CN110213230B - network security verification method and device for distributed communication - Google Patents
network security verification method and device for distributed communication Download PDFInfo
- Publication number
- CN110213230B CN110213230B CN201910344564.XA CN201910344564A CN110213230B CN 110213230 B CN110213230 B CN 110213230B CN 201910344564 A CN201910344564 A CN 201910344564A CN 110213230 B CN110213230 B CN 110213230B
- Authority
- CN
- China
- Prior art keywords
- authentication
- nodes
- identifier
- distributed communication
- node
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
- H04L67/146—Markers for unambiguous identification of a particular session, e.g. session cookie or URL-encoding
Abstract
The embodiment of the application provides network security verification methods for distributed communication, which include that a distributed communication node receives a communication request sent by a second distributed communication node, the distributed communication node and the second distributed communication node are service nodes, the distributed communication node judges whether the communication request includes an authentication identifier, when the communication request includes the authentication identifier, the authentication identifier is matched with the authentication identifier stored in the distributed communication node, whether the matching is successful is judged, and if the matching is successful, a communication connection with the second distributed communication node is established.
Description
Technical Field
The present application relates to the field of distributed communications technologies, and in particular, to network security verification methods and apparatuses for distributed communications.
Background
The distributed network which occupies an important component in the new -generation information technology is formed by interconnecting node machines which are distributed at different places and have a plurality of terminals, wherein any point in the network is connected with at least two lines, when any lines have faults, communication can be completed through other links, and the distributed network has high reliability.
Disclosure of Invention
In view of this, an object of the present application is to provide network security verification methods and apparatuses for distributed communication, so as to solve the technical problem that in the prior art, a distributed communication node has information security hidden trouble during a communication process.
In view of the above, in aspects of the present application, network security verification methods for distributed communication are provided, which include:
the distributed communication node receives the communication request sent by the second distributed communication node, the distributed communication node and the second distributed communication node are service nodes;
the distributed communication node judges whether the communication request includes the authentication identification;
when the communication request comprises an authentication identifier, matching the authentication identifier with an authentication identifier stored in the communication request, and judging whether the matching is successful;
and if the matching is successful, establishing communication connection with the second distributed communication node.
In embodiments, the method further comprises:
the method comprises the steps that a common identification mark is agreed among service nodes in advance, distributed communication nodes are selected from the service nodes to serve as authentication nodes, the authentication nodes perform signature authentication on the common identification mark by using digital certificates of the authentication nodes to generate an authentication mark, and the authentication mark is shared.
In embodiments, the selecting a distributed communication node from the service nodes as an authentication node specifically includes:
and selecting the authentication nodes from the service nodes according to a preset quantity ratio numerical value, wherein the quantity ratio numerical value is the ratio of the quantity of the authentication nodes to the quantity of all the service nodes.
In , the quantitative ratio may range from 0.5% to 1%.
In , before the authenticating node signs and authenticates the common identity with its own digital certificate, the method further includes:
judging whether the number of the authentication nodes is equal to 1 or not;
when the number of the authentication nodes is equal to 1, the authentication nodes perform signature authentication on the common identification by using the digital certificates of the authentication nodes, and the signature authentication comprises the following steps: and the authentication node performs signature authentication on the common identification by using a digital certificate of the authentication node.
In embodiments, the method further comprises:
when the number of the authentication nodes is larger than 1, the authentication nodes perform signature authentication on the common identification by using a digital certificate thereof, and the signature authentication method comprises the following steps:
and the plurality of authentication nodes perform signature authentication on the consensus identification by using the digital certificates of the authentication nodes until all the authentication nodes perform signature authentication on the consensus identification by using the digital certificates of the authentication nodes.
In embodiments, the method further comprises:
and after receiving the authentication identification, the service node stores the authentication identification.
In embodiments, the method further comprises:
and if the matching fails, refusing to establish communication connection with the second distributed communication node, and sharing the identity information of the second distributed communication node to other service nodes.
In another aspects of the present application, there is provided network security verification apparatus for distributed communication, including a plurality of distributed communication nodes, wherein each of the distributed communication nodes includes:
the communication request receiving module is used for receiving a communication request sent by a second distributed communication node;
the authentication identifier acquisition module is used for judging whether the communication request comprises an authentication identifier or not;
the authentication identifier matching module is used for matching the authentication identifier with an authentication identifier stored in the authentication identifier matching module when the communication request comprises the authentication identifier, and judging whether the matching is successful;
and the communication module is used for establishing communication connection with the second distributed communication node if the matching is successful.
In embodiments, the method further comprises:
the authentication identifier storage module is used for storing an authentication identifier, the authentication identifier is a consensus identifier which is obtained by performing signature authentication on the consensus identifier by using a digital certificate of the authentication node and sharing the consensus identifier, the consensus identifier is a consensus identifier agreed in advance between service nodes, and the authentication node is a distributed communication node selected from the service nodes.
The embodiment of the application provides network security verification methods for distributed communication, which include that a distributed communication node receives a communication request sent by a second distributed communication node, the distributed communication node and the second distributed communication node are service nodes, the distributed communication node judges whether the communication request includes an authentication identifier, when the communication request includes the authentication identifier, the authentication identifier is matched with the authentication identifier stored in the distributed communication node, whether the matching is successful is judged, and if the matching is successful, communication connection with the second distributed communication node is established.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
FIG. 1 is a flow chart of a network security authentication method for distributed communications of embodiment of the present application;
fig. 2 is a flowchart of a network security authentication method for distributed communication according to a second embodiment of the present application;
fig. 3 is a schematic structural diagram of a network security authentication apparatus for distributed communication according to a third embodiment of the present application.
Detailed Description
The present application is described in further detail in with reference to the drawings and the examples, it being understood that the specific examples are set forth herein for the purpose of illustration only and are not intended to be limiting.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the accompanying drawings in conjunction with embodiments.
As embodiments of the present application, as shown in fig. 1, it is a flowchart of a network security authentication method for distributed communication in embodiment of the present application, as can be seen from fig. 1, the network security authentication method for distributed communication provided by the present embodiment may include the following steps:
and S101, receiving a communication request sent by a second distributed communication node by a distributed communication node , wherein the distributed communication node and the second distributed communication node are service nodes.
In this embodiment and subsequent embodiments, the distributed communication node system is a receiver of a communication request, the second distributed communication node system is a sender of a communication request, the distributed communication node and the second distributed communication node transmit a communication request to the distributed communication node by the second distributed communication node when communicating, and the distributed communication node receives the communication request transmitted by the second distributed communication node, and then determines whether to establish a communication connection with the second distributed communication node according to the content of the communication request in step , and the determination process is shown in the subsequent embodiments.
And S102, the distributed communication node judges whether the communication request comprises an authentication identification.
In this embodiment, after the distributed communication node receives a communication request sent by a second distributed communication node, the communication request is parsed, where the communication request may include identity information of the second distributed communication node, for example, identification information allocated by a link system to the second distributed communication node, or account information of the second distributed communication node.
S103: and when the communication request comprises an authentication identifier, matching the authentication identifier with the authentication identifier stored in the communication request, and judging whether the matching is successful.
In this embodiment, after the distributed communication node parses the received communication request, and determines that the communication request includes the authentication identifier, the parsed authentication identifier may be matched with the authentication identifier stored in the node itself, and it is determined whether the received communication request includes the authentication identifier.
S104: and if the matching is successful, establishing communication connection with the second distributed communication node.
In this embodiment, after determining that the second distributed communication node is a distributed communication node with a pre-agreed consensus identifier through the authentication identifier in the communication request, a communication connection with the second distributed communication node may be established.
According to the network security verification method for distributed communication, the received communication request is verified, and communication connection with the communication request sender is established only after the verification is passed, so that the information security hidden danger of the distributed communication nodes in the communication process is effectively overcome, and malicious attack is avoided.
Fig. 2 is a flowchart of a network security verification method for distributed communication according to a second embodiment of the present application. In this embodiment, the network security verification method for distributed communication may include the following steps:
s201: the method comprises the steps that a common identification mark is agreed among service nodes in advance, distributed communication nodes are selected from the service nodes to serve as authentication nodes, the authentication nodes perform signature authentication on the common identification mark by using digital certificates of the authentication nodes to generate an authentication mark, and the authentication mark is shared.
In this embodiment, for communication security, groups may be formed among a plurality of distributed communication nodes, a consensus identifier may be agreed in advance between the distributed communication nodes in the group, the consensus identifier may be groups of character strings including numbers and/or letters, or encrypted information generated from the character strings by using a hash algorithm, and the character strings and the encrypted information may be represented in different forms, such as barcodes or two-dimensional codes.
S202: and after receiving the authentication identification, the service node stores the authentication identification.
And S101, receiving a communication request sent by a second distributed communication node by a distributed communication node , wherein the distributed communication node and the second distributed communication node are service nodes.
In this embodiment and subsequent embodiments, the distributed communication node system is a receiver of a communication request, the second distributed communication node system is a sender of a communication request, the distributed communication node and the second distributed communication node transmit a communication request to the distributed communication node by the second distributed communication node when communicating, and the distributed communication node receives the communication request transmitted by the second distributed communication node, and then determines whether to establish a communication connection with the second distributed communication node according to the content of the communication request in step , and the determination process is shown in the subsequent embodiments.
And S102, the distributed communication node judges whether the communication request comprises an authentication identification.
In this embodiment, after the distributed communication node receives a communication request sent by a second distributed communication node, the communication request is parsed, where the communication request may include identity information of the second distributed communication node, for example, identification information allocated by a link system to the second distributed communication node, or account information of the second distributed communication node.
S103: and when the communication request comprises an authentication identifier, matching the authentication identifier with the authentication identifier stored in the communication request, and judging whether the matching is successful.
In this embodiment, after the distributed communication node parses the received communication request, and determines that the communication request includes the authentication identifier, the parsed authentication identifier may be matched with the authentication identifier stored in the node itself, and it is determined whether the received communication request includes the authentication identifier.
S104: and if the matching is successful, establishing communication connection with the second distributed communication node.
In this embodiment, after determining that the second distributed communication node is a distributed communication node with a pre-agreed consensus identifier through the authentication identifier in the communication request, a communication connection with the second distributed communication node may be established.
According to the network security verification method for distributed communication, the received communication request is verified, and communication connection with the communication request sender is established only after the verification is passed, so that the information security hidden danger of the distributed communication nodes in the communication process is effectively overcome, and malicious attack is avoided.
As optional embodiments of the present application, in the above embodiments, selecting a distributed communication node from the service nodes as an authentication node specifically includes:
and selecting the authentication nodes from the service nodes according to a preset quantity ratio numerical value, wherein the quantity ratio numerical value is the ratio of the quantity of the authentication nodes to the quantity of all the service nodes. In general, the number of authentication nodes is not suitable to be large, and the value range of the proportional numerical value of the number of authentication nodes can be 0.5% to 1%.
After the authentication node is selected, before the authentication node uses its own digital certificate to perform signature authentication on the common identification, the method further includes:
judging whether the number of the authentication nodes is equal to 1 or not;
when the number of the authentication nodes is equal to 1, the authentication nodes utilize the digital certificates of the authentication nodes to perform signature authentication on the consensus identifiers, and the authentication nodes only need to utilize the digital certificates of the authentication nodes to perform signature authentication on the consensus identifiers.
When the number of the authentication nodes is larger than 1, the authentication nodes use the digital certificates of the authentication nodes to perform signature authentication on the consensus identifier, and then a plurality of authentication nodes need to use the digital certificates of the authentication nodes to perform signature authentication on the consensus identifier until all the authentication nodes use the digital certificates of the authentication nodes to perform signature authentication on the consensus identifier.
As optional embodiments of the present application, in the above embodiments, when the distributed communication node matches the authentication identifier with the authentication identifier stored in itself, and the matching fails, it indicates that the second distributed communication node is not a member distributed communication node that agrees in advance with the common identifier information, so that the distributed communication node may deny establishment of a communication connection with the second distributed communication node at , and share the identity information of the second distributed communication node with another service node.
The embodiments of the present application can achieve similar technical effects to those of the embodiments described above, and details are not repeated herein.
Fig. 3 is a schematic structural diagram of a network security verification apparatus for distributed communication according to a third embodiment of the present application. The network security verification apparatus for distributed communication in this embodiment includes a plurality of distributed communication nodes, where each of the distributed communication nodes includes:
a communication request receiving module 301, configured to receive a communication request sent by a second distributed communication node;
an authentication identifier obtaining module 302, configured to determine whether the communication request includes an authentication identifier;
the authentication identifier matching module 303 is configured to, when the communication request includes an authentication identifier, match the authentication identifier with an authentication identifier stored in the authentication identifier matching module, and determine whether the matching is successful;
a communication module 304, configured to establish a communication connection with the second distributed communication node if the matching is successful.
The embodiments of the present application can achieve similar technical effects as those of the embodiments of the method described above, and are not described herein again.
As optional embodiments of the apparatus of the present application, the network security authentication apparatus for distributed communication in the foregoing embodiments may further include:
the authentication identifier storage module is used for storing an authentication identifier, the authentication identifier is a consensus identifier which is obtained by performing signature authentication on the consensus identifier by using a digital certificate of the authentication node and sharing the consensus identifier, the consensus identifier is a consensus identifier agreed in advance between service nodes, and the authentication node is a distributed communication node selected from the service nodes.
The above description is only a preferred embodiment of the application and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the invention herein disclosed is not limited to the particular combination of features described above, but also encompasses other arrangements formed by any combination of the above features or their equivalents without departing from the spirit of the invention. For example, the above features and the technical features (but not limited to) having similar functions disclosed in the present application are mutually replaced to form the technical solution.
Claims (8)
1, A network security authentication method for distributed communication, comprising:
, the distributed communication node receives a communication request sent by a second distributed communication node, wherein the distributed communication node and the second distributed communication node are service nodes;
the distributed communication node judges whether the communication request includes the authentication identification;
when the communication request comprises an authentication identifier, matching the authentication identifier with an authentication identifier stored in the communication request, and judging whether the matching is successful;
if the matching is successful, establishing communication connection with the second distributed communication node;
the method comprises the steps that common identification marks are agreed among service nodes in advance, distributed communication nodes are selected from the service nodes to serve as authentication nodes, the authentication nodes perform signature authentication on the common identification marks by using digital certificates of the authentication nodes, authentication marks are generated, and the authentication marks are shared.
2. The method according to claim 1, wherein the selecting a distributed communication node from the service nodes as an authentication node specifically comprises:
and selecting the authentication nodes from the service nodes according to a preset quantity ratio numerical value, wherein the quantity ratio numerical value is the ratio of the quantity of the authentication nodes to the quantity of all the service nodes.
3. The method of claim 2, wherein the quantitative proportion value ranges from 0.5% to 1%.
4. The method of claim 3, wherein before the authentication node signs and authenticates the common identification by using its own digital certificate, the method further comprises:
judging whether the number of the authentication nodes is equal to 1 or not;
when the number of the authentication nodes is equal to 1, the authentication nodes perform signature authentication on the common identification by using the digital certificates of the authentication nodes, and the signature authentication comprises the following steps: and the authentication node performs signature authentication on the common identification by using a digital certificate of the authentication node.
5. The method of claim 4, further comprising:
when the number of the authentication nodes is larger than 1, the authentication nodes perform signature authentication on the common identification by using a digital certificate thereof, and the signature authentication method comprises the following steps:
and the plurality of authentication nodes utilize the digital certificates of the authentication nodes to perform signature authentication on the consensus identifier until all the authentication nodes perform signature authentication on the consensus identifier by utilizing the digital certificates of the authentication nodes.
6. The method of claim 5, further comprising:
and after receiving the authentication identification, the service node stores the authentication identification.
7. The method of any of , further comprising:
and if the matching fails, refusing to establish communication connection with the second distributed communication node, and sharing the identity information of the second distributed communication node to other service nodes.
8, A network security verification device for distributed communication, comprising a plurality of distributed communication nodes, wherein each of said distributed communication nodes comprises:
the communication request receiving module is used for receiving a communication request sent by a second distributed communication node;
the authentication identifier acquisition module is used for judging whether the communication request comprises an authentication identifier or not;
the authentication identifier matching module is used for matching the authentication identifier with an authentication identifier stored in the authentication identifier matching module when the communication request comprises the authentication identifier, and judging whether the matching is successful;
the communication module is used for establishing communication connection with the second distributed communication node if matching is successful;
the authentication identifier storage module is used for storing an authentication identifier, the authentication identifier is a consensus identifier which is obtained by authenticating and sharing a consensus identifier by an authentication node by using a digital certificate of the authentication node, the consensus identifier is a consensus identifier agreed in advance between service nodes, and the authentication node is a distributed communication node selected from the service nodes.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910344564.XA CN110213230B (en) | 2019-04-26 | 2019-04-26 | network security verification method and device for distributed communication |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910344564.XA CN110213230B (en) | 2019-04-26 | 2019-04-26 | network security verification method and device for distributed communication |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110213230A CN110213230A (en) | 2019-09-06 |
CN110213230B true CN110213230B (en) | 2020-01-31 |
Family
ID=67786522
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910344564.XA Active CN110213230B (en) | 2019-04-26 | 2019-04-26 | network security verification method and device for distributed communication |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110213230B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111949214B (en) * | 2020-08-07 | 2022-07-26 | 苏州浪潮智能科技有限公司 | Disk misoperation method, system, equipment and medium for preventing HANA cluster |
CN112491981A (en) * | 2020-11-13 | 2021-03-12 | 中信银行股份有限公司 | Distributed cache authentication method and device, electronic equipment and readable storage medium |
CN114172958B (en) * | 2021-11-19 | 2023-10-20 | 云从科技集团股份有限公司 | Privacy computing node, system, method, device and storage medium |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101771537A (en) * | 2008-12-26 | 2010-07-07 | 中国移动通信集团公司 | Processing method and certificating method for distribution type certificating system and certificates of certification thereof |
CN101815294A (en) * | 2009-02-20 | 2010-08-25 | 华为技术有限公司 | Access authentication method, equipment and system of P2P (peer-to-peer) network |
CN105635062A (en) * | 2014-10-31 | 2016-06-01 | 腾讯科技(上海)有限公司 | Network access equipment verification method and device |
CN106603234A (en) * | 2015-10-14 | 2017-04-26 | 阿里巴巴集团控股有限公司 | Method, device and system for device identity authentication |
CN108667618A (en) * | 2018-05-10 | 2018-10-16 | 阿里巴巴集团控股有限公司 | Data processing method, device, server and the system of block chain member management |
CN108769171A (en) * | 2018-05-18 | 2018-11-06 | 百度在线网络技术(北京)有限公司 | The copy of distributed storage keeps verification method, device, equipment and storage medium |
CN108985790A (en) * | 2018-06-25 | 2018-12-11 | 平安科技(深圳)有限公司 | Method for anti-counterfeit, system, computer equipment and storage medium based on block chain |
CN109495516A (en) * | 2019-01-07 | 2019-03-19 | 国网江苏省电力有限公司无锡供电分公司 | Electric power internet-of-things terminal cut-in method based on block chain |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9498384B2 (en) * | 2011-12-01 | 2016-11-22 | Leigh E. Wood | Assembled intermediate comprising staple fiber nonwoven web and articles |
-
2019
- 2019-04-26 CN CN201910344564.XA patent/CN110213230B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101771537A (en) * | 2008-12-26 | 2010-07-07 | 中国移动通信集团公司 | Processing method and certificating method for distribution type certificating system and certificates of certification thereof |
CN101815294A (en) * | 2009-02-20 | 2010-08-25 | 华为技术有限公司 | Access authentication method, equipment and system of P2P (peer-to-peer) network |
CN105635062A (en) * | 2014-10-31 | 2016-06-01 | 腾讯科技(上海)有限公司 | Network access equipment verification method and device |
CN106603234A (en) * | 2015-10-14 | 2017-04-26 | 阿里巴巴集团控股有限公司 | Method, device and system for device identity authentication |
CN108667618A (en) * | 2018-05-10 | 2018-10-16 | 阿里巴巴集团控股有限公司 | Data processing method, device, server and the system of block chain member management |
CN108769171A (en) * | 2018-05-18 | 2018-11-06 | 百度在线网络技术(北京)有限公司 | The copy of distributed storage keeps verification method, device, equipment and storage medium |
CN108985790A (en) * | 2018-06-25 | 2018-12-11 | 平安科技(深圳)有限公司 | Method for anti-counterfeit, system, computer equipment and storage medium based on block chain |
CN109495516A (en) * | 2019-01-07 | 2019-03-19 | 国网江苏省电力有限公司无锡供电分公司 | Electric power internet-of-things terminal cut-in method based on block chain |
Also Published As
Publication number | Publication date |
---|---|
CN110213230A (en) | 2019-09-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10862959B2 (en) | Consensus system and method for adding data to a blockchain | |
CN107483509B (en) | A kind of auth method, server and readable storage medium storing program for executing | |
CN109359691B (en) | Identity verification method and system based on block chain | |
US8769285B2 (en) | Methods and apparatus for deriving, communicating and/or verifying ownership of expressions | |
CN110213230B (en) | network security verification method and device for distributed communication | |
CN106464690B (en) | Security authentication method, configuration method and related equipment | |
CN111783068A (en) | Device authentication method, system, electronic device and storage medium | |
CN107086979B (en) | User terminal verification login method and device | |
CN108805571B (en) | Data protection method, platform, block chain node, system and storage medium | |
CN109714370B (en) | HTTP (hyper text transport protocol) -based cloud security communication implementation method | |
CN103795545A (en) | Safety communication method and system | |
CN111182545B (en) | Micro base station authentication method and terminal | |
CN109962878B (en) | Registration method and device of IMS (IP multimedia subsystem) user | |
CN101527632A (en) | Method, device and system for authenticating response messages | |
CN101155033B (en) | Method for confirming client identity | |
CN113055176A (en) | Terminal authentication method and system, terminal device, P2P verification platform and medium | |
CN108075895B (en) | Node permission method and system based on block chain | |
CN102036241A (en) | Authentication method and system | |
CN110602098A (en) | Identity authentication method, device, equipment and storage medium | |
CN111327561A (en) | Authentication method, system, authentication server, and computer-readable storage medium | |
CN109327475B (en) | Multi-layer identity authentication method, device, equipment and storage medium | |
CN104918245A (en) | Identity authentication method, device, server and client | |
CN114172923B (en) | Data transmission method, communication system and communication device | |
CN116074061A (en) | Data processing method and device for rail transit, electronic equipment and storage medium | |
CN106535179B (en) | WDS authentication method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |