CN110401669A - A kind of proof of identity method and relevant device - Google Patents
A kind of proof of identity method and relevant device Download PDFInfo
- Publication number
- CN110401669A CN110401669A CN201910704436.1A CN201910704436A CN110401669A CN 110401669 A CN110401669 A CN 110401669A CN 201910704436 A CN201910704436 A CN 201910704436A CN 110401669 A CN110401669 A CN 110401669A
- Authority
- CN
- China
- Prior art keywords
- terminal
- identity
- legal
- data packet
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
Abstract
The present invention provides a kind of proof of identity method and relevant device, sends the data packet that terminal is sent this method comprises: receiving terminal and receiving.Data packet is parsed, the terminal identity mark in data packet is obtained.Verifying terminal identity identifies whether to be present in legal terminal list.If terminal identity mark is present in legal terminal list, determine that the transmission terminal identity for sending data packet is legal.In embodiments of the present invention, it receives terminal and identifies whether to be present in legal terminal list by verifying terminal identity, so that it is determined that whether the identity for sending terminal is legal, when terminal identity mark is present in legal terminal list, determine that the transmission terminal identity for sending data packet is legal, the wasting of resources of Cloud Server can be reduced, and the resource utilization of server can be reduced.
Description
Technical field
The present invention relates to technical field of information communication more particularly to a kind of proof of identity method and relevant devices.
Background technique
With the development of science and technology, Cloud Server supports a variety of data to calculate.But various data calculate required service
Device resource is different, and is needed rationally to utilize Cloud Server resource, is avoided the waste of Cloud Server resource.
In the prior art, cloud server receive send terminal be sent to receive terminal data packet when, cloud service
Whether device verification data packet is legal, since data packet does not have any value to cloud server, passes through cloud server school
Test whether data packet is legal, will lead to the serious waste of resources of Cloud Server.
Summary of the invention
In view of this, the embodiment of the present invention provides a kind of proof of identity method and relevant device, to solve in the prior art
The problem of waste of server resource.
To achieve the above object, the embodiment of the present invention provides the following technical solutions:
First aspect of the embodiment of the present invention discloses a kind of proof of identity method, which comprises
It receives and sends the data packet that terminal is sent, the data packet is with Preset Transfer format transmission, in the data packet extremely
It less include that terminal identity identifies;
The data packet is parsed, the terminal identity mark in the data packet is obtained;
It verifies the terminal identity to identify whether to be present in legal terminal list, be stored in the legal terminal list
The terminal identity of legal terminal identifies, and the legal terminal list is sent to the reception terminal by the Cloud Server;
If the terminal identity mark is present in the legal terminal list, determine that the transmission for sending the data packet is whole
Hold identity legal.
Optionally, the parsing data packet obtains the terminal identity mark in the data packet, comprising:
The data packet is parsed, the data with Preset Transfer structure are obtained, the Preset Transfer structure includes terminal body
Part identification field and operation data store field, and the data of the Preset Transfer structure are by transmission terminal according to Preset Transfer structure
Will serializing treated the terminal identity of itself mark and operation data carry out it is assembled after obtain;
The unserializing processing data with Preset Transfer structure, terminal identity mark after obtaining unserializing and
Operation data;
Terminal identity mark after unserializing is converted to the identifiable data of the reception terminal with operation data;
Obtain the terminal identity mark.
Optionally, after the determining transmission terminal identity for sending the data packet is legal, further includes:
The operation data is obtained, and corresponding operating is executed based on the operation data, and show corresponding live streaming picture.
Optionally, the verifying terminal identity identifies whether to be present in legal terminal list, comprising:
The legal terminal list is traversed, searching in all legal terminal lists whether there is and the terminal identity
Identify consistent terminal identity mark.
Optionally, further includes:
If the terminal identity mark is not present in the legal terminal list, the transmission for sending the data packet is determined
Terminal identity is illegal, and abandons the data packet.
Second aspect of the embodiment of the present invention discloses a kind of proof of identity method, is suitable for sending terminal, the method packet
It includes:
Acquisition executes the operation data generated when business operation;
Terminal identity mark to be spliced based on Preset Transfer structure is serialized with operation data, it is described pre-
If transmission structure includes terminal identity identification field and operation data storage field;
Based on the terminal identity mark after the operation data and serializing after Preset Transfer structures to form serializing, obtain
To data packet, the operation data after the serializing is stored in the operation data storage field, the terminal after the serializing
Identity is stored in the terminal identity identification field;
The data packet is sent to terminal is received, is wrapped based on the data for triggering the reception terminal to the transmission
Terminal carries out authentication.
The third aspect of the embodiment of the present invention discloses a kind of identity verification device, and described device includes:
Receiving unit, for receiving the data packet for sending terminal and sending, the data packet is with Preset Transfer format transmission, institute
It states and includes at least terminal identity mark in data packet;
Resolution unit obtains the terminal identity mark in the data packet for parsing the data packet;
Authentication unit identifies whether to be present in legal terminal list, the legal end for verifying the terminal identity
The terminal identity mark of legal terminal is stored in the list of end, the legal terminal list is sent to described by the Cloud Server
Receive terminal;
Determination unit determines described in sending if being present in the legal terminal list for terminal identity mark
The transmission terminal identity of data packet is legal.
Fourth aspect of the embodiment of the present invention discloses a kind of identity identity verification device, is suitable for sending terminal, the dress
It sets and includes:
Acquisition module, the operation data generated when executing business operation for acquiring;
Serialization module, for by the terminal identity to be spliced based on Preset Transfer structure mark and operation data into
Row serializing, the Preset Transfer structure include terminal identity identification field and operation data storage field;
Splicing module, for based on the end after the operation data and serializing after Preset Transfer structures to form serializing
Identity is held, data packet is obtained, the operation data after the serializing is stored in the operation data storage field, the sequence
Terminal identity mark after columnization is stored in the terminal identity identification field;
Sending module is based on the number for triggering the reception terminal for sending the data packet to terminal is received
Authentication is carried out to the transmission terminal according to packet.
The 5th aspect of the embodiment of the present invention discloses a kind of client, comprising:
Processor and memory;
Wherein, the processor is for executing the program stored in the memory;
The memory is for storing program, and described program is for executing the body as disclosed in first aspect of the embodiment of the present invention
Auth method disclosed in part verification method or second aspect of the embodiment of the present invention.
The 6th aspect of the embodiment of the present invention discloses a kind of storage medium, and the storage medium includes storage program, wherein
Identity disclosed in equipment where the storage medium is executed such as first aspect of the embodiment of the present invention is controlled in described program operation
Verification method, or execute the auth method as disclosed in second aspect of the embodiment of the present invention.
The proof of identity method and relevant device provided based on the embodiments of the present invention, this method comprises: receiving terminal
It receives and sends the data packet that terminal is sent, include that terminal identity identifies in data packet.Data packet is parsed, the end in data packet is obtained
Hold identity.Verifying terminal identity identifies whether to be present in legal terminal list, and it is legal to be stored in legal terminal list
The terminal identity of terminal identifies, and legal terminal list is sent to the reception terminal by Cloud Server.If terminal identity mark is deposited
It is in legal terminal list, determines that the transmission terminal identity for sending data packet is legal.In embodiments of the present invention, terminal is received
It identifies whether to be present in legal terminal list by verifying terminal identity, so that it is determined that whether the identity for sending terminal is legal,
When terminal identity mark is present in legal terminal list, the determining transmission terminal identity for sending data packet is legal.It can reduce
The wasting of resources of Cloud Server, and reduce the resource utilization of Cloud Server.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
The embodiment of invention for those of ordinary skill in the art without creative efforts, can also basis
The attached drawing of offer obtains other attached drawings.
Fig. 1 is the application architecture figure of multiple terminals provided in an embodiment of the present invention and Cloud Server;
Fig. 2 is the schematic diagram that Cloud Server provided in an embodiment of the present invention sends legal terminal list to the whole network terminal;
Fig. 3 is the application schematic diagram that transmission terminal provided in an embodiment of the present invention generates data packet;
Fig. 4 is that reception terminal provided in an embodiment of the present invention receives the application schematic diagram for sending terminal data packet;
Fig. 5 is a kind of flow diagram of proof of identity method provided in an embodiment of the present invention;
Fig. 6 is the flow diagram of another proof of identity method provided in an embodiment of the present invention;
Fig. 7 is the flow diagram of specific parsing data packet provided in an embodiment of the present invention;
Fig. 8 is that a kind of user terminal provided in an embodiment of the present invention executes the display interface figure after adjustment operation;
Fig. 9 is a kind of structural block diagram of identity verification device provided in an embodiment of the present invention;
Figure 10 is the structural block diagram of another identity verification device provided in an embodiment of the present invention;
Figure 11 is a kind of structural block diagram of client provided in an embodiment of the present invention;
Figure 12 is the structural block diagram of another identity verification device provided in an embodiment of the present invention;
Figure 13 is the structural block diagram of another client provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
In this application, the terms "include", "comprise" or any other variant thereof is intended to cover non-exclusive inclusion,
So that the process, method, article or equipment for including a series of elements not only includes those elements, but also including not having
The other element being expressly recited, or further include for elements inherent to such a process, method, article, or device.Do not having
There is the element limited in the case where more limiting by sentence "including a ...", it is not excluded that in the mistake including the element
There is also other identical elements in journey, method, article or equipment.
It can be seen from background technology that, cloud server receive send terminal and be sent to the data packet for receiving terminal when, cloud clothes
Whether device verification data packet of being engaged in is legal, since data packet does not have any value to cloud server, passes through cloud server
It whether legal verifies data packet, will lead to the serious waste of resources of Cloud Server.
As shown in Figure 1, the application architecture figure of multiple terminals provided by the invention and Cloud Server.
The application architecture of multiple terminal and Cloud Server includes Cloud Server 11, terminal 12, terminal 13, terminal 14, end
End 15 and terminal 16.
Realize that the treatment process for proof of identity includes: based on the processing framework
In the specific application process, Cloud Server 11 obtains the terminal identity mark of legal terminal in real time, and is added to conjunction
In method terminal list, which is sent to the whole network terminal.Terminal identity mark refers to user in live streaming application
After registration, Cloud Server 11 distributes to a number of the terminal, which is unique mode for distinguishing terminal identity.
Specifically, Cloud Server 11 is according to the IP address of terminal distribution one after user registers in the live streaming application of terminal
A number gives the terminal.For example, after user registers in the live streaming application for the terminal that IP address is 120.11.31, Cloud Server
It is ID135426 according to the number that the IP address distributes to terminal.
As shown in Fig. 2, the schematic diagram of legal terminal list is sent to the whole network terminal for Cloud Server.
It is at this time live streaming terminal for the terminal 12 of live streaming when main broadcaster is broadcast live by terminal 12.User passes through terminal
The live content of the corresponding direct broadcasting room of 13 viewing live streaming terminals, the terminal 13 for watching live streaming is user terminal at this time.When it
It, can also be using other terminals as user terminal when his user is broadcast live using the viewing of other terminals.
Live streaming terminal acquires itself and executes the operation data generated after operation, which is handled, and will place
Operation data and the terminal identity of itself after reason identify and are spliced according to Preset Transfer structure, obtain sending to user terminal
Data packet.
In the concrete realization, terminal is broadcast live, that is, sends terminal and is obtained using following manner to reception terminal transmission
Data packet:
It then treats and is spelled based on Preset Transfer structure firstly, acquisition executes the operation data generated when business operation
The terminal identity mark and operation data connect is serialized, and the Preset Transfer structure includes terminal identity identification field and behaviour
Make data storage field;Then, based on the end after the operation data and serializing after Preset Transfer structures to form serializing
Identity is held, data packet is obtained, finally, sending the data packet to terminal is received, is based on for triggering the reception terminal
The data packet carries out authentication to the transmission terminal.Specifically, the operation data after the serializing be stored in it is described
Operation data stores field, and the terminal identity mark after the serializing is stored in the terminal identity identification field.
As shown in figure 3, be specifically illustrated in conjunction with live streaming terminal disclosed above and user terminal, such as: eventually by live streaming
It holds collected operation data to be converted, i.e., operation data is serialized, obtain the operation data indicated with byte format are as follows:
1001,0010,1100,0110,1001,0010,1100,0110.By the operation data with byte format instruction according to default
After regularly arranged alignment, uid:1234 is identified as with the terminal identity of itself.According to Preset Transfer structure as shown in Table 1 into
Row splicing, obtains corresponding data packet.
Table 1:
Data structure | Int64 | Any |
Meaning | uid | businessData |
Position (Byte) | [0,8) | [8,infiitas) |
As shown in table 1, which refers to that terminal identity identifies, for example, the terminal identity is identified as ID123564.It is pre- at this
If in transmission structure, the uid occupy in the Preset Transfer structure [0,8) byte, the uid with have the 64 of symbol it is whole
Corresponding terminal identity mark is stored in corresponding byte by the format of type variable.The businessData is business datum,
The businessData is used particularly as transport vehicle for storage service data, in the Preset Transfer in the Preset Transfer structure
Occupied in structure [8, infiitas) byte.
As shown in figure 4, user terminal receives the data packet that live streaming terminal is sent by network channel, and data packet is parsed,
Obtain the data with Preset Transfer structure.Data with Preset Transfer structure are converted to the identifiable number of user terminal
According to.Obtain terminal identity mark and the operation data in the data.
Whether the identity of user terminal verification live streaming terminal is legal, i.e., user terminal verifying terminal identity identifies whether
It is present in legal terminal list, if the live streaming terminal is present in legal terminal list, illustrates that verification passes through, display executes
Corresponding live streaming picture after the operation data.If the live streaming terminal is not present in legal terminal list, illustrate verification not
Pass through, abandons the data packet.
The processing framework shown based on the above embodiment verifies live streaming terminal identity by user terminal and identifies whether exist
In legal terminal list, in order to determine that it is legal that live streaming terminal identity identifies whether, if live streaming terminal identity mark is legal,
Display executes corresponding live streaming picture after the operation data, if live streaming terminal identity mark is illegal, packet discard.From
And the wasting of resources of Cloud Server can be reduced, and reduce the resource utilization of Cloud Server.
Transmission terminal can be specially live streaming terminal shown in fig. 1 shown in the embodiment of the present invention, and receiving terminal can be with
User terminal specially shown in fig. 1, Cloud Server can be specially Cloud Server shown in fig. 1.
Based on processing framework disclosed in the embodiments of the present invention, referring to Fig. 5, for a kind of body provided in an embodiment of the present invention
The flow diagram of part method of calibration.The method is suitable for receiving terminal, which implements the mistake of proof of identity
Journey the following steps are included:
Step S501: it receives and sends the data packet that terminal is sent.
In step S501, the data packet includes at least terminal body with Preset Transfer format transmission in the data packet
Part mark and operation data.
During implementing step S501, the data packet is sent to described by transmission terminal by network channel
Receive terminal.
Specifically, send terminal by collected operation data format afterwards with the terminal identity of itself mark by
Spliced according to Preset Transfer structure, obtains the data packet sent to user terminal.
It should be noted that the network channel can be communication transmission passage, wherein the communication transmission passage is supported
The communication transmission technologies such as 4G, wife and LTE can be set according to actual conditions, and the application is without restriction.
Step S502: parsing the data packet, obtains the terminal identity mark in the data packet.
It during implementing step S502, receives terminal and the data packet is parsed, obtain having default
Data with Preset Transfer structure are converted to the identifiable data of user terminal, obtain the tool by the data of transmission structure
There is the terminal identity mark in the data of Preset Transfer structure.
Step S503: it verifies the terminal identity and identifies whether to be present in legal terminal list, if the terminal identity
Mark be present in the legal terminal list, execute step S504, if the terminal identity mark be not present in it is described legal
In terminal list, step S505 is executed.
In step S503, legal terminal identity, the legal terminal column are stored in the legal terminal list
Table is sent to the reception terminal by the Cloud Server.
It should be noted that the legal terminal list is sent to the process packet for receiving terminal by the Cloud Server
It includes:
Terminal is pre-established with Cloud Server and is contacted.
Whether the N number of terminal of Cloud Server real-time detection completes registration information, when the completion registration information for detecting terminal
When, to N number of terminal distribution number (i.e. terminal identity mark).Terminal identity is identified into deposit legal terminal list, that is, updates and closes
Method terminal list.
The legal terminal list of update is sent to reception terminal by the Cloud Server in real time, and N is whole more than or equal to 1
Number.
It should be noted that before the reception terminal receives the legal terminal list that the Cloud Server is sent,
The terminal that receives distrusts any transmission terminal for sending data packet.The terminal that receives receives what the Cloud Server was sent
After the legal terminal list, the reception terminal trusts the legal transmission terminal in the legal terminal list.
During specifically executing step S503, the legal terminal list is traversed, searches all legal terminals
Consistent terminal identity mark is identified with the presence or absence of with the terminal identity in list.It is identified if finding with the terminal identity
Consistent terminal identity mark, thens follow the steps S504, identifies consistent terminal body with the terminal identity if not finding
Part mark, thens follow the steps S505.
Step S504: determine that the transmission terminal identity for sending the data packet is legal.
Step S505: it determines that the transmission terminal identity for sending the data packet is illegal, and abandons the data packet.
During implementing step S505, determine that the transmission terminal identity for sending the data packet is illegal, and
Remove the data packet that the transmission terminal is sent.
In the embodiment of the present invention, receives terminal and identifies whether to be present in legal terminal list by verifying terminal identity,
So that it is determined that whether the identity for sending terminal is legal, it is present in legal terminal list when terminal identity identifies, determines and send number
It is legal according to the transmission terminal identity of packet.The present invention is by that can reduce in the legitimacy for receiving client checks transmission terminal identity
The wasting of resources of Cloud Server, and reduce the resource utilization of Cloud Server.
Based on the proof of identity method shown in embodiments of the present invention Fig. 5, executing, step S504 shown in Fig. 5 is true
Surely send the data packet send the legal specific implementation process of terminal identity after, in conjunction with Fig. 5, with reference to Fig. 6, the identity
Method of calibration further include:
Step S506: obtaining the operation data in the data, and shows the corresponding live streaming picture of the operation data.
During implementing step S506, the operation data received in the identifiable data of terminal is obtained,
And the corresponding live streaming picture of the operation data is shown in the reception terminal.
In embodiments of the present invention, by the way that after determining that the identity for sending terminal is legal, receiving terminal can be directly displayed
Operation data shows corresponding live streaming picture.So as to reduce the resource utilization of Cloud Server.
Based on proof of identity method disclosed above, the data packet is parsed executing step S502 shown in Fig. 5, is obtained
During taking the terminal identity in the data packet to identify, as shown in fig. 7, comprises following steps:
Step S701: parsing the data packet, obtains the data with Preset Transfer structure.
In step s 701, the Preset Transfer structure includes that terminal identity identification field and operation data store field,
For details, reference can be made to the Preset Transfer structures shown in upper table 1.The data of the Preset Transfer structure are by transmission terminal according to default biography
Defeated structure will serialize treated the terminal identity of itself mark and operation data carry out it is assembled after obtain.
The operation data generated after business operation is executed it should be noted that sending terminal and acquiring itself, by the operand
Serializing processing is carried out according to itself terminal identity mark, and by the terminal body of serializing treated operation data and itself
Part mark is spliced according to Preset Transfer structure, obtains the data packet sent to user terminal.
Step S702: the unserializing processing data with Preset Transfer structure, the terminal after obtaining unserializing
Identity and operation data.
Step S703: the data with Preset Transfer structure are converted to the identifiable data of the reception terminal.
During implementing step S703, the transmission terminal itself is executed into the operation data generated after operation
It is converted to the identifiable operation data of the reception terminal.
Step S704: terminal identity mark is obtained.
In the embodiment of the present invention, by parsing data packet, the data with Preset Transfer structure are obtained.And will have default
The data of transmission structure, which are converted to, receives the identifiable data of terminal.The terminal identity mark in the data is obtained again.So as to
Send the proof of identity of terminal in reception terminal.The resource utilization of Cloud Server can be reduced.
More preferably to illustrate proof of identity method disclosed in the embodiments of the present invention, below with the proof of identity side
Method for specific application example, is specifically described on " sound console ".
Assuming that live streaming terminal is legal terminal, terminal identity is identified as ID123564, is obtained simultaneously by Cloud Server in advance
It is stored in legal terminal list.During live streaming, when live streaming terminal executes in live streaming application by the progress F.F. of song
2.5 seconds, and corresponding operation data are generated, after then being handled the operation data, it is sent to the user terminal.The user is whole
Whether end can show that executing the operation data is broadcast live picture later, and the identity to live streaming terminal is needed to verify.
The live streaming terminal can send terminal for the embodiments of the present invention are disclosed, which can be above-mentioned
Inventive embodiments are disclosed to receive terminal.Based on auth method disclosed in the embodiments of the present invention, to the above process into
Row illustrates.Include:
Firstly, live streaming terminal acquisition is by progress F.F. 2.5 seconds of song, the corresponding operation data of generation.
Then, serializing processing is carried out to the operation data, obtains indicating with the format that 8 binary numbers are a byte
Operation data.And by the operation data indicated using the format that 8 binary numbers are a byte according to using 4 bytes as boundary
Sequence alignment.
Then, treated that the terminal identity of itself identifies for operation data after will be aligned and same serializing
ID123564 is spliced according to Preset Transfer structure, obtains the data packet sent to user terminal, and send out by network channel
Give user terminal.
For user terminal during the corresponding live streaming of viewing transmission terminal, receive live streaming terminal transmission carries terminal
The data packet of identity ID123564 and operation data.
Firstly, user terminal parses data packet, the data with preset data structure are obtained.
Then, the user terminal unserializing processing data with Preset Transfer structure, after obtaining unserializing
Terminal identity mark and operation data, that is, obtain terminal identity mark ID123564 and the operation data in the data.
Then, which is identified into ID123564 and operation data is converted to the identifiable data of user terminal.
Then, user terminal traverses the legal terminal list being previously received, and searching whether there is in legal terminal list
It is identified with the consistent terminal identity of terminal identity mark ID123564.
It is identified if finding in legal terminal list with the consistent terminal identity of ID123564, determines the body of the live streaming terminal
Part mark is legal, shows song progress by the live streaming picture after F.F. 2.5 seconds in user terminal.
After Fig. 8 shows the above-mentioned authentication of user terminal execution, display is executed in the data packet that live streaming terminal is sent
Corresponding live streaming picture after operation data.The operation data is song progress operation data corresponding to F.F. 2.5 seconds.
In embodiments of the present invention, during live streaming, live streaming terminal acquisition executes the operand generated when business operation
According to, after then being handled operation data, be sent to the user terminal, user terminal by verify terminal identity identify whether to deposit
It is in legal terminal list, so that it is determined that whether the identity of live streaming terminal is legal, when terminal identity mark is present in legal end
It holds in list, determines that the live streaming terminal identity for sending data packet is legal, display live streaming picture.The present invention is by receiving terminal school
The legitimacy for sending terminal identity is issued after examination and approval, the wasting of resources of Cloud Server can be reduced, and reduce the utilization of resources of Cloud Server
Rate.
Corresponding with proof of identity method disclosed in the embodiments of the present invention, also correspondence of the embodiment of the present invention discloses one
Kind identity verification device, as shown in figure 9, the identity verification device includes:
Receiving unit 901, for receiving the data packet for sending terminal and sending.
It should be noted that including that terminal identity identifies in the data packet.
Resolution unit 902 obtains the terminal identity mark in the data packet for parsing the data packet.
Authentication unit 903 identified whether to be present in legal terminal list, if the end for verifying the terminal identity
End identity is present in the legal terminal list, then executes determination unit.If the terminal identity mark is present in institute
It states in legal terminal list, then executes discarding unit.
It should be noted that the terminal identity mark of legal terminal is stored in the legal terminal list, it is described legal
Terminal list is sent to the reception terminal by the Cloud Server.
Determination unit 904, for determining that the transmission terminal identity for sending the data packet is legal.
Discarding unit 905 for determining that the transmission terminal identity for sending the data packet is illegal, and abandons the data
Packet.
It should be noted that the specific principle of each unit in identity verification device disclosed in the embodiments of the present invention
And implementation procedure, it is identical as aforementioned present invention implementation proof of identity method, reference can be made to identity disclosed in the embodiments of the present invention
Corresponding part, is not discussed here in method of calibration.
In the embodiment of the present invention, the data packet for sending terminal and sending is received by receiving unit.It is parsed using resolution unit
Data packet obtains the terminal identity identification marking in data packet.Authentication unit verifying terminal identity is recycled to identify whether exist
In legal terminal list, so that it is determined that whether the identity for sending terminal is legal, when terminal identity mark is present in legal terminal
In list, determination unit determines that the transmission terminal identity for sending data packet is legal.The present invention is by receiving client checks transmission
The legitimacy of terminal identity can reduce the wasting of resources of Cloud Server, and reduce the resource utilization of Cloud Server.
Based on the identity verification device shown in above-mentioned Fig. 9, the verification unit 903 is specifically used for:
The legal terminal list is traversed, searching in all legal terminal lists whether there is and the terminal identity
Identify consistent terminal identity mark.
In embodiments of the present invention, it can search by traversing legal terminal list and identify consistent terminal with terminal identity
Identity, can avoid the transmission terminal not in legal terminal list also has the problem of legitimacy, improves the peace for sending terminal
Quan Xing.And then reduce the wasting of resources of Cloud Server.
Based on the identity verification device shown in above-mentioned Fig. 9, offer of the embodiment of the present invention is shown with reference to Figure 10 in conjunction with Fig. 9
A kind of identity verification device structural block diagram, described device further include:
Display unit 906 for obtaining operation data in the data packet, and is shown based on the operation data corresponding
Picture is broadcast live.
In the embodiment of the present invention, by the way that after determining that the identity for sending terminal is legal, behaviour can be directly displayed by receiving terminal
Make data and shows corresponding live streaming picture.So as to reduce the resource utilization of Cloud Server.
Based on identity verification device disclosed in the embodiments of the present invention, above-mentioned each unit can be by one kind by handling
The hardware device that device and memory are constituted is realized.
The embodiment of the present invention also provides a kind of client, as shown in figure 11, shows one kind provided in an embodiment of the present invention
The structural block diagram of client, the client 110 include: processor 111 and memory 112.
Processor 111, for executing the program stored in memory 112
Memory 112, for storing program, which is at least used for: it receives and sends the data packet that terminal is sent, data packet
With Preset Transfer format transmission, terminal identity mark and operation data are included at least in data packet;Data packet is parsed, data are obtained
Terminal identity mark in packet;Verifying terminal identity identifies whether to be present in legal terminal list, deposits in legal terminal list
The terminal identity mark of legal terminal is contained, legal terminal list is sent to reception terminal by Cloud Server;If terminal identity mark
Knowledge is present in legal terminal list, determines that the transmission terminal identity for sending data packet is legal.
On the other hand, the embodiment of the present invention also provides a kind of storage medium, and it is executable that computer is stored in storage medium
Instruction, when computer executable instructions are loaded and executed by processor, for realizing described in any one embodiment as above
's.In conclusion the embodiment of the present invention provides a kind of identity verify method and device, this method are as follows: receive terminal and receive transmission
The data packet that terminal is sent includes that terminal identity identifies in data packet.Data packet is parsed, the terminal identity mark in data packet is obtained
Know.Verifying terminal identity identifies whether to be present in legal terminal list, and the end of legal terminal is stored in legal terminal list
Identity is held, legal terminal list is sent to the reception terminal by Cloud Server.If it is legal that terminal identity mark is present in
In terminal list, determine that the transmission terminal identity for sending data packet is legal.It realizes and does not need Cloud Server verification, it will be able to is right
The identity of terminal is verified, to save the wasting of resources of Cloud Server, and saves the resource utilization of Cloud Server.
Corresponding with proof of identity method disclosed in the embodiments of the present invention, also correspondence of the embodiment of the present invention discloses one
Kind identity verification device, as shown in figure 12, the identity verification device includes:
Acquisition module 1201, the operation data generated when executing business operation for acquiring.
Serialization module 1202, for by the terminal identity to be spliced based on Preset Transfer structure mark and operand
According to being serialized, the Preset Transfer structure includes terminal identity identification field and operation data storage field.
Splicing module 1203, after based on the operation data and serializing after Preset Transfer structures to form serializing
Terminal identity mark, obtain data packet.
Wherein, the operation data after the serializing is stored in the operation data storage field, after the serializing
Terminal identity mark is stored in the terminal identity identification field.
Sending module 1204 is based on institute for triggering the reception terminal for sending the data packet to terminal is received
It states data packet and authentication is carried out to the transmission terminal.
It should be noted that the specific principle of each unit in identity verification device disclosed in the embodiments of the present invention
And implementation procedure, it is identical as aforementioned present invention implementation proof of identity method, reference can be made to identity disclosed in the embodiments of the present invention
Corresponding part, is not discussed here in method of calibration.
In the embodiment of the present invention, pass through the operation data generated when acquisition unit acquisition execution business operation.Utilize sequence
Change module is treated the terminal identity mark spliced based on Preset Transfer structure and is serialized with operation data, Preset Transfer
Structure includes terminal identity identification field and operation data storage field.Splicing module is recycled to be based on Preset Transfer structures to form
Terminal identity mark after operation data and serializing after serializing, obtains data packet, the operation data storage after serializing
Field is stored in operation data, the terminal identity mark after serializing is stored in the terminal identity identification field.Using hair
Unit is sent to send data packet to receiving terminal.The present invention is by the way that client checks transmission data packet is received, triggering receives terminal base
Authentication is carried out to terminal is sent in data packet, the wasting of resources of Cloud Server can be reduced, and reduce Cloud Server
Resource utilization.
Based on identity verification device disclosed in the embodiments of the present invention, above-mentioned each unit can be by one kind by handling
The hardware device that device and memory are constituted is realized.
The embodiment of the present invention also provides a kind of client, as shown in figure 13, shows one kind provided in an embodiment of the present invention
The structural block diagram of client, the client 130 include: processor 131 and memory 132.
Processor 131, for executing the program stored in memory 132
Memory 132, for storing program, which is at least used for: acquisition executes the operand generated when business operation
According to;It treats the terminal identity mark spliced based on Preset Transfer structure to be serialized with operation data, Preset Transfer knot
Structure includes terminal identity identification field and operation data storage field;Based on the operand after the serializing of Preset Transfer structures to form
It is identified according to the terminal identity after serializing, obtains data packet, the operation data after serializing is stored in operation data storage word
Section, the terminal identity mark after serializing are stored in terminal identity identification field;Data packet is sent to terminal is received, for triggering
Terminal is received to be wrapped based on the data to transmission terminal progress authentication.
On the other hand, the embodiment of the present invention also provides a kind of storage medium, and it is executable that computer is stored in storage medium
Instruction, when computer executable instructions are loaded and executed by processor, for realizing described in any one embodiment as above
's.In conclusion the embodiment of the present invention provides a kind of identity verify method and device,
In conclusion the embodiment of the present invention provides a kind of identity verify method and device, this method are as follows: acquisition execution business
The operation data generated when operation;Treat the terminal identity mark and operation data progress spliced based on Preset Transfer structure
Serializing;Based on the terminal identity mark after the operation data and serializing after the serializing of Preset Transfer structures to form, counted
According to packet;Data packet is sent to receiving terminal.The present invention is by the way that client checks transmission data packet is received, triggering receives terminal and is based on
Data packet carries out authentication to terminal is sent, and can reduce the wasting of resources of Cloud Server, and reduce the money of Cloud Server
Source utilization rate.
It should be noted that all the embodiments in this specification are described in a progressive manner, each embodiment weight
Point explanation is the difference from other embodiments, and the same or similar parts between the embodiments can be referred to each other.
For device class embodiment, since it is basically similar to the method embodiment, so being described relatively simple, related place ginseng
See the part explanation of embodiment of the method.
Finally, it is to be noted that, herein, relational terms such as first and second and the like be used merely to by
One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation
Between there are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant meaning
Covering non-exclusive inclusion, so that the process, method, article or equipment for including a series of elements not only includes that
A little elements, but also including other elements that are not explicitly listed, or further include for this process, method, article or
The intrinsic element of equipment.In the absence of more restrictions, the element limited by sentence "including a ...", is not arranged
Except there is also other identical elements in the process, method, article or apparatus that includes the element.
The foregoing description of the disclosed embodiments can be realized those skilled in the art or using the present invention.To this
A variety of modifications of a little embodiments will be apparent for a person skilled in the art, and the general principles defined herein can
Without departing from the spirit or scope of the present invention, to realize in other embodiments.Therefore, the present invention will not be limited
It is formed on the embodiments shown herein, and is to fit to consistent with the principles and novel features disclosed in this article widest
Range.
The above is only a preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art
For member, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications are also answered
It is considered as protection scope of the present invention.
Claims (10)
1. a kind of proof of identity method, which is characterized in that be suitable for receiving terminal, which comprises
It receives and sends the data packet that terminal is sent, the data packet is at least wrapped in the data packet with Preset Transfer format transmission
Include terminal identity mark;
The data packet is parsed, the terminal identity mark in the data packet is obtained;
It verifies the terminal identity to identify whether to be present in legal terminal list, it is legal to be stored in the legal terminal list
The terminal identity of terminal identifies, and the legal terminal list is sent to the reception terminal by the Cloud Server;
If the terminal identity mark is present in the legal terminal list, the transmission terminal body for sending the data packet is determined
Part is legal.
2. the method according to claim 1, wherein the parsing data packet, obtains in the data packet
Terminal identity mark, comprising:
The data packet is parsed, the data with Preset Transfer structure are obtained, the Preset Transfer structure includes terminal identity mark
Section and the operation data of becoming literate store field, and the data of the Preset Transfer structure are by transmission terminal according to Preset Transfer structure by sequence
Columnization treated the terminal identity of itself mark and operation data carry out it is assembled after obtain;
The unserializing processing data with Preset Transfer structure, terminal identity mark and operation after obtaining unserializing
Data;
Terminal identity mark after unserializing is converted to the identifiable data of the reception terminal with operation data;
Obtain the terminal identity mark.
3. according to the method described in claim 2, it is characterized in that, the determining transmission terminal identity for sending the data packet
After legal, further includes:
The operation data is obtained, and corresponding operating is executed based on the operation data, and show corresponding live streaming picture.
4. the method according to claim 1, wherein the verifying terminal identity identifies whether to be present in conjunction
In method terminal list, comprising:
The legal terminal list is traversed, searches in all legal terminal lists and is identified with the presence or absence of with the terminal identity
Consistent terminal identity mark.
5. the method according to claim 1, wherein further include:
If the terminal identity mark is not present in the legal terminal list, the transmission terminal for sending the data packet is determined
Identity is illegal, and abandons the data packet.
6. a kind of proof of identity method, which is characterized in that be suitable for sending terminal, which comprises
Acquisition executes the operation data generated when business operation;
Terminal identity mark to be spliced based on Preset Transfer structure is serialized with operation data, the default biography
Defeated structure includes terminal identity identification field and operation data storage field;
Based on the terminal identity mark after the operation data and serializing after Preset Transfer structures to form serializing, counted
According to packet, the operation data after the serializing is stored in the operation data storage field, the terminal identity after the serializing
Mark is stored in the terminal identity identification field;
The data packet is sent to terminal is received, is wrapped based on the data for triggering the reception terminal to the transmission terminal
Carry out authentication.
7. a kind of identity verification device, which is characterized in that described device includes:
Receiving unit, for receiving the data packet for sending terminal and sending, the data packet is with Preset Transfer format transmission, the number
It is identified according to terminal identity is included at least in packet;
Resolution unit obtains the terminal identity mark in the data packet for parsing the data packet;
Authentication unit identifies whether to be present in legal terminal list for verifying the terminal identity, the legal terminal column
The terminal identity mark of legal terminal is stored in table, the legal terminal list is sent to the reception by the Cloud Server
Terminal;
Determination unit determines if being present in the legal terminal list for terminal identity mark and sends the data
The transmission terminal identity of packet is legal.
8. a kind of identity verification device, which is characterized in that be suitable for sending terminal, described device includes:
Acquisition module, the operation data generated when executing business operation for acquiring;
Serialization module, for the mark of the terminal identity to be spliced based on Preset Transfer structure and operation data to be carried out sequence
Columnization, the Preset Transfer structure include terminal identity identification field and operation data storage field;
Splicing module, for based on the terminal body after the operation data and serializing after Preset Transfer structures to form serializing
Part mark, obtains data packet, and the operation data after the serializing is stored in the operation data storage field, the serializing
Terminal identity mark afterwards is stored in the terminal identity identification field;
Sending module is wrapped for sending the data packet to terminal is received for triggering the reception terminal based on the data
Authentication is carried out to the transmission terminal.
9. a kind of client characterized by comprising
Processor and memory;
Wherein, the processor is for executing the program stored in the memory;
The memory is for storing program, and described program is for executing such as authentication as claimed in any one of claims 1 to 5
Method executes auth method as claimed in claim 6.
10. a kind of storage medium, which is characterized in that the storage medium includes storage program, wherein in described program operation
Equipment where controlling the storage medium executes such as proof of identity method as claimed in any one of claims 1 to 5, or execution and such as weighs
Benefit require 6 described in proof of identity method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910704436.1A CN110401669B (en) | 2019-07-31 | 2019-07-31 | Identity verification method and related equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910704436.1A CN110401669B (en) | 2019-07-31 | 2019-07-31 | Identity verification method and related equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110401669A true CN110401669A (en) | 2019-11-01 |
CN110401669B CN110401669B (en) | 2021-06-11 |
Family
ID=68327044
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910704436.1A Active CN110401669B (en) | 2019-07-31 | 2019-07-31 | Identity verification method and related equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110401669B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111277602A (en) * | 2020-01-23 | 2020-06-12 | 奇安信科技集团股份有限公司 | Network data packet identification processing method and device, electronic equipment and storage medium |
CN114422167A (en) * | 2021-12-02 | 2022-04-29 | 深信服科技股份有限公司 | Network access control method, device, electronic equipment and storage medium |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101193068A (en) * | 2006-11-21 | 2008-06-04 | 华为技术有限公司 | A response request method and device |
CN104038514A (en) * | 2013-03-05 | 2014-09-10 | 福建星网视易信息系统有限公司 | Method and system for realizing mobile interconnection services, data center, and mobile terminal |
US20150043561A1 (en) * | 2012-04-24 | 2015-02-12 | Huawei Technologies Co., Ltd. | Wireless network access technology |
CN106161385A (en) * | 2015-04-15 | 2016-11-23 | 腾讯科技(上海)有限公司 | The long-range control method of a kind of equipment and device |
WO2017190668A1 (en) * | 2016-05-05 | 2017-11-09 | 腾讯科技(深圳)有限公司 | Identity verification method and device |
CN108011873A (en) * | 2017-11-28 | 2018-05-08 | 江苏方天电力技术有限公司 | A kind of illegal connection determination methods based on set covering |
CN108322443A (en) * | 2017-12-30 | 2018-07-24 | 京信通信系统(中国)有限公司 | Equipment interactive communication method, apparatus, storage medium and computer equipment |
CN108881966A (en) * | 2018-04-13 | 2018-11-23 | 武汉斗鱼网络科技有限公司 | A kind of information processing method and relevant device |
CN109982099A (en) * | 2019-03-25 | 2019-07-05 | 广州华多网络科技有限公司 | List imposition layout method, apparatus, computer equipment and storage medium is broadcast live |
-
2019
- 2019-07-31 CN CN201910704436.1A patent/CN110401669B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101193068A (en) * | 2006-11-21 | 2008-06-04 | 华为技术有限公司 | A response request method and device |
US20150043561A1 (en) * | 2012-04-24 | 2015-02-12 | Huawei Technologies Co., Ltd. | Wireless network access technology |
CN104038514A (en) * | 2013-03-05 | 2014-09-10 | 福建星网视易信息系统有限公司 | Method and system for realizing mobile interconnection services, data center, and mobile terminal |
CN106161385A (en) * | 2015-04-15 | 2016-11-23 | 腾讯科技(上海)有限公司 | The long-range control method of a kind of equipment and device |
WO2017190668A1 (en) * | 2016-05-05 | 2017-11-09 | 腾讯科技(深圳)有限公司 | Identity verification method and device |
CN108011873A (en) * | 2017-11-28 | 2018-05-08 | 江苏方天电力技术有限公司 | A kind of illegal connection determination methods based on set covering |
CN108322443A (en) * | 2017-12-30 | 2018-07-24 | 京信通信系统(中国)有限公司 | Equipment interactive communication method, apparatus, storage medium and computer equipment |
CN108881966A (en) * | 2018-04-13 | 2018-11-23 | 武汉斗鱼网络科技有限公司 | A kind of information processing method and relevant device |
CN109982099A (en) * | 2019-03-25 | 2019-07-05 | 广州华多网络科技有限公司 | List imposition layout method, apparatus, computer equipment and storage medium is broadcast live |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111277602A (en) * | 2020-01-23 | 2020-06-12 | 奇安信科技集团股份有限公司 | Network data packet identification processing method and device, electronic equipment and storage medium |
CN114422167A (en) * | 2021-12-02 | 2022-04-29 | 深信服科技股份有限公司 | Network access control method, device, electronic equipment and storage medium |
CN114422167B (en) * | 2021-12-02 | 2024-04-09 | 深信服科技股份有限公司 | Network access control method and device, electronic equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN110401669B (en) | 2021-06-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11818142B2 (en) | Distributed data authentication and validation using blockchain | |
CN110311899A (en) | Multiservice system access method, device and server | |
CN103428179B (en) | A kind of log in the method for many domain names website, system and device | |
CN107967416A (en) | The methods, devices and systems of copyright right-safeguarding detection | |
CN106656849B (en) | Message rate-limiting method and device | |
CN105100067B (en) | A kind of high in the clouds Activiation method and system | |
CN104767714B (en) | A kind of ID and the correlating method of user resources information, terminal and system | |
CN106131175A (en) | A kind of acquisition of information, information-pushing method and equipment | |
CN110401669A (en) | A kind of proof of identity method and relevant device | |
CN103944889B (en) | A kind of method and certificate server of network user's online identity certification | |
CN110071806A (en) | The method and system of data processing based on interface check | |
CN106060097B (en) | A kind of management system and management method of information security contest | |
CN110049046A (en) | Access control method, terminal, server and system | |
CN108566374A (en) | A kind of application method for down loading and its system, block chain node device, terminal | |
CN110417787A (en) | A kind of data processing method, device, client and storage medium | |
CN107333151B (en) | A kind of video flowing address method for authenticating and device | |
CN109547172A (en) | Data transmission method, system and data transmitting equipment, data receiver | |
CN106548043A (en) | A kind of authorization method of application program, installation method, installation end and system | |
CN110417905B (en) | Contract issuing method, device, equipment and union chain system | |
CN108063748A (en) | A kind of user authen method, apparatus and system | |
CN110213671A (en) | A kind of short-sighted frequency of hot spot determines method and apparatus | |
CN108228197A (en) | A kind of method and apparatus for installing software in the cluster | |
CN112181599B (en) | Model training method, device and storage medium | |
CN110301127A (en) | Device and method for predictive token authentication | |
CN104469427B (en) | Data transmission method and terminal and server |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20210113 Address after: 510000 3108, 79 Wanbo 2nd Road, Nancun Town, Panyu District, Guangzhou City, Guangdong Province Applicant after: GUANGZHOU CUBESILI INFORMATION TECHNOLOGY Co.,Ltd. Address before: 28th floor, block B1, Wanda Plaza, Nancun Town, Panyu District, Guangzhou City, Guangdong Province Applicant before: GUANGZHOU HUADUO NETWORK TECHNOLOGY Co.,Ltd. |
|
TA01 | Transfer of patent application right | ||
GR01 | Patent grant | ||
GR01 | Patent grant |