and Internet of things
At present, almost all smart phones, notebook computers and even internet of things devices support WiFi surfing, and WiFi is the most widely used wireless network transmission technology nowadays. WiFi is a technology that allows electronic devices to connect to a Wireless Local Area Network (WLAN), typically using either the 2.4G or 5G radio frequency bands. The connection to the wireless local area network is typically password protected; but may be open allowing any device within WLAN range to connect to.
WiFi is actually converting a wired network signal into a wireless signal, and the transmission speed can reach 54 Mbps-500 Mbps bandwidth, so that the speed is high. The WiFi has the main advantages of no need of wiring and no limitation of wiring conditions, thus being very suitable for the needs of mobile office users, and being relatively safest and healthy in surfing the Internet due to low power and small radiation of the transmitted signal power being lower than 100 mw.
An AP is an Access Point abbreviation, and is generally translated into a "wireless Access Point", or "bridge". It acts as a bridge between the wireless device and the wired lan in the access control layer. The basic equipment for installing the wireless network is a wireless network card and an AP, so that the wireless network can share network resources by matching with the existing wired architecture in a wireless mode, and the installation cost and complexity are far lower than those of the traditional wired network. With an AP, a wireless device can quickly and easily connect to a network, just like a Hub of a typical wired network. Especially for broadband use, wiFi is more advantageous, and in theory, 802.11ac can provide up to 1Gbps bandwidth for multi-drop wireless lan communication, or up to 500Mbps of single connection transmission bandwidth. At present, a wireless access point generally provides a flexible expansion interface of the Internet of things, and can expand various standard Internet of things modules, including RFID, zigBee and Bluetooth 4.0 modules.
APs fall into two categories: FAT AP (FAT AP) and FIT AP (thin AP), currently large-scale networking is generally performed by thin AP networking.
Fat APs themselves assume complex functions such as user authentication, roaming handoff, user data encryption, qoS, network management, etc., and the AP is relatively heavy and is therefore called fat AP. It is almost the same as the current wireless router, and is usually used by a single network, not only providing wireless access, but also providing various functions such as DHCP, routing, PPPoE, etc. The disadvantage is that the centralized management is difficult in case of large network scale. Fat APs often employ open source operating systems such as OPENWRT (or DDWRT), while developing various applications on cloud platforms.
The thin AP is provided with a newly-added wireless controller (AC) as central centralized control management equipment, the complex functions of user authentication, roaming switching, dynamic keys and the like which are originally carried on the FatAP are transferred to the wireless controller, the AP and the AC are communicated in a tunnel mode, and can be connected across L2 and L3 networks and even wide area networks, so that the working efficiency of the whole network is greatly improved. But such an AP cannot be used alone, it must cooperate with the AC to be used and generally does not require configuration, the AP will automatically find the AC and then download the device configuration file from the AC. This mechanism is particularly important when there are hundreds or thousands of APs in the network, which greatly reduces the difficulty of operation and maintenance. The disadvantage of this thin ap+ac architecture is that the AC and AP often need to communicate across a wide area network, consume more link bandwidth and guarantee low latency, and at the same time, problems such as slow user authentication and low roaming performance may occur.
AC, wireless controller, access Controller. An AC is a device used to manage, configure, and assume wireless user data forwarding for an AP. The common form is a box type device, and also has a very high-end card inserting form AC, which is inserted into a rack type device. One AC may manage as little as a few, up to thousands of APs.
Cloud AC technology
The AC may also be in software form and deployed at the cloud end, so long as the network between the AC and the AP is kept reachable. Cloud AC is a Network Function Virtualization (NFV) method. In conventional wireless network architectures, APs are often used with ACs. In practice, however, AC is not a necessary network device in the 802.11 protocol, but is a complement to the 802.11 protocol. The cloud AC is used for replacing the traditional AC, so that not only is the cost saved, but also the equipment can be managed and maintained in a centralized manner. Because of the AC "softening", the functionality of the AC can be concentrated into a very powerful cloud, so that cloud AC can share the "resilience" of cloud computing, including high availability and extensibility. For example, after a problem occurs in one of the ACs, the remaining ACs based on PaaS can take over, so that the stability and reliability of the whole system can be ensured; the performance may be extended laterally or longitudinally (Scale up/Scale out) when insufficient. The AP may also "move" independently of the specific deployment location, and the AP may accept cloud AC management in a network reachable environment as long as the appropriate configuration files are downloaded. The traditional hardware AC adopts a tight coupling mode for AP management, and is more suitable for managing a large number of APs in a local area network; the cloud AC is weakly coupled with the AP, and a lightweight interactive mode is better suitable for AP centralized management across the Internet and a wide area network.
In the cloud AC environment, the AP may be regarded as a networked antenna, and automatically adjusts wireless parameters to an optimal state according to the environment, such as channel scanning, packet-by-packet power adjustment, local data forwarding, and the like, and updates the configuration to the cloud AC. All cloud APs are automatically converged into a wireless network covering the whole area environment.
AP authentication, BRAS authentication, AC authentication and GW authentication in the WiFi network.
(1) AP authentication
AP authentication is the most common networking approach for commercial WiFi for small and medium merchants. At this time, because the AP device is disposed below the dial-up router of the merchant, some of the AP devices dial up directly, but the IP address is DHCP, so the platform cannot PING to access the AP, and to implement the Portal authentication service, the AP device must join the domain name or the IP address of the platform, and the AP actively communicates with the platform based on the agreed protocol. In fat AP mode, the dominant protocol is the wifi protocol. In this mode, after a new user is authenticated successfully, information is stored in the AP device and the cloud platform, so that when the user is authenticated successfully under one AP, the user can not access the internet and needs to re-authenticate after switching to another AP of the same merchant, which is one of the root causes that fat APs are generally used only in small scenes and cannot perform non-perceived roaming.
(2) BRAS authentication
BRAS authentication is a mainstream authentication method of WLAN networks of some operators. In this authentication mode, portal/Radius signaling interaction is performed between the BRAS device and the operation platform, and the identification of the AP is based on PVLAN/CVLAN information configured on the BRAS. Currently BRAS authentication methods are rarely used in commercial WiFi of non-telecom operators. In this mode, after a new user is authenticated successfully, information is stored in the BRAS device and the cloud platform, so that no perceived roaming is required as long as the user switches between APs under the same BRAS.
(3) Gateway authentication
When gateway authentication is used for fat AP networking, the problem of non-perception switching of fat AP networking across APs can be solved, so that the gateway authentication can be applied to places which are sensitive to cost and have larger continuous coverage areas. Meanwhile, the gateway authentication can be used in some old environments, and the gateway is added at the upper network outlet of the wireless router without replacing the former equipment, so that the WiFi transformation of the whole place can be realized, and the functions of commercial WiFi such as Portal pushing, radius authentication, short message/WeChat authentication, advertisement publishing and operation, customer analysis and the like are supported. In this mode, after a new user is authenticated successfully, information is stored on the GW device and the cloud platform, so that no roaming is perceived as long as the user switches between APs under the same GW.
(4) AC authentication
The AC authentication is another mainstream authentication mode of the WLAN network, is a network authentication mode used by some operators, and is also a mainstream authentication mode of all large-scale commercial WiFi networks which are networked by using an AC+thin AP mode. Compared with the BRAS authentication mode, the AC authentication mode is simpler to network, and is easier to realize for operators without BRAS resources. On the other hand, portal/Radius signaling interaction between the AC and the operation platform can also carry out parameter transmission based on the MAC and the SSID, thereby realizing personalized Portal push from the minimum granularity to the AP. In this mode, after a new user is authenticated successfully, information is stored on the AC device and the backend platform, so as long as the user switches between APs under the same set of AC, no perceived roaming is performed. For cloud AC, the number and scope of management APs is greatly expanded.
Portal authentication
When the user accesses the network, the user is required to input a user name and a password, and the network can be accessed after the authentication is successful. In the authentication process, the user needs to visit a website called Portal. Portal is the meaning of English entry. Portal authentication is also commonly referred to as Web authentication, and Portal authentication websites are commonly referred to as portals.
Flow of authentication before user use WiFi:
specifically, when an unauthorized user logs on to the internet, the device forces the user to log on to a specific site, authentication is completed on the site, and internet resources can be used only after the authentication is passed. The user can actively access the known Portal authentication website, input a user name and a password for authentication, and the mode of starting the Portal authentication is called active authentication. Conversely, if the user attempts to access the external network through the browser, the user will be forced to access the Portal authentication site, thereby initiating the Portal authentication process, in a manner known as forced authentication. The user can finish authentication on Portal through biological recognition modes such as account passwords, mobile phone short messages, special authentication equipment or fingerprints. Currently, according to relevant national regulations, public place WiFi surfing must be authenticated by real names, which includes various modes such as authentication by using mobile phones and short message verification codes, weChat authentication and the like.
After Portal authentication is completed, a navigation page is displayed as a welcome page by a general Portal, so that a user can conveniently surf the Internet. This welcome page is typically customizable, and may be a navigation page, an advertisement page, a use hint page, or the like.
Portal authentication where the security policy server, although present in most Portal, is not an essential option. The authentication server is an optional component, but the billing service is not an optional component.
1. Authentication client
The client system installed in the user terminal is a browser running HTTP/HTTPs protocol or a device running Portal client software, which may be a smart phone, a notebook computer, a desktop computer, or even an IoT internet of things device. The security detection of the access terminal is accomplished through the information exchange between the Portal client and the security policy server.
2. Access device
The broadband access equipment such as the access point, the access controller, the switch, the router and the like is generally called, and has three main functions:
all HTTP requests from the user are redirected to the Portal server prior to authentication.
And in the authentication process, the authentication server interacts with a Portal server, a security policy server and an authentication/charging server to complete the functions of identity authentication/security authentication/charging.
After passing the authentication, the user is allowed to access the internet resource authorized by the administrator. The billing service is not necessarily optional if only the user is controlled to access the internet and authentication.
Portal server
And the server system for receiving the Portal client authentication request provides a free Portal service and a Web authentication-based interface, and interacts authentication information of the authentication client with the access equipment.
4. Authentication/billing server
And interacting with the access equipment to finish authentication and charging of the user.
5. Security policy server
And interacting with the Portal client and the access equipment to complete the security authentication and authorization of the user. The interaction process of the five basic elements is as follows:
(1) When an unauthorized user accesses the network, an internet address is input in the address bar of the Web browser, and then the HTTP request is redirected to the Web authentication homepage of the Portal server when passing through the access device (AC wireless controller in WiFi).
(2) The user inputs authentication information in the authentication homepage/authentication dialog box and submits the authentication information, and the Portal server transmits the authentication information of the user to the access equipment; (3) Then the access equipment communicates with an authentication/charging server to authenticate and charge; (4) After the authentication is passed, if a security policy is not adopted for the user, the access device opens a path between the user and the Internet to allow the user to access the Internet; if the security policy is adopted for the user, the client and the access equipment interact with the security policy server, and after the security detection of the user is passed, the security policy server authorizes the user to access the unrestricted resource according to the security of the user. Typically, after a user logs in to be allowed to access the internet, the user also needs to enter an account number and a password of the application to log in. Single sign-on techniques are involved if a user logs into multiple systems using a set of account passwords.
SaaS/PaaS/IaaS
SaaS: infrastructure as a service, an operator runs applications on a cloud computing infrastructure, which users can access through a browser interface on various devices. The consumer does not need to manage or control any cloud computing infrastructure, including networks, servers, operating systems, storage, etc.;
PaaS: the platform is a service that deploys applications developed or purchased by customers using provided development languages and tools (e.g., java, PHP, python,. Net, etc.) onto the cloud computing infrastructure of the vendor. The client does not need to manage or control the underlying cloud infrastructure, including networks, servers, operating systems, storage, etc., but the client can control the deployed application programs, and possibly the managed environment configuration of the running application programs;
IaaS: infrastructure as a service is the utilization of all computing infrastructure, including processing CPUs, memory, storage, networks, and other basic computing resources, and users can deploy and run arbitrary software, including operating systems and application programs. The consumer does not manage or control any cloud computing infrastructure, but can control the selection of operating systems, storage space, deployed applications, and possibly limited control of network components (e.g., routers, firewalls, load balancers, etc.).
Meanwhile, as companies adopt more and more cloud computing technologies, applications based on SaaS enter the office environment of the enterprise in large numbers, and users expect to use as few accounts as possible, preferably single sign-on singken functions, to log into these applications. This means that a user can log into the network using a single internet account, i.e. can access cloud enterprise applications, email. The management of countless account passwords, the clear of which cloud environment and which system uses which password, the difficulty for users is very large, and password forgetting and password sharing often bring unknown risks. If the user only needs to realize once, the user can reuse the device at the later time, and thus authentication and audit are simplified. This approach is called single sign on.
Single Sign On (SSO) is an important service that most large enterprises offer to their users (employees, partners, clients). In the era of increasingly stringent information security regulations, the use of SSO technology has enabled companies to implement access control policies across multiple applications in a consistent manner, which reduces the overall cost of implementation. The administrator does not have to set password policies for various systems, which may include, but are not limited to, password length, password complexity, password use duration, reuse of previous passwords, etc., so that the work of the administrator is simplified, and the user experience is improved while the security is also improved.
The disadvantages of the prior art are summarised as follows:
1. the user manages a plurality of accounts and passwords, and logs in a third-party web application by using the accounts, so that the user experience is poor;
2. the user account password authorizes the third party application, the time and the range are difficult to control, and potential safety hazards exist;
3. authentication of the network device and the software application cannot be integrated, and a user needs to log in the network and a plurality of applications respectively;
4. the access authentication and authorization of the AP are oriented to the local area network, and the cloud application cannot be communicated. Therefore, the single sign-on needs to be expanded from the AP to the cloud at present, so that the user can truly face to one-time sign-on of the Internet, and not only can access the network, but also various cloud services can be used.
The prior art scheme mainly comprises three types of authentication, namely service, cloud AC authentication scheme and cloud network.
1. AaaS, authentication as a service
Each large enterprise software provider may offer some part of the technology or product in this area. The top level solution in this field includesSecurity Access Manager for Enterprise Single Sign-On, CA SiteMinder and Oracle Access Management. The open source scheme mainly includes CAS, openAM, okta, directAxs and Ping Identity.
Each of the above mentioned products comes with its own agents that must be installed on the Web server and application server for which you try to protect and enable SSO applications. Generally, you will have a large percentage of agents for the main operating system, web server software, and application server software. The proxy acts to intercept a login request to an application and then pass the request to the SSO server to make decisions.
CAS (Central Authentication Service) is an open source project initiated by Yale university, many of which employ CAS for open source building Web SSO. CAS is a relatively simple and sufficiently secure SSO option.
The CAS Client is responsible for deployment at the Client (referred to as a Web application), and in principle, the deployment of the CAS Client means that there is an access request to the protected resource of the local Web application, and identity authentication is required for the requester, and the Web application does not accept any credenals such as username and password, but redirects to the CAS Server for authentication.
Currently, CAS clients support a very large number of clients, including Java, net, ISAPI, PHP, perl, ruby, VBScript, etc., and CAS protocols can be adapted to Client applications written in virtually any language.
Okta, directAxs, azure AD, AWS IAM, etc. are essentially a "cloud connector" that can integrate a large number of software applications used by a company and its staff. The method is mainly oriented to cloud computing scenes, and single sign-on is realized across applications based on standard protocols such as OAuth2.0 and OpenID.
The Okta software allows the customer's staff to conveniently use a single, secured account number to log in to various network services that they need to use in their work, or for contractors, partners and customers. When an employee enters or leaves an enterprise, software can be used to quickly open or cancel the employee's rights to access applications and web services.
The AWS directory service allows users to provide a user directory, add team members, add machines to the domain, implement Kerberos single sign-on, and apply Group Policy. The AWS directory service can also extend an existing Active Directory (AD) into the cloud, integrating with the IAM. This approach may enable a user associated with a directory to single sign-on to the AWS management console either directly or through an existing AD server.
The domestic manufacturer related to cloud single sign-on is the Paira software, and the product ParaSecure Cloud SSO realizes the single sign-on of the SaaS application. User access to all SaaS applications authentication is done on ParaSecure Cloud SSO, the SaaS applications are not responsible for authentication of user identity. This scheme supports two scenarios:
1) The user logs in ParaSecure Cloud SSO firstly and then clicks the link of the SaaS application, so that single sign-on access application is automatically realized;
2) The user accesses the SaaS application first, is redirected to ParaSecure Cloud SSO, automatically returns to the SaaS application after authentication is completed, and automatically enters the application by single sign-on.
The product functions comprise centralized identity management, unified identity storage, unified authentication, security audit and an integrated interface, and single sign-on integration can be conveniently realized as long as the SaaS application supports protocols such as SAML, openID, OAuth and the like. The system supports high availability and cluster deployment, avoids single-point faults, has flexible transverse and longitudinal capacity expansion capacity, adapts to enterprise requirements of different scales, and can finish single-point login of application by simple configuration based on a B/S management interface.
2. Cloud AC authentication scheme
Currently, manufacturers such as Hua Chen, rui and koala all provide authentication schemes of cloud AC and Portal on the market. A user uses a thin AP+cloud AC structure, the AP equipment can be quickly brought into the management of the cloud AC, the AP can automatically discover the equipment to download configuration files, the cloud monitors the current state of the equipment in real time, and various remote management functions of software restarting, version upgrading and webpage management are achieved.
Through the configuration of the cloud AC control equipment end, the schemes of all manufacturers support functions such as equipment wireless configuration, equipment authentication configuration, access resource control, user management control, equipment management configuration, equipment log configuration, equipment system configuration and the like, and a configuration operation log recording function for recording relevant information of operation of each configuration item.
Meanwhile, most of cloud ACs of all manufacturers support the butt joint with third-party Web applications such as a cloud marketing platform, an advertising platform, a big data platform and the like through Portal expansion functions, so that advertisement pushing, accurate marketing service and the like are realized.
3. Cloud network
Besides the cloud resources connected through the Internet, cloud computing manufacturers such as AWS, azure, arian and the like also provide virtual networks and direct-connection special line products, and the users are helped to obtain better experience.
The private network in the cloud is preset with a logic isolation partition, and the local network can be easily expanded through VPN or direct connection private line, which provides an independent and safe environment for users to use cloud resources in the virtual network defined by the users. For example: the user can regard public cloud as own data center, define communication flow such as selecting own IP address range, creating sub-network, configuring route table and gateway direct connection cloud network, selecting to run load balancer, application program firewall, etc., thereby having higher control force when designing network; meanwhile, a user can easily extend the local IT environment to the cloud, and a hybrid cloud application program which is safely connected to the local data center can be constructed. If the platform as a service (PaaS) and the infrastructure as a service (IaaS) are integrated in one virtual network, greater flexibility and extensibility will be achieved in building the application. The related technical scheme is not complete enough in the aspects of equipment access, cloud application integration, internet-oriented, user experience and safety improvement. This is a problem addressed by the present apparatus and method.
Disclosure of Invention
In order to remedy the drawbacks of the login form, the present invention proposes a self-verifying cloud connection method,
the technical scheme is that the self-verification cloud connection method comprises the following steps of:
the client is connected to the Internet through an intelligent gateway, and a communication channel is established between the client and a third party server through the Internet;
the client sends an access request to a third party server;
the third party server sends out a verification request after receiving the access request;
after receiving the verification request, the intelligent gateway verifies with the third party server;
and the third-party server passes the verification, and the client access is successful.
Further, the intelligent gateway verification step includes:
the intelligent gateway detects whether to store the third party server verification information through the built-in RADIUS authentication server;
if the intelligent gateway detects the verification information of the third party server, the intelligent gateway sends the verification information to the third party server for verification;
if the intelligent gateway does not detect the verification information of the third-party server, sending a verification request to the client, after receiving the verification request, sending the verification information corresponding to the verification request of the third-party server to the intelligent gateway, after receiving the verification information of the client, sending the verification information to the third-party server, and simultaneously storing the third-party server and the verification information aiming at the third-party server.
The utility model provides a self-verification cloud connected system, includes cloud ware, third party's server and the customer end with cloud ware signal connection respectively, its characterized in that still includes intelligent gateway, intelligent gateway is connected with customer end and cloud ware respectively, and this intelligent gateway includes:
the Wifi connection module is used for connecting with the client and providing Wifi service for the client;
the communication module is electrically connected with the WIFI module and is used for verifying login information between the client and the intelligent gateway and realizing encrypted communication between the connector and the client;
the sending module is connected with the communication module and used for sending the client login request to a third party server;
the receiving module is used for receiving the verification request of the third-party server;
the storage module is used for storing the ID information of the third-party server accessed by the client;
the RADIUS authentication server is respectively connected with the communication module, the receiving module and the storage module and is used for checking the authentication information of the third-party server;
the feedback module is respectively connected with the RADIUS authentication server and the communication module and is used for sending the verification information to the corresponding third party server;
the recording module is respectively connected with the feedback module and the storage module, and is used for recording the verification information sent by the feedback module and the corresponding third-party server information, and sending the recording result to the storage module for storage.
The intelligent gateway also comprises a shell, a circuit board fixed in the shell and a data interface electrically connected with the circuit board, wherein the Wifi connection module, the communication module, the sending module, the receiving module, the storage module, the RADIUS authentication server, the feedback module and the recording module are respectively fixed on the circuit board.
The communication module, the sending module, the receiving module and the storage module are all single-chip microcomputer.
And an alarm indicator lamp is also arranged on the shell.
The shell comprises a bottom plate and a shell body connected with the bottom plate, guide rods are respectively arranged at four corners of the bottom plate, a fixing ring for the guide rails to enter and exit is arranged in the shell body, and the shell body and the bottom plate are fixed together in a corresponding wearing mode of the guide rods and the fixing rings.
The circuit board is fixed on the bottom plate, a through hole for a wire connected with the circuit board is formed in one side of the shell, a dustproof rubber sleeve is arranged on the through hole, and the wire penetrates through the dustproof rubber sleeve and is connected to the circuit board.
The invention solves the problems that: aiming at the defects and defects in the prior art, the invention aims to provide an integrated device which is convenient, quick and low-cost and is used for logging in a cloud resource by one key, cloud identity recognition and authentication service is added by utilizing the existing cloud AC and a cloud network, the user experience of cloud on a user is further improved, the front end and the rear end of the cloud resource are used efficiently under the condition of lower cost, the service access flow is improved through reasonable authentication distribution and combination, the control modes of the cloud network structure and the authentication service are optimized, the cloud network structure and the control modes of the authentication service are processed by the integrated device, the concurrent users are processed, the load balance is good, the stable operation of the cloud service and a wireless network is ensured, and the device which is automatically connected with the cloud computing resource is popularized and applied in a high-speed wireless network environment.
Specifically, the method comprises the following steps:
1. cloud application plug and play: the network is connected to complete automatic online, a user does not need to install a software package or apply an account, and the AP directly provides cloud service after being connected to the network;
2. authentication with convenient and quick access is a service: the access is directly performed through an AP (access point), generally only one-time registration and authentication of the mobile phone number are required to be completed simultaneously, user operation steps are reduced, the cloud resources bound by the whole network access are accessed, and the Internet surfing is realized;
3. arbitrary point access: the AP connected with the cloud end completes authentication under the condition that any network can reach the cloud end AC, and accesses services such as public cloud SaaS, paaS, iaaS;
4. on-line agile operation and maintenance: an administrator can manage the authorization and restriction of cloud services through a Web portal, change configuration, security policy settings and monitor applications.
The communication module, the sending module, the receiving module and the storage module are all single-chip microcomputer.
And an alarm indicator lamp is also arranged on the shell.
Drawings
FIG. 1 is a schematic flow chart of an embodiment of the present invention;
fig. 2 is a schematic structural diagram of an embodiment of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made apparent and fully in view of the accompanying drawings, in which some, but not all embodiments of the invention are shown. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
In the description of the present invention, it should be noted that the orientation or positional relationship indicated by the terms "center", "upper", "lower", "left", "right", "vertical", "horizontal", "inner", "outer", etc. are based on the orientation or positional relationship shown in the drawings, are merely for convenience of description of the present invention and to simplify the description, and do not indicate or imply that the apparatus or elements referred to must have a specific orientation, be constructed and operated in a specific orientation, and thus should not be construed as limiting the present invention. Furthermore, the terms "first," "second," and "third" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance.
In the description of the present invention, it should be noted that, unless explicitly specified and limited otherwise, the terms "mounted", "connected" and "connected" are to be construed broadly, and may be, for example, fixedly connected, detachably connected or integrally connected; can be mechanically or electrically connected; can be directly connected or indirectly connected through an intermediate medium, and can be communication between two elements. The specific meaning of the above terms in the present invention will be understood in specific cases by those of ordinary skill in the art.
In connection with fig. 1, one embodiment of the present invention. A method of self-verifying cloud connectivity, the method comprising the steps of:
the client is connected to the Internet through an intelligent gateway, and a communication channel is established between the client and a third party server through the Internet;
the client sends an access request to a third party server;
the third party server sends out a verification request after receiving the access request;
after receiving the verification request, the intelligent gateway verifies with the third party server;
and the third-party server passes the verification, and the client access is successful.
In the above method, the intelligent gateway verification step includes:
the intelligent gateway detects whether to store the third party server verification information through the built-in RADIUS authentication server;
if the intelligent gateway detects the verification information of the third party server, the intelligent gateway sends the verification information to the third party server for verification;
if the intelligent gateway does not detect the verification information of the third-party server, sending a verification request to the client, after receiving the verification request, sending the verification information corresponding to the verification request of the third-party server to the intelligent gateway, after receiving the verification information of the client, sending the verification information to the third-party server, and simultaneously storing the third-party server and the verification information aiming at the third-party server.
The utility model provides a self-verification cloud connected system, includes cloud ware, third party's server and the customer end with cloud ware signal connection respectively, its characterized in that still includes intelligent gateway, intelligent gateway is connected with customer end and cloud ware respectively, and this intelligent gateway includes:
the Wifi connection module is used for connecting with the client and providing Wifi service for the client;
the communication module is electrically connected with the WIFI module and is used for verifying login information between the client and the intelligent gateway and realizing encrypted communication between the connector and the client;
the sending module is connected with the communication module and used for sending the client login request to a third party server;
the receiving module is used for receiving the verification request of the third-party server;
the storage module is used for storing the ID information of the third-party server accessed by the client;
the RADIUS authentication server is respectively connected with the communication module, the receiving module and the storage module and is used for checking the authentication information of the third-party server;
the feedback module is respectively connected with the RADIUS authentication server and the communication module and is used for sending the verification information to the corresponding third party server;
the recording module is respectively connected with the feedback module and the storage module, and is used for recording the verification information sent by the feedback module and the corresponding third-party server information, and sending the recording result to the storage module for storage.
The intelligent gateway also comprises a shell, a circuit board fixed in the shell and a data interface electrically connected with the circuit board, wherein the Wifi connection module, the communication module, the sending module, the receiving module, the storage module, the RADIUS authentication server, the feedback module and the recording module are respectively fixed on the circuit board.
The communication module, the sending module, the receiving module and the storage module are all single-chip microcomputer.
And an alarm indicator lamp is also arranged on the shell.
The shell comprises a bottom plate and a shell body connected with the bottom plate, guide rods are respectively arranged at four corners of the bottom plate, a fixing ring for the guide rails to enter and exit is arranged in the shell body, and the shell body and the bottom plate are fixed together in a corresponding wearing mode of the guide rods and the fixing rings.
The circuit board is fixed on the bottom plate, a through hole for a wire connected with the circuit board is formed in one side of the shell, a dustproof rubber sleeve is arranged on the through hole, and the wire penetrates through the dustproof rubber sleeve and is connected to the circuit board.
The whole process of the invention uses the Chinese mobile Portal protocol standard 2.0, the RADIUS protocol, the OpenID Connect1.0/OAuth2.0 or the SAML protocol, the domain name of the third party server of the storage module of the intelligent gateway does not store authentication information, and the RADIUS authentication server built in the intelligent gateway stores the user ID and the authentication information of the third party server. Except when it doubles as an identity facilitator role itself, authentication information is stored.
The intelligent gateway comprises an AC wireless controller of a cloud and a plurality of APs, and supports the AC to be deployed on PaaS or IaaS in a software mode. The cloud AC facing the internet is a basic condition of cloud on one key.
The system comprises Portal website portals, authentication services, SSO single sign-on, security policies and identity agents, and is responsible for data interaction between Portal and cloud AC, data interaction between Portal and an authentication server, single sign-on, identity provider management, directory alliance mutual trust and other functions.
Assume a certain application scenario role: 1 service provider SP, 2 identity provider IDP, 3 subscribers. The specific flow is as follows:
a user a accesses a protected resource (service provider) such as www.CloudNative.com, accesses the network through the AP of the system; b, the user completes authentication through the Portal, and the Portal provides authentication service by using an identity provider in the authentication process; c, the identity authentication service provider generates assertion to prove the identity of the user and signs the user with the private key of the user, and returns information about whether the authentication is successful or not to the Portal; the D Portal server sends information to the access server BAS (usually hardware) after obtaining authentication success information; e, the access server interacts with the RADUS internet authentication server to complete internet authorization and release; after getting the internet authorization, portal sends authentication assertion and its private key to service provider, which verifies the signature of the assertion by public key of identity provider, then trusts the assertion, judges that user is legal, and allows client to access protected resource.
In this process, the access network may also be regarded as a protected resource, but the user gradually obtains the access rights of the protected resource according to the Portal arrangement. Public-private key systems have been employed to secure assertions against counterfeiting, tampering, and trustworthiness of identity providers, either by signing and encrypting the assertions, or in combination with digital certificate systems, which are governed by a security policy service. The whole process uses the standard 2.0 of China Mobile Portal protocol, the RADIUS protocol, the OpenID Connect1.0/OAuth2.0 or the SAML protocol. Wherein, the B-C procedure, i.e. the first time the user accesses the identity provider (e.g. WeChat), needs to be preconfigured at the BAS network access device, allowing temporary release of the website. In the C procedure, the OpenID Connect1.0/OAuth2.0 or SAML protocol may be used, depending on which identity provider is used. The D procedure uses the chinese mobile Portal protocol standard 2.0. The E procedure uses the RADIUS protocol. The F procedure uses the OpenID Connect1.0/OAuth2.0 or SAML protocol.
Specifically, the present invention relates to a method for manufacturing a semiconductor device. The identity proxy part requires us to write code itself to interact with the short message gateway (telecom operator as identity provider), web IDP (micro-letter, micro-blog or any other oid/OpenID Connect compatible IDP), and then invoke authentication services to obtain authentication token exchange system temporary security credentials from these IDPs.
Under certain conditions, the module handles interactions with IDPs using microsoft Azure AD, amazon Cognito of AWS, or IAM of the alicloud, etc., as these internet-oriented cloud authentication and directory services can act as identity agents and do many joint jobs without having to handle interactions with many IDPs themselves.
The invention generally comprises an AC wireless controller and a plurality of APs, and supports the AC to be deployed on PaaS or IaaS in a software mode. The cloud AC facing the internet is a basic condition of cloud on one key. The system comprises Portal website portals, authentication services, SSO single sign-on, security policies and identity agents, and is responsible for data interaction between Portal and cloud AC, data interaction between Portal and an authentication server, single sign-on, identity provider management, directory alliance mutual trust and other functions. The Portal is also responsible for navigation and recommendation of the application after the user logs in by one key. The module performs most of the core functions of the one-key cloud. The identity proxy part asks us to write code itself that interacts with the short message gateway, web IDP (micro-message, micro-blog or any other OIDC compatible IDP), and then invokes the authentication service to obtain the authentication token exchange system temporary security credentials from these IDPs. Under certain conditions, the module handles interactions with IDPs using microsoft Azure AD, amazon Cognito of AWS, or IAM of the alicloud, etc., as these internet-oriented cloud authentication and directory services can act as identity agents and do many joint jobs without having to handle interactions with many IDPs themselves.
The present invention uses APIs to complete the actual connection to SaaS, paaS, iaaS and cloud networks.
The invention can realize the data and log collection in the whole access, authentication and authorization and application access process, and complete the functions of security-oriented audit, attack identification, coping with policy management, data analysis and the like.
The application scenario is as follows:
scene one: park application, hybrid cloud: and periodically sampling portal new application, pushing a certain park to deploy a WiFi network to be connected to the Internet, wherein an AP accesses to the cloud AC of the system. The enterprise of the park can be used as a tenant to open the cloud service on the AP by one key. For example, an administrator establishes a staff account of the enterprise, an opened SaaS cloud service and other pre-configuration work on the SSO/directory server, the enterprise only needs to connect the AP to configure the AP as a network reachable cloud AC, and a user can log in successfully and Portal displays SaaS application website navigation, so that the user can avoid logging in for using the preset application for the second time. In many cases, the AC and the AP in the cloud access the public cloud through the direct connection private line to obtain better user experience, and the AP obtains the cloud virtual device, such as the virtual network, the IaaS virtual machine and the PaaS service, which are connected by the private line rapidly and stably.
Scene II: automatic attendance: sharing account locations
The staff logs in WiFi in the office area/factory area, the system authorizes the attendance application to access the AP position information of the user, and the attendance system automatically completes the attendance 'card punching' process under the condition that the staff does not perceive. When the staff leaves the WiFi network during work, the attendance system automatically completes 'punching cards' during work. Because staff office area position information is shared with the attendance system, the system can count the time length of each staff going to work, whether to work or not, and even in which office area. All the functions are realized under the condition that staff logs in the network by one key, so that the user experience is greatly improved.
The above technical solution only represents the preferred technical solution of the present invention, and some changes that may be made by those skilled in the art to some parts of the technical solution represent the principles of the present invention, and the technical solution falls within the scope of the present invention.
Claims (7)
1. A self-verifying cloud connection method, which is applied to a self-verifying cloud connection system, comprising: the cloud server is respectively connected with a third party server, a client and an intelligent gateway in a signal mode, wherein the intelligent gateway comprises a cloud AC module, a Wifi connection module, a Portal authentication module and a RADIUS authentication server which are used for expanding and accessing third party applications, and the method comprises the following steps:
connecting into a preset application program by utilizing cloud AC expansion;
the client sends a first access request to a third party server; the first access request is used for acquiring network communication connection;
the third party server sends out a verification request after receiving the access request;
after receiving the verification request, the intelligent gateway inputs verification information through a Portal authentication module, and verifies with the third party server through a RADIUS authentication server; the verification information is used for logging in network communication and logging in a preset application program;
the third party server passes the verification, and the intelligent gateway records the verification information;
the client sends a second access request to the third party server again; the second access request is used for logging in a preset application program;
the intelligent gateway verifies and utilizes verification information to verify with a preset application program of the cloud AC;
the client does not input a login preset application program.
2. The utility model provides a self-verification cloud connected system, includes cloud ware, third party's server and the customer end with cloud ware signal connection respectively, third party's server is used for authentication verification information, its characterized in that includes intelligent gateway, intelligent gateway is connected with customer end and cloud ware respectively, and this intelligent gateway includes:
the Wifi connection module is used for connecting with the client and providing Wifi service for the client;
the cloud AC module is used for managing and authenticating the wireless Access Point (AP) and expanding access to third party applications;
a Portal authentication module;
the communication module is electrically connected with the WIFI module and is used for verifying login information between the client and the intelligent gateway and realizing encrypted communication between the connector and the client;
the sending module is connected with the communication module and used for sending the client login request to a third party server;
the receiving module is used for receiving the verification request of the third-party server;
the storage module is used for storing the ID information of the third-party server accessed by the client;
the RADIUS authentication server is respectively connected with the communication module, the receiving module and the storage module and is used for checking the authentication information of the third-party server;
the feedback module is respectively connected with the RADIUS authentication server and the communication module and is used for sending the verification information to the corresponding third party server;
the recording module is respectively connected with the feedback module and the storage module, and is used for recording the verification information sent by the feedback module and the corresponding third-party server information, and sending the recording result to the storage module for storage.
3. The self-verifying cloud connection system of claim 2, wherein the intelligent gateway further comprises a housing, a circuit board fixed in the housing and a data interface electrically connected with the circuit board, and the Wifi connection module, the communication module, the sending module, the receiving module, the storage module, the RADIUS authentication server, the feedback module, and the recording module are respectively fixed on the circuit board.
4. The self-verifying cloud connection system of claim 3, wherein the communication module, the sending module, the receiving module, and the storage module are all single-chip computers.
5. The self-verifying cloud connection system of claim 4, wherein an alarm indicator light is further provided on the housing.
6. The self-verification cloud connection system according to claim 3, wherein the shell comprises a bottom plate and a shell connected with the bottom plate, guide rods are respectively arranged at four corners of the bottom plate, a fixing ring for the guide rails to go in and out is arranged in the shell, and the shell and the bottom plate are fixed together in a corresponding penetrating manner through the guide rods and the fixing ring.
7. The self-verifying cloud connection system of claim 6, wherein the circuit board is fixed on the base plate, a through hole is formed in one side of the shell for a wire connected with the circuit board, a dustproof rubber sleeve is arranged on the through hole, and the wire passes through the dustproof rubber sleeve and is connected to the circuit board.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710652299.2A CN107404485B (en) | 2017-08-02 | 2017-08-02 | Self-verification cloud connection method and system thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710652299.2A CN107404485B (en) | 2017-08-02 | 2017-08-02 | Self-verification cloud connection method and system thereof |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107404485A CN107404485A (en) | 2017-11-28 |
CN107404485B true CN107404485B (en) | 2023-11-07 |
Family
ID=60402451
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710652299.2A Active CN107404485B (en) | 2017-08-02 | 2017-08-02 | Self-verification cloud connection method and system thereof |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107404485B (en) |
Families Citing this family (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109905258B (en) * | 2017-12-07 | 2020-11-17 | 华为技术有限公司 | PaaS management method, device and storage medium |
CN107864475B (en) * | 2017-12-20 | 2021-05-28 | 中电福富信息科技有限公司 | WiFi (Wireless Fidelity) shortcut authentication method based on Portal + dynamic password |
CN108650209B (en) * | 2018-03-06 | 2021-05-14 | 北京信安世纪科技股份有限公司 | Single sign-on method, system, device and authentication method |
CN110263525B (en) * | 2018-03-07 | 2020-11-27 | 杭州海康威视数字技术股份有限公司 | Equipment configuration method and device |
CN108830081A (en) * | 2018-06-14 | 2018-11-16 | 安徽鼎龙网络传媒有限公司 | A kind of virtual lock emergency feedback system on micro- scene backstage |
CN110611643A (en) * | 2018-06-15 | 2019-12-24 | 上海仪电(集团)有限公司中央研究院 | Cloud pipe end data security interaction system and method based on intelligent gateway |
CN108834146A (en) * | 2018-06-22 | 2018-11-16 | 武汉彤科电力科技有限公司 | A kind of Bidirectional identity authentication method between terminal and authentication gateway |
CN109218089B (en) * | 2018-09-07 | 2021-09-17 | 郑州云海信息技术有限公司 | Interface implementation method for transparent fault switching of distributed storage system |
CN111416792B (en) * | 2019-01-08 | 2022-07-05 | 杭州海康威视数字技术股份有限公司 | Internal authentication-free method of embedded equipment and embedded equipment |
CN113727344A (en) * | 2020-05-25 | 2021-11-30 | 北京锐云通信息技术有限公司 | Multi-factor authentication method in different scene safe internet access |
CN111698250B (en) * | 2020-06-11 | 2023-11-28 | 腾讯科技(深圳)有限公司 | Access request processing method and device, electronic equipment and computer storage medium |
CN111787642B (en) * | 2020-07-29 | 2022-08-09 | 成都飞鱼星科技股份有限公司 | Third-party application based authentication networking method and device |
CN112632938A (en) * | 2020-12-30 | 2021-04-09 | 杭州天阙科技有限公司 | Form generation method and device and controller |
CN114422212A (en) * | 2021-12-31 | 2022-04-29 | 中煤科工集团信息技术有限公司 | Industrial Internet device cloud connection method, system and device |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2007293811A (en) * | 2006-03-31 | 2007-11-08 | Nippon Telegr & Teleph Corp <Ntt> | Proxy authentication system and method and authentication apparatus using therewith |
CN101741568A (en) * | 2009-12-18 | 2010-06-16 | 成都市华为赛门铁克科技有限公司 | Surfing method, client, security gateway and surfing system |
CN102378171A (en) * | 2010-08-16 | 2012-03-14 | 中国移动通信集团公司 | Automatic authentication method and system thereof, Portal server, and RADIUS server |
CN102523220A (en) * | 2011-12-19 | 2012-06-27 | 北京星网锐捷网络技术有限公司 | Web authentication method, and client and access layer device used for web authentication |
CN103237019A (en) * | 2013-04-03 | 2013-08-07 | 中国科学院合肥物质科学研究院 | Cloud service accessing gateway system and cloud service accessing method |
CN104092602A (en) * | 2014-06-20 | 2014-10-08 | 裴兆欣 | Cloud computing gateway |
WO2016122545A1 (en) * | 2015-01-29 | 2016-08-04 | Hewlett Packard Enterprise Development Lp | Cloud-hosted user authentication |
CN106878269A (en) * | 2016-12-30 | 2017-06-20 | 广州中致易和网络科技有限公司 | A kind of network authentication platform |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10033702B2 (en) * | 2015-08-05 | 2018-07-24 | Intralinks, Inc. | Systems and methods of secure data exchange |
KR101795592B1 (en) * | 2015-12-24 | 2017-12-04 | (주)소만사 | Control method of access to cloud service for business |
-
2017
- 2017-08-02 CN CN201710652299.2A patent/CN107404485B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2007293811A (en) * | 2006-03-31 | 2007-11-08 | Nippon Telegr & Teleph Corp <Ntt> | Proxy authentication system and method and authentication apparatus using therewith |
CN101741568A (en) * | 2009-12-18 | 2010-06-16 | 成都市华为赛门铁克科技有限公司 | Surfing method, client, security gateway and surfing system |
CN102378171A (en) * | 2010-08-16 | 2012-03-14 | 中国移动通信集团公司 | Automatic authentication method and system thereof, Portal server, and RADIUS server |
CN102523220A (en) * | 2011-12-19 | 2012-06-27 | 北京星网锐捷网络技术有限公司 | Web authentication method, and client and access layer device used for web authentication |
CN103237019A (en) * | 2013-04-03 | 2013-08-07 | 中国科学院合肥物质科学研究院 | Cloud service accessing gateway system and cloud service accessing method |
CN104092602A (en) * | 2014-06-20 | 2014-10-08 | 裴兆欣 | Cloud computing gateway |
WO2016122545A1 (en) * | 2015-01-29 | 2016-08-04 | Hewlett Packard Enterprise Development Lp | Cloud-hosted user authentication |
CN106878269A (en) * | 2016-12-30 | 2017-06-20 | 广州中致易和网络科技有限公司 | A kind of network authentication platform |
Also Published As
Publication number | Publication date |
---|---|
CN107404485A (en) | 2017-11-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107404485B (en) | Self-verification cloud connection method and system thereof | |
JP7457173B2 (en) | Internet of Things (IOT) device management | |
CN110944330B (en) | MEC platform deployment method and device | |
AU2021200602B2 (en) | Virtual private networking based on peer-to-peer communication | |
JP4291213B2 (en) | Authentication method, authentication system, authentication proxy server, network access authentication server, program, and recording medium | |
EP3069493B1 (en) | Authentication system | |
WO2015102872A1 (en) | Split-application infrastructure | |
CA2914426C (en) | Method for authenticating a user, corresponding server, communications terminal and programs | |
CN101379795A (en) | address assignment by a DHCP server while client credentials are checked by an authentication server | |
JP2005519501A (en) | System, method and apparatus for single sign-on service | |
CN109429272A (en) | Shunt method and relevant device under a kind of roaming scence | |
EP3672160B1 (en) | Internet of things connectivity device and method | |
CN110505188A (en) | A kind of terminal authentication method, relevant device and Verification System | |
CN110401951A (en) | Authenticate the methods, devices and systems of terminal in WLAN | |
EP2612514B1 (en) | Network access | |
CN207706214U (en) | It is a kind of to connect system from verification cloud | |
US11871236B2 (en) | Method and a system for dynamic discovery of multi-access edge computing (MEC) applications | |
CN115086956A (en) | Network access method, network access device, medium, and electronic device for communication network | |
WO2014086652A1 (en) | Method of allowing communication between a secure element and a server | |
CN103428694A (en) | Split terminal single sign-on combined authentication method and system | |
CN112202799B (en) | Authentication system and method for realizing binding of user and/or terminal and SSID | |
Mortágua et al. | Enhancing 802.1 X authentication with identity providers using EAP-OAUTH and OAuth 2.0 | |
CN113626777A (en) | Identity authentication method, storage medium and electronic device | |
CN117014435A (en) | Private secure chat join mechanism for private communication architecture | |
CN117014251A (en) | Private substance gateway linking mechanism for private communication architecture |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |