CN110213230B - network security verification method and device for distributed communication - Google Patents

network security verification method and device for distributed communication Download PDF

Info

Publication number
CN110213230B
CN110213230B CN201910344564.XA CN201910344564A CN110213230B CN 110213230 B CN110213230 B CN 110213230B CN 201910344564 A CN201910344564 A CN 201910344564A CN 110213230 B CN110213230 B CN 110213230B
Authority
CN
China
Prior art keywords
authentication
nodes
identifier
distributed communication
node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910344564.XA
Other languages
Chinese (zh)
Other versions
CN110213230A (en
Inventor
牛鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Terminus Beijing Technology Co Ltd
Original Assignee
Terminus Beijing Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Terminus Beijing Technology Co Ltd filed Critical Terminus Beijing Technology Co Ltd
Priority to CN201910344564.XA priority Critical patent/CN110213230B/en
Publication of CN110213230A publication Critical patent/CN110213230A/en
Application granted granted Critical
Publication of CN110213230B publication Critical patent/CN110213230B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/146Markers for unambiguous identification of a particular session, e.g. session cookie or URL-encoding

Abstract

The embodiment of the application provides network security verification methods for distributed communication, which include that a distributed communication node receives a communication request sent by a second distributed communication node, the distributed communication node and the second distributed communication node are service nodes, the distributed communication node judges whether the communication request includes an authentication identifier, when the communication request includes the authentication identifier, the authentication identifier is matched with the authentication identifier stored in the distributed communication node, whether the matching is successful is judged, and if the matching is successful, a communication connection with the second distributed communication node is established.

Description

network security verification method and device for distributed communication
Technical Field
The present application relates to the field of distributed communications technologies, and in particular, to network security verification methods and apparatuses for distributed communications.
Background
The distributed network which occupies an important component in the new -generation information technology is formed by interconnecting node machines which are distributed at different places and have a plurality of terminals, wherein any point in the network is connected with at least two lines, when any lines have faults, communication can be completed through other links, and the distributed network has high reliability.
Disclosure of Invention
In view of this, an object of the present application is to provide network security verification methods and apparatuses for distributed communication, so as to solve the technical problem that in the prior art, a distributed communication node has information security hidden trouble during a communication process.
In view of the above, in aspects of the present application, network security verification methods for distributed communication are provided, which include:
the distributed communication node receives the communication request sent by the second distributed communication node, the distributed communication node and the second distributed communication node are service nodes;
the distributed communication node judges whether the communication request includes the authentication identification;
when the communication request comprises an authentication identifier, matching the authentication identifier with an authentication identifier stored in the communication request, and judging whether the matching is successful;
and if the matching is successful, establishing communication connection with the second distributed communication node.
In embodiments, the method further comprises:
the method comprises the steps that a common identification mark is agreed among service nodes in advance, distributed communication nodes are selected from the service nodes to serve as authentication nodes, the authentication nodes perform signature authentication on the common identification mark by using digital certificates of the authentication nodes to generate an authentication mark, and the authentication mark is shared.
In embodiments, the selecting a distributed communication node from the service nodes as an authentication node specifically includes:
and selecting the authentication nodes from the service nodes according to a preset quantity ratio numerical value, wherein the quantity ratio numerical value is the ratio of the quantity of the authentication nodes to the quantity of all the service nodes.
In , the quantitative ratio may range from 0.5% to 1%.
In , before the authenticating node signs and authenticates the common identity with its own digital certificate, the method further includes:
judging whether the number of the authentication nodes is equal to 1 or not;
when the number of the authentication nodes is equal to 1, the authentication nodes perform signature authentication on the common identification by using the digital certificates of the authentication nodes, and the signature authentication comprises the following steps: and the authentication node performs signature authentication on the common identification by using a digital certificate of the authentication node.
In embodiments, the method further comprises:
when the number of the authentication nodes is larger than 1, the authentication nodes perform signature authentication on the common identification by using a digital certificate thereof, and the signature authentication method comprises the following steps:
and the plurality of authentication nodes perform signature authentication on the consensus identification by using the digital certificates of the authentication nodes until all the authentication nodes perform signature authentication on the consensus identification by using the digital certificates of the authentication nodes.
In embodiments, the method further comprises:
and after receiving the authentication identification, the service node stores the authentication identification.
In embodiments, the method further comprises:
and if the matching fails, refusing to establish communication connection with the second distributed communication node, and sharing the identity information of the second distributed communication node to other service nodes.
In another aspects of the present application, there is provided network security verification apparatus for distributed communication, including a plurality of distributed communication nodes, wherein each of the distributed communication nodes includes:
the communication request receiving module is used for receiving a communication request sent by a second distributed communication node;
the authentication identifier acquisition module is used for judging whether the communication request comprises an authentication identifier or not;
the authentication identifier matching module is used for matching the authentication identifier with an authentication identifier stored in the authentication identifier matching module when the communication request comprises the authentication identifier, and judging whether the matching is successful;
and the communication module is used for establishing communication connection with the second distributed communication node if the matching is successful.
In embodiments, the method further comprises:
the authentication identifier storage module is used for storing an authentication identifier, the authentication identifier is a consensus identifier which is obtained by performing signature authentication on the consensus identifier by using a digital certificate of the authentication node and sharing the consensus identifier, the consensus identifier is a consensus identifier agreed in advance between service nodes, and the authentication node is a distributed communication node selected from the service nodes.
The embodiment of the application provides network security verification methods for distributed communication, which include that a distributed communication node receives a communication request sent by a second distributed communication node, the distributed communication node and the second distributed communication node are service nodes, the distributed communication node judges whether the communication request includes an authentication identifier, when the communication request includes the authentication identifier, the authentication identifier is matched with the authentication identifier stored in the distributed communication node, whether the matching is successful is judged, and if the matching is successful, communication connection with the second distributed communication node is established.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
FIG. 1 is a flow chart of a network security authentication method for distributed communications of embodiment of the present application;
fig. 2 is a flowchart of a network security authentication method for distributed communication according to a second embodiment of the present application;
fig. 3 is a schematic structural diagram of a network security authentication apparatus for distributed communication according to a third embodiment of the present application.
Detailed Description
The present application is described in further detail in with reference to the drawings and the examples, it being understood that the specific examples are set forth herein for the purpose of illustration only and are not intended to be limiting.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the accompanying drawings in conjunction with embodiments.
As embodiments of the present application, as shown in fig. 1, it is a flowchart of a network security authentication method for distributed communication in embodiment of the present application, as can be seen from fig. 1, the network security authentication method for distributed communication provided by the present embodiment may include the following steps:
and S101, receiving a communication request sent by a second distributed communication node by a distributed communication node , wherein the distributed communication node and the second distributed communication node are service nodes.
In this embodiment and subsequent embodiments, the distributed communication node system is a receiver of a communication request, the second distributed communication node system is a sender of a communication request, the distributed communication node and the second distributed communication node transmit a communication request to the distributed communication node by the second distributed communication node when communicating, and the distributed communication node receives the communication request transmitted by the second distributed communication node, and then determines whether to establish a communication connection with the second distributed communication node according to the content of the communication request in step , and the determination process is shown in the subsequent embodiments.
And S102, the distributed communication node judges whether the communication request comprises an authentication identification.
In this embodiment, after the distributed communication node receives a communication request sent by a second distributed communication node, the communication request is parsed, where the communication request may include identity information of the second distributed communication node, for example, identification information allocated by a link system to the second distributed communication node, or account information of the second distributed communication node.
S103: and when the communication request comprises an authentication identifier, matching the authentication identifier with the authentication identifier stored in the communication request, and judging whether the matching is successful.
In this embodiment, after the distributed communication node parses the received communication request, and determines that the communication request includes the authentication identifier, the parsed authentication identifier may be matched with the authentication identifier stored in the node itself, and it is determined whether the received communication request includes the authentication identifier.
S104: and if the matching is successful, establishing communication connection with the second distributed communication node.
In this embodiment, after determining that the second distributed communication node is a distributed communication node with a pre-agreed consensus identifier through the authentication identifier in the communication request, a communication connection with the second distributed communication node may be established.
According to the network security verification method for distributed communication, the received communication request is verified, and communication connection with the communication request sender is established only after the verification is passed, so that the information security hidden danger of the distributed communication nodes in the communication process is effectively overcome, and malicious attack is avoided.
Fig. 2 is a flowchart of a network security verification method for distributed communication according to a second embodiment of the present application. In this embodiment, the network security verification method for distributed communication may include the following steps:
s201: the method comprises the steps that a common identification mark is agreed among service nodes in advance, distributed communication nodes are selected from the service nodes to serve as authentication nodes, the authentication nodes perform signature authentication on the common identification mark by using digital certificates of the authentication nodes to generate an authentication mark, and the authentication mark is shared.
In this embodiment, for communication security, groups may be formed among a plurality of distributed communication nodes, a consensus identifier may be agreed in advance between the distributed communication nodes in the group, the consensus identifier may be groups of character strings including numbers and/or letters, or encrypted information generated from the character strings by using a hash algorithm, and the character strings and the encrypted information may be represented in different forms, such as barcodes or two-dimensional codes.
S202: and after receiving the authentication identification, the service node stores the authentication identification.
And S101, receiving a communication request sent by a second distributed communication node by a distributed communication node , wherein the distributed communication node and the second distributed communication node are service nodes.
In this embodiment and subsequent embodiments, the distributed communication node system is a receiver of a communication request, the second distributed communication node system is a sender of a communication request, the distributed communication node and the second distributed communication node transmit a communication request to the distributed communication node by the second distributed communication node when communicating, and the distributed communication node receives the communication request transmitted by the second distributed communication node, and then determines whether to establish a communication connection with the second distributed communication node according to the content of the communication request in step , and the determination process is shown in the subsequent embodiments.
And S102, the distributed communication node judges whether the communication request comprises an authentication identification.
In this embodiment, after the distributed communication node receives a communication request sent by a second distributed communication node, the communication request is parsed, where the communication request may include identity information of the second distributed communication node, for example, identification information allocated by a link system to the second distributed communication node, or account information of the second distributed communication node.
S103: and when the communication request comprises an authentication identifier, matching the authentication identifier with the authentication identifier stored in the communication request, and judging whether the matching is successful.
In this embodiment, after the distributed communication node parses the received communication request, and determines that the communication request includes the authentication identifier, the parsed authentication identifier may be matched with the authentication identifier stored in the node itself, and it is determined whether the received communication request includes the authentication identifier.
S104: and if the matching is successful, establishing communication connection with the second distributed communication node.
In this embodiment, after determining that the second distributed communication node is a distributed communication node with a pre-agreed consensus identifier through the authentication identifier in the communication request, a communication connection with the second distributed communication node may be established.
According to the network security verification method for distributed communication, the received communication request is verified, and communication connection with the communication request sender is established only after the verification is passed, so that the information security hidden danger of the distributed communication nodes in the communication process is effectively overcome, and malicious attack is avoided.
As optional embodiments of the present application, in the above embodiments, selecting a distributed communication node from the service nodes as an authentication node specifically includes:
and selecting the authentication nodes from the service nodes according to a preset quantity ratio numerical value, wherein the quantity ratio numerical value is the ratio of the quantity of the authentication nodes to the quantity of all the service nodes. In general, the number of authentication nodes is not suitable to be large, and the value range of the proportional numerical value of the number of authentication nodes can be 0.5% to 1%.
After the authentication node is selected, before the authentication node uses its own digital certificate to perform signature authentication on the common identification, the method further includes:
judging whether the number of the authentication nodes is equal to 1 or not;
when the number of the authentication nodes is equal to 1, the authentication nodes utilize the digital certificates of the authentication nodes to perform signature authentication on the consensus identifiers, and the authentication nodes only need to utilize the digital certificates of the authentication nodes to perform signature authentication on the consensus identifiers.
When the number of the authentication nodes is larger than 1, the authentication nodes use the digital certificates of the authentication nodes to perform signature authentication on the consensus identifier, and then a plurality of authentication nodes need to use the digital certificates of the authentication nodes to perform signature authentication on the consensus identifier until all the authentication nodes use the digital certificates of the authentication nodes to perform signature authentication on the consensus identifier.
As optional embodiments of the present application, in the above embodiments, when the distributed communication node matches the authentication identifier with the authentication identifier stored in itself, and the matching fails, it indicates that the second distributed communication node is not a member distributed communication node that agrees in advance with the common identifier information, so that the distributed communication node may deny establishment of a communication connection with the second distributed communication node at , and share the identity information of the second distributed communication node with another service node.
The embodiments of the present application can achieve similar technical effects to those of the embodiments described above, and details are not repeated herein.
Fig. 3 is a schematic structural diagram of a network security verification apparatus for distributed communication according to a third embodiment of the present application. The network security verification apparatus for distributed communication in this embodiment includes a plurality of distributed communication nodes, where each of the distributed communication nodes includes:
a communication request receiving module 301, configured to receive a communication request sent by a second distributed communication node;
an authentication identifier obtaining module 302, configured to determine whether the communication request includes an authentication identifier;
the authentication identifier matching module 303 is configured to, when the communication request includes an authentication identifier, match the authentication identifier with an authentication identifier stored in the authentication identifier matching module, and determine whether the matching is successful;
a communication module 304, configured to establish a communication connection with the second distributed communication node if the matching is successful.
The embodiments of the present application can achieve similar technical effects as those of the embodiments of the method described above, and are not described herein again.
As optional embodiments of the apparatus of the present application, the network security authentication apparatus for distributed communication in the foregoing embodiments may further include:
the authentication identifier storage module is used for storing an authentication identifier, the authentication identifier is a consensus identifier which is obtained by performing signature authentication on the consensus identifier by using a digital certificate of the authentication node and sharing the consensus identifier, the consensus identifier is a consensus identifier agreed in advance between service nodes, and the authentication node is a distributed communication node selected from the service nodes.
The above description is only a preferred embodiment of the application and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the invention herein disclosed is not limited to the particular combination of features described above, but also encompasses other arrangements formed by any combination of the above features or their equivalents without departing from the spirit of the invention. For example, the above features and the technical features (but not limited to) having similar functions disclosed in the present application are mutually replaced to form the technical solution.

Claims (8)

1, A network security authentication method for distributed communication, comprising:
, the distributed communication node receives a communication request sent by a second distributed communication node, wherein the distributed communication node and the second distributed communication node are service nodes;
the distributed communication node judges whether the communication request includes the authentication identification;
when the communication request comprises an authentication identifier, matching the authentication identifier with an authentication identifier stored in the communication request, and judging whether the matching is successful;
if the matching is successful, establishing communication connection with the second distributed communication node;
the method comprises the steps that common identification marks are agreed among service nodes in advance, distributed communication nodes are selected from the service nodes to serve as authentication nodes, the authentication nodes perform signature authentication on the common identification marks by using digital certificates of the authentication nodes, authentication marks are generated, and the authentication marks are shared.
2. The method according to claim 1, wherein the selecting a distributed communication node from the service nodes as an authentication node specifically comprises:
and selecting the authentication nodes from the service nodes according to a preset quantity ratio numerical value, wherein the quantity ratio numerical value is the ratio of the quantity of the authentication nodes to the quantity of all the service nodes.
3. The method of claim 2, wherein the quantitative proportion value ranges from 0.5% to 1%.
4. The method of claim 3, wherein before the authentication node signs and authenticates the common identification by using its own digital certificate, the method further comprises:
judging whether the number of the authentication nodes is equal to 1 or not;
when the number of the authentication nodes is equal to 1, the authentication nodes perform signature authentication on the common identification by using the digital certificates of the authentication nodes, and the signature authentication comprises the following steps: and the authentication node performs signature authentication on the common identification by using a digital certificate of the authentication node.
5. The method of claim 4, further comprising:
when the number of the authentication nodes is larger than 1, the authentication nodes perform signature authentication on the common identification by using a digital certificate thereof, and the signature authentication method comprises the following steps:
and the plurality of authentication nodes utilize the digital certificates of the authentication nodes to perform signature authentication on the consensus identifier until all the authentication nodes perform signature authentication on the consensus identifier by utilizing the digital certificates of the authentication nodes.
6. The method of claim 5, further comprising:
and after receiving the authentication identification, the service node stores the authentication identification.
7. The method of any of , further comprising:
and if the matching fails, refusing to establish communication connection with the second distributed communication node, and sharing the identity information of the second distributed communication node to other service nodes.
8, A network security verification device for distributed communication, comprising a plurality of distributed communication nodes, wherein each of said distributed communication nodes comprises:
the communication request receiving module is used for receiving a communication request sent by a second distributed communication node;
the authentication identifier acquisition module is used for judging whether the communication request comprises an authentication identifier or not;
the authentication identifier matching module is used for matching the authentication identifier with an authentication identifier stored in the authentication identifier matching module when the communication request comprises the authentication identifier, and judging whether the matching is successful;
the communication module is used for establishing communication connection with the second distributed communication node if matching is successful;
the authentication identifier storage module is used for storing an authentication identifier, the authentication identifier is a consensus identifier which is obtained by authenticating and sharing a consensus identifier by an authentication node by using a digital certificate of the authentication node, the consensus identifier is a consensus identifier agreed in advance between service nodes, and the authentication node is a distributed communication node selected from the service nodes.
CN201910344564.XA 2019-04-26 2019-04-26 network security verification method and device for distributed communication Active CN110213230B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910344564.XA CN110213230B (en) 2019-04-26 2019-04-26 network security verification method and device for distributed communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910344564.XA CN110213230B (en) 2019-04-26 2019-04-26 network security verification method and device for distributed communication

Publications (2)

Publication Number Publication Date
CN110213230A CN110213230A (en) 2019-09-06
CN110213230B true CN110213230B (en) 2020-01-31

Family

ID=67786522

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910344564.XA Active CN110213230B (en) 2019-04-26 2019-04-26 network security verification method and device for distributed communication

Country Status (1)

Country Link
CN (1) CN110213230B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111949214B (en) * 2020-08-07 2022-07-26 苏州浪潮智能科技有限公司 Disk misoperation method, system, equipment and medium for preventing HANA cluster
CN112491981A (en) * 2020-11-13 2021-03-12 中信银行股份有限公司 Distributed cache authentication method and device, electronic equipment and readable storage medium
CN114172958B (en) * 2021-11-19 2023-10-20 云从科技集团股份有限公司 Privacy computing node, system, method, device and storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101771537A (en) * 2008-12-26 2010-07-07 中国移动通信集团公司 Processing method and certificating method for distribution type certificating system and certificates of certification thereof
CN101815294A (en) * 2009-02-20 2010-08-25 华为技术有限公司 Access authentication method, equipment and system of P2P (peer-to-peer) network
CN105635062A (en) * 2014-10-31 2016-06-01 腾讯科技(上海)有限公司 Network access equipment verification method and device
CN106603234A (en) * 2015-10-14 2017-04-26 阿里巴巴集团控股有限公司 Method, device and system for device identity authentication
CN108667618A (en) * 2018-05-10 2018-10-16 阿里巴巴集团控股有限公司 Data processing method, device, server and the system of block chain member management
CN108769171A (en) * 2018-05-18 2018-11-06 百度在线网络技术(北京)有限公司 The copy of distributed storage keeps verification method, device, equipment and storage medium
CN108985790A (en) * 2018-06-25 2018-12-11 平安科技(深圳)有限公司 Method for anti-counterfeit, system, computer equipment and storage medium based on block chain
CN109495516A (en) * 2019-01-07 2019-03-19 国网江苏省电力有限公司无锡供电分公司 Electric power internet-of-things terminal cut-in method based on block chain

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9498384B2 (en) * 2011-12-01 2016-11-22 Leigh E. Wood Assembled intermediate comprising staple fiber nonwoven web and articles

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101771537A (en) * 2008-12-26 2010-07-07 中国移动通信集团公司 Processing method and certificating method for distribution type certificating system and certificates of certification thereof
CN101815294A (en) * 2009-02-20 2010-08-25 华为技术有限公司 Access authentication method, equipment and system of P2P (peer-to-peer) network
CN105635062A (en) * 2014-10-31 2016-06-01 腾讯科技(上海)有限公司 Network access equipment verification method and device
CN106603234A (en) * 2015-10-14 2017-04-26 阿里巴巴集团控股有限公司 Method, device and system for device identity authentication
CN108667618A (en) * 2018-05-10 2018-10-16 阿里巴巴集团控股有限公司 Data processing method, device, server and the system of block chain member management
CN108769171A (en) * 2018-05-18 2018-11-06 百度在线网络技术(北京)有限公司 The copy of distributed storage keeps verification method, device, equipment and storage medium
CN108985790A (en) * 2018-06-25 2018-12-11 平安科技(深圳)有限公司 Method for anti-counterfeit, system, computer equipment and storage medium based on block chain
CN109495516A (en) * 2019-01-07 2019-03-19 国网江苏省电力有限公司无锡供电分公司 Electric power internet-of-things terminal cut-in method based on block chain

Also Published As

Publication number Publication date
CN110213230A (en) 2019-09-06

Similar Documents

Publication Publication Date Title
US10862959B2 (en) Consensus system and method for adding data to a blockchain
CN107483509B (en) A kind of auth method, server and readable storage medium storing program for executing
CN109359691B (en) Identity verification method and system based on block chain
US8769285B2 (en) Methods and apparatus for deriving, communicating and/or verifying ownership of expressions
CN110213230B (en) network security verification method and device for distributed communication
CN106464690B (en) Security authentication method, configuration method and related equipment
CN111783068A (en) Device authentication method, system, electronic device and storage medium
CN107086979B (en) User terminal verification login method and device
CN108805571B (en) Data protection method, platform, block chain node, system and storage medium
CN109714370B (en) HTTP (hyper text transport protocol) -based cloud security communication implementation method
CN103795545A (en) Safety communication method and system
CN111182545B (en) Micro base station authentication method and terminal
CN109962878B (en) Registration method and device of IMS (IP multimedia subsystem) user
CN101527632A (en) Method, device and system for authenticating response messages
CN101155033B (en) Method for confirming client identity
CN113055176A (en) Terminal authentication method and system, terminal device, P2P verification platform and medium
CN108075895B (en) Node permission method and system based on block chain
CN102036241A (en) Authentication method and system
CN110602098A (en) Identity authentication method, device, equipment and storage medium
CN111327561A (en) Authentication method, system, authentication server, and computer-readable storage medium
CN109327475B (en) Multi-layer identity authentication method, device, equipment and storage medium
CN104918245A (en) Identity authentication method, device, server and client
CN114172923B (en) Data transmission method, communication system and communication device
CN116074061A (en) Data processing method and device for rail transit, electronic equipment and storage medium
CN106535179B (en) WDS authentication method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant