CN111064749A - Network connection method, device and storage medium - Google Patents

Network connection method, device and storage medium Download PDF

Info

Publication number
CN111064749A
CN111064749A CN201911403821.9A CN201911403821A CN111064749A CN 111064749 A CN111064749 A CN 111064749A CN 201911403821 A CN201911403821 A CN 201911403821A CN 111064749 A CN111064749 A CN 111064749A
Authority
CN
China
Prior art keywords
information
user
digital identity
login
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911403821.9A
Other languages
Chinese (zh)
Other versions
CN111064749B (en
Inventor
池畅
贺靖民
石鑫
高翔
赵金水
王立峰
迟建
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN201911403821.9A priority Critical patent/CN111064749B/en
Publication of CN111064749A publication Critical patent/CN111064749A/en
Application granted granted Critical
Publication of CN111064749B publication Critical patent/CN111064749B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0892Network architectures or network communication protocols for network security for authentication of entities by using authentication-authorization-accounting [AAA] servers or protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the application provides a network connection method, equipment and a storage medium, wherein the method comprises the following steps: when receiving the internet access request sent by the terminal, the digital identity server automatically acquires login information associated with digital identity information corresponding to user information of a user from the blockchain, and then sends the login information of the user to the terminal, so that the terminal automatically performs network connection according to the login information of the user. Therefore, in the embodiment of the application, the terminal can automatically perform network connection according to the login information of the user sent by the digital identity server, and the user does not need to manually input a password, so that the login process is optimized on one hand, and the privacy information of the user can be effectively protected on the other hand.

Description

Network connection method, device and storage medium
Technical Field
The present application relates to the field of internet technologies, and in particular, to a network connection method, device, and storage medium.
Background
With the rapid development of the mobile internet, the internet has penetrated into various aspects of people's lives, such as clothes, food, live, go, leisure and entertainment. In an environment with Wireless Local Area Network (WLAN) coverage, how to access WLAN services is crucial for various applications.
In the prior art, a user needs to click a wireless internet access (WiFi) hotspot of an operator in a terminal, and then input a user account and a password on a portal page popped up in the terminal to connect to a wireless network. When the user inputs the wrong password, the terminal cannot be successfully connected with the wireless network, and the user needs to input the user account and the password again. Or, when the user forgets the password, the terminal cannot connect to the wireless network.
Therefore, the login process of the conventional terminal when the terminal is connected with the network is complicated.
Disclosure of Invention
The embodiment of the application provides a network connection method, equipment and a storage medium, and solves the technical problem that the login process is complex when a terminal is connected with a network in the prior art.
In a first aspect, an embodiment of the present application provides a network connection method, including:
receiving an internet surfing request sent by a terminal; wherein, the request for surfing the internet comprises: user information of a user;
acquiring digital identity information of the user from a block chain according to the user information;
acquiring login information of the user from the block chain according to the digital identity information of the user;
and sending the login information of the user to the terminal, wherein the login information is used for the terminal to carry out network connection.
In a possible implementation manner, before the receiving a network access request sent by a terminal, the method further includes:
receiving a registration request sent by the terminal; wherein, the registration request includes: user information of the user;
verifying whether the user information of the user is correct;
if the user information is verified to be correct information, inquiring digital identity information corresponding to the user information according to the intelligent contract; and if the digital identity information corresponding to the user information is not inquired, generating the digital identity information corresponding to the user information according to the intelligent contract.
In one possible implementation manner, after the generating digital identity information corresponding to the user information according to the smart contract, the method further includes:
sending a registration response to the terminal; wherein the registration response is used to indicate that the registration was successful; and/or the presence of a gas in the gas,
and storing the user information and the digital identity information into the block chain in an associated manner.
In a possible implementation manner, after verifying whether the user information of the user is correct, the method further includes:
sending a registration response to the terminal; if the user information is verified to be correct information and digital identity information corresponding to the user information is inquired according to the intelligent contract, the registration response is used for indicating that the user information is registered with the corresponding digital identity information; or, if the user information is verified to be error information, the registration response is used for indicating that the registration fails.
In a possible implementation manner, before the receiving a network access request sent by a terminal, the method further includes:
receiving a login request sent by the terminal; wherein, the login request includes: user information of the user;
verifying whether the user information of the user is correct;
sending a login response to the terminal; if the user information is verified to be correct information, the login response is used for indicating that the login is successful; or, if the user information is verified to be error information, the login response is used for indicating that the login fails.
In a possible implementation manner, after the sending the login information of the user to the terminal, the method further includes:
receiving network connection indication information sent by an AAA server, wherein the network connection indication information is used for indicating whether the network connection of the terminal is successful or not;
sending the network connection indication information to the terminal;
if the AAA server verifies that the login information is correct information, the network connection indication information is used for indicating that the network connection of the terminal is successful; or, if the AAA server verifies that the login information is error information, the network connection indication information is used to indicate that the network connection of the terminal fails.
In a second aspect, an embodiment of the present application provides a network connection method, including:
sending an internet surfing request to a digital identity server; wherein, the request for surfing the internet comprises: user information of a user;
receiving login information of the user, which is sent by the digital identity server, wherein the login information is obtained by the digital identity server from a blockchain and is associated with digital identity information corresponding to the user information of the user;
and performing network connection according to the login information.
In a possible implementation manner, the performing network connection according to the login information includes:
sending the login information to an AAA server;
receiving network connection indication information sent by the digital identity server; the network connection indication information is used for indicating whether the network connection of the terminal is successful or not;
if the AAA server verifies that the login information is correct information, the network connection indication information is used for indicating that the network connection of the terminal is successful; or, if the AAA server verifies that the login information is error information, the network connection indication information is used to indicate that the network connection of the terminal fails.
In a possible implementation manner, before the receiving the login information of the user sent by the digital identity server, the method further includes:
sending a registration request to the digital identity server; wherein, the registration request includes: user information of the user;
receiving a registration response sent by the digital identity server after verifying the user information of the user;
if the digital identity server verifies that the user information is correct information, digital identity information corresponding to the user information is not inquired according to an intelligent contract, and digital identity information corresponding to the user information is generated according to the intelligent contract, the registration response is used for indicating that the registration is successful; or, if the digital identity server verifies that the user information is correct information and inquires digital identity information corresponding to the user information according to an intelligent contract, the registration response is used for indicating that the user information is registered with corresponding digital identity information; or, if the digital identity server verifies that the user information is error information, the registration response is used for indicating that the registration fails.
In a possible implementation manner, before the receiving the login information of the user sent by the digital identity server, the method further includes:
sending a login request to the digital identity server; wherein, the login request includes: user information of the user;
receiving a login response sent by the digital identity server after verifying the user information of the user; if the digital identity server verifies that the user information is correct information, the login response is used for indicating that the login is successful; or, if the digital identity server verifies that the user information is error information, the login response is used for indicating login failure.
In a third aspect, an embodiment of the present application provides a server, where the server is a digital identity server, and the digital identity server includes:
the first receiving module is used for receiving an internet surfing request sent by the terminal; wherein, the request for surfing the internet comprises: user information of a user;
the first acquisition module is used for acquiring the digital identity information of the user from the block chain according to the user information;
the second acquisition module is used for acquiring the login information of the user from the block chain according to the digital identity information of the user;
and the first sending module is used for sending the login information of the user to the terminal, wherein the login information is used for the terminal to carry out network connection.
In a fourth aspect, an embodiment of the present application provides a terminal, including:
the first sending module is used for sending an internet surfing request to the digital identity server; wherein, the request for surfing the internet comprises: user information of a user;
a first receiving module, configured to receive login information of the user sent by the digital identity server, where the login information is login information associated with digital identity information corresponding to user information of the user, which is acquired by the digital identity server from a blockchain;
and the connection module is used for carrying out network connection according to the login information.
In a fifth aspect, an embodiment of the present application provides an electronic device, including: a memory and a processor;
wherein the memory is to store program instructions;
the processor is configured to call and execute the program instructions stored in the memory, and when the processor executes the program instructions stored in the memory, the electronic device is configured to execute any implementation manner of the first aspect or the method of any implementation manner of the second aspect.
In a sixth aspect, an embodiment of the present application provides a computer-readable storage medium, where instructions are stored, and when the instructions are executed on a computer, the instructions cause the computer to perform any implementation manner of the first aspect or the method of any implementation manner of the second aspect.
In the network connection method, the device, and the storage medium provided in the embodiments of the present application, when receiving an internet access request sent by the terminal, the digital identity server automatically obtains login information associated with digital identity information corresponding to user information of the user from the blockchain, and then sends the login information of the user to the terminal, so that the terminal automatically performs network connection according to the login information of the user. Therefore, compared with the existing mode that the terminal needs to manually input the user account and the password, the terminal in the embodiment of the application can automatically perform network connection according to the login information of the user sent by the digital identity server, and the user does not need to manually input the password, so that the login process is optimized, and the privacy information of the user can be effectively protected.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to these drawings without inventive exercise.
Fig. 1 is a schematic view of an application scenario provided in an embodiment of the present application;
FIG. 2 is a schematic diagram of a system framework provided by an embodiment of the present application;
fig. 3 is a schematic diagram of a hyper book architecture provided in an embodiment of the present application;
fig. 4 is a schematic diagram of a deployment structure of a super ledger provided in an embodiment of the present application;
fig. 5 is a flowchart illustrating a network connection method according to an embodiment of the present application;
fig. 6 is a flowchart illustrating a network connection method according to another embodiment of the present application;
fig. 7 is a flowchart illustrating a network connection method according to another embodiment of the present application;
fig. 8 is a flowchart illustrating a network connection method according to another embodiment of the present application;
fig. 9 is a flowchart illustrating a network connection method according to another embodiment of the present application;
fig. 10 is a flowchart illustrating a network connection method according to another embodiment of the present application;
fig. 11 is a flowchart illustrating a network connection method according to another embodiment of the present application;
fig. 12 is a flowchart illustrating a network connection method according to another embodiment of the present application;
fig. 13 is a flowchart illustrating a network connection method according to another embodiment of the present application;
fig. 14 is a schematic structural diagram of a server according to an embodiment of the present application;
fig. 15 is a schematic structural diagram of a terminal according to an embodiment of the present application;
fig. 16 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
First, an application scenario and a part of vocabulary related to the embodiments of the present application will be described.
In the prior art, a user needs to click a wireless internet access (WiFi) hotspot of an operator in a terminal, and then input a user account and a password on a portal page popped up in the terminal to connect to a wireless network. When the user inputs the wrong password, the terminal cannot be successfully connected with the wireless network, and the user needs to input the user account and the password again. Or, when the user forgets the password, the terminal cannot connect to the wireless network. Therefore, the login process of the conventional terminal when the terminal is connected with the network is complicated.
Fig. 1 is an application scenario schematic diagram provided in the embodiment of the present application, and as shown in fig. 1, the application scenario schematic diagram in the embodiment of the present application may include, but is not limited to: a terminal 10, a digital identity server 11, a portal server 12, a broadband access server (BRAS) 13, an AAA (authentication association) server 14, and a blockchain 15.
In the embodiment of the present application, when the terminal 10 is connected to a network, the digital identity server 11 automatically obtains login information of a user from the blockchain 15, where the login information of the user is login information associated with digital identity information corresponding to user information of the user, which is obtained by the digital identity server 11 from the blockchain 15, in order to solve a technical problem that a login procedure when an existing terminal is connected to the network is relatively complicated. Then, the terminal 10 can automatically perform network connection based on the login information. Therefore, in the embodiment of the application, by combining the digital identity information and the block chain technology with the WLAN access network technology, when the terminal is connected to the network, the terminal can automatically perform network connection according to the login information associated with the digital identity information of the user and sent by the digital identity server, and the user does not need to manually input a password, so that on one hand, the login process is optimized, and on the other hand, the user privacy information can be effectively protected.
For example, the terminal 10 may automatically send the login information of the user to the BRAS 13 through the portal server 12, so that the BRAS 13 may authenticate the login information of the user to the AAA server 14; further, the terminal 10 receives network connection instruction information, which is transmitted by the digital identity server 11 and instructs whether the network connection of the terminal 10 is successful, wherein the network connection instruction information may be transmitted by the AAA server 14 to the portal server 12 through the BRAS 13 after the user's login information is verified, and then the portal server 12 is transmitted to the digital identity server 11.
The block chain related in the embodiment of the application stores the association information between the user information of the user and the digital identity information of the user, and the association information between the digital identity information of the user and the login information of the user; certainly, the block chain also stores the association information between the user information and the digital identity information of other users, and the association information between the digital identity information and the login information of other users.
The block chain technology adopted in the embodiment of the application has the following characteristics:
(1) effective protection of user privacy
The block chain asymmetric encryption mechanism in the block chain technology can effectively guarantee user privacy information, such as user information, digital identity information, login information, network connection record information and the like. On one hand, the private information of the user can be guaranteed not to be used by anyone at will, and the use right is in the hand of the user (not in the hand of a business). On the other hand, in the transaction process, the private information of both parties can be well encrypted, the knowledge of other people about the transaction behavior is limited in the process level, and the information of both parties is not public and transparent.
(2) Information not to be tampered with
Once user identity information, etc. is verified and added to the blockchain, it is permanently stored, and unless more than 51% of the nodes in the blockchain system can be controlled simultaneously, the modification of data at a single node is invalid, and therefore, the stability and reliability of the data stored in the blockchain are high.
(3) Traceability of internet access behavior
The block chain stores all historical data through the block data structure, and any one piece of data on the block chain can trace back the source of the block chain through the chain structure. The characteristic of the block chain enables all internet surfing behaviors of the user to be completely recorded, and the internet surfing behaviors are accurately matched with digital identity information so as to be convenient for management of a supervision department.
(4) Ease of use of user terminal
In the embodiment of the application, the corresponding login information is acquired from the block chain according to the digital identity information, and then the WLAN network is automatically logged in according to the login information corresponding to the digital identity information, so that the login mode is simple and easy to use.
(5) Extensibility
After the blockchain alliance chain is established, if other systems or equipment want to use information such as user identities in the blockchain alliance chain, services can be rapidly expanded after corresponding management authorization and technical authorization are carried out.
The terminal 10 referred to in the embodiments of the present application may include, but is not limited to, any one of the following: a mobile phone, a tablet computer, a notebook computer or a desktop computer; of course, other devices having a network connection function may also be included, which is not limited in the embodiment of the present application.
Fig. 2 is a schematic diagram of a system framework provided in an embodiment of the present application, and as shown in fig. 2, the system framework of the embodiment of the present application may include, but is not limited to, at least one of the following: a network layer, a platform layer, a block chain layer, an application layer, or a management layer. Among them, the portal server 12, BRAS 13, AAA server 14, etc. (not shown in fig. 2) can be deployed in the network layer. The platform layer can be deployed with a big data platform, a container platform and a cloud computing platform.
The block chain layer is provided with a block chain and an intelligent contract. The blockchain may include, but is not limited to: the node and the consensus cluster are organized, wherein a block chain in the embodiment of the present application may adopt a hyper-ledger framework (hyper-ledger fabric). Smart contracts may include, but are not limited to: digital identity (for indicating rules for generating digital identity, etc.), identity check (for verifying user information of user, etc.), authority check (for verifying whether user has authority to log in network, etc.), behavior storage (for storing network connection record information of user, etc.).
The application layer is deployed with a network management and control application, a block chain application and a big data application. 1) The network management and control application is used as a main controller of the service and is used for managing registration and login of digital identity information of a user, verification of network authority, a network connection process and the like. 2) The blockchain application is used as a gateway between the application service and the blockchain, and the connection of the application service to blockchain nodes, the initiation of transactions, the management of transaction processes, the query of transaction data and the like are completed. 3) The big data application provides related capability support for data analysis aiming at network management and control service data and evidence storage data on a block chain.
Wherein, a management background and a visual platform are deployed in the management layer. 1) The management background is used as an operation console for system management and operation and maintenance personnel, and can manage users, establish, distribute and manage network authorities, monitor block chain transaction data and the like; illustratively, the management back-office may include, but is not limited to: block chain management, user management and authority management. 2) The visualization platform is used for visually displaying the transaction details, transaction statistical data and the like of the block chain, displaying the system data analysis result according to the requirement and the like; illustratively, visualization platforms may include, but are not limited to: block chaining, traffic flow, big data analysis.
Fig. 3 is a schematic diagram of a hyper book architecture provided in the embodiment of the present application, and as shown in fig. 3, the hyper book architecture (hyper book architecture) in the embodiment of the present application may include, but is not limited to: authentication service, node cluster, consensus cluster. Wherein, 1) the authentication service may include: at least one Certificate Authority (CA), it being understood that 2 CAs are illustrated in fig. 3 for ease of illustration. 2) At least one transaction node sub-cluster is included in the node cluster, and it should be understood that 3 transaction node sub-clusters are illustrated in fig. 3 for ease of illustration. At least one trading node (Peer) is included in each trading node sub-cluster, it being understood that for ease of illustration, FIG. 3 illustrates the inclusion of 3 trading nodes in each trading node sub-cluster. 3) The consensus cluster comprises a plurality of ordering nodes (orderers), a plurality of Kafka (Kafka shown as K31, K32, K33 and K34 in fig. 3, which is a high throughput distributed publish-subscribe messaging system that can handle all action flow data of a consumer in a website), and a plurality of zookeepers (Zookeeper shown as Z31, Z32 and Z33 in fig. 3, which is a distributed, open source distributed application coordination service).
Fig. 4 is a schematic view of a deployment structure of a super ledger provided in an embodiment of the present application, and as shown in fig. 4, the deployment structure of the super ledger (hyper ledger) in the embodiment of the present application may include but is not limited to: a Nginx proxy server, at least one application server (for ease of illustration, 2 application servers are illustrated in FIG. 4 as an example), a blockchain application, a cluster of nodes (two trading nodes are included in each trading node sub-cluster as illustrated in FIG. 4), a consensus cluster (including three ranking nodes, Kafka as illustrated by K41, K42, K43 and K44, and Zookeeper as illustrated by Z41, Z42 and Z43, as illustrated in FIG. 4), and an authentication service. The Nginx proxy server can distribute the received user requests to corresponding application servers for processing, each application server can store each user request to be processed, needing to call the blockchain application, in a message queue so as to call the blockchain application according to the message queue sequence, and then the blockchain application distributes the corresponding blockchain processing to the node cluster, the common identification cluster and/or the authentication service at the bottom layer for processing.
It should be understood that the node clusters, consensus clusters, etc. in fig. 4 may be extended as needed for blockchain federation traffic.
The user information of any user related in the embodiment of the present application may include at least one of the following: the communication number of the user, the effective certificate information of the user and the name of the user; of course, other information may be included, which is not limited in the embodiments of the present application. The valid certificate information of the user may include, but is not limited to: an identification number, or alternatively, a passport number.
The digital identity information of the user in the embodiment of the present application refers to the digital identity information corresponding to the user information of the user, which is generated by the digital identity server 11 according to the intelligent contract in the block chain 15. The digital identity information corresponding to the user information of different users is different. Illustratively, the digital identity information of any user may include, but is not limited to: a 64-bit encryption string.
In practical application, the digital identity information in the embodiment of the present application may be unique identifiers of various service applications of the user on the block chain, and when the user participates in any service application, the digital identity information may be recorded in the block chain, so that the identity of the user in the block chain is gradually three-dimensionally changed.
It should be noted that any personal information contained in the digital identity information of the user is provided to various service applications on the premise that the user directly authorizes the user; meanwhile, all authorization information and business application records can be stored on the block chain, so that any abuse behavior can be audited and chased, and the information safety of the user is ensured to the maximum extent.
The login information of the user in the embodiment of the present application refers to login information associated with digital identity information corresponding to the user information of the user, which is acquired by the digital identity server 11 from the block chain 15. The login information associated with different digital identity information is different. Illustratively, the login information of any user may include, but is not limited to: a user account and password, such as a portal account and password.
The technical solution of the present application will be described in detail below with specific examples. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments.
Fig. 5 is a flowchart illustrating a network connection method according to an embodiment of the present application. In the embodiment of the present application, an implementation manner when the digital identity server receives the internet access request sent by the terminal is introduced. It should be understood that the executing entity in the embodiment of the present application may be a digital identity server, or a network connection device in the digital identity server (for convenience of description, the executing entity is illustrated as the digital identity server). For example, the digital identity server or the network connection device in the digital identity server in the embodiments of the present application may be implemented by software and/or hardware.
As shown in fig. 5, the method of the embodiment of the present application may include:
step S501, receiving an Internet access request sent by a terminal.
In the embodiment of the application, when a user inputs an internet surfing instruction to a network connection page of a digital identity application (app) in the terminal, the terminal can send an internet surfing request to the digital identity server; correspondingly, the digital identity server receives the internet access request sent by the terminal; the internet access request may include, but is not limited to: the user information of the user.
The user information of the user related in the embodiment of the present application may include at least one of: the communication number of the user, the effective certificate information of the user and the name of the user; of course, other information may be included, which is not limited in the embodiments of the present application. The valid certificate information of the user may include, but is not limited to: an identification number, or alternatively, a passport number.
It should be understood that the digital identity server may also receive a network access request sent by the terminal in other manners.
Step S502, the digital identity information of the user is obtained from the block chain according to the user information.
The block chain related in the embodiment of the application stores the associated information between the user information of the user and the digital identity information of the user; of course, the block chain also stores the association information between the user information and the digital identity information of other users. For example, the block chain stores the association information between the user information 1 and the digital identity information 1, and the association information between the user information 2 and the digital identity information 2.
It should be noted that the digital identity information corresponding to the user information of different users is different, or the digital identity information associated with the user information of different users is different. Illustratively, the digital identity information of any user may include, but is not limited to: a 64-bit encryption string.
In this step, the digital identity server may obtain, according to the user information (e.g., user information 1) of the user carried in the internet access request, digital identity information (e.g., digital identity information 1) corresponding to the user information (e.g., user information 1) of the user from the blockchain, that is, the digital identity information of the user.
Step S503, obtaining the login information of the user from the block chain according to the digital identity information of the user.
The block chain related in the embodiment of the application stores the associated information between the digital identity information of the user and the login information of the user; certainly, the block chain also stores the association information between the digital identity information of other users and the login information. For example, the block chain stores the association information between the digital identity information 1 and the login information 1, and the association information between the digital identity information 2 and the login information 2.
It should be noted that the login information associated with different digital identity information is different, or the login information corresponding to different digital identity information is different. Illustratively, the login information of any user may include, but is not limited to: a user account number and a password.
In this step, the digital identity server may obtain login information (e.g., login information 1) corresponding to the digital identity information (e.g., digital identity information 1) of the user, i.e., login information of the user, from the blockchain according to the digital identity information (e.g., digital identity information 1) of the user obtained in step S502.
Step S504 is to transmit login information of the user to the terminal, where the login information is used for the terminal to perform network connection.
In this step, the digital identity server sends the login information of the user acquired in step S503 to the terminal, so that the terminal automatically performs network connection according to the login information of the user without manually inputting a password by the user.
It should be understood that, if the blockchain stores the association information among the user information of the user, the digital identity information of the user, and the login information of the user, the step S502 and the step S503 may be combined into one step, for example, the digital identity server may obtain the login information associated with the digital identity information corresponding to the user information of the user from the blockchain according to the user information.
To sum up, in the embodiment of the present application, when receiving the internet access request sent by the terminal, the digital identity server automatically obtains login information associated with digital identity information corresponding to the user information of the user from the blockchain, and then sends the login information of the user to the terminal, so that the terminal automatically performs network connection according to the login information of the user. Therefore, compared with the existing mode that the terminal needs to manually input the user account and the password, the terminal in the embodiment of the application can automatically perform network connection according to the login information associated with the digital identity information of the user sent by the digital identity server, and the user does not need to manually input the password, so that the login process is optimized, and the user privacy information can be effectively protected.
Fig. 6 is a flowchart illustrating a network connection method according to another embodiment of the present application. Based on the foregoing embodiments, in the embodiments of the present application, a description is provided of an implementation manner of the digital identity server when receiving the registration request sent by the terminal. As shown in fig. 6, the method of the embodiment of the present application may include:
step S601, receiving a registration request sent by the terminal.
In the embodiment of the application, when a user inputs user information of the user and inputs a registration submission instruction to a registration page of a digital identity app in the terminal, the terminal may send a registration request to the digital identity server; correspondingly, the digital identity server receives the registration request sent by the terminal; wherein, the registration request may include user information of the user; of course, other information, such as short message authentication information, etc., may also be included.
For example, the user inputs a communication number of the user on the registration page and clicks a "send short message authentication information to this number" button, and then inputs the short message authentication information to the registration page after receiving the short message authentication information sent by the digital identity server to the terminal corresponding to the communication number by calling a short message interface. It should be understood that, in the embodiment of the present application, the terminal is installed with a communication card corresponding to the communication number.
It should be understood that the digital identity server may also receive registration requests sent by the terminal in other manners.
Step S602, verifying whether the user information of the user is correct.
In this step, the digital identity server may access the database by calling a user information verification interface to verify whether the user information of the user is correct. For example, it is assumed that the user information of the user includes: the digital identity server can access a database by calling a user information verification interface so as to judge whether the communication number of the user, the valid certificate information of the user and the name of the user are matched; if the communication number of the user, the valid certificate information of the user and the name of the user are matched, the digital identity server can verify that the user information of the user is correct information; if any two of the communication number of the user, the valid certificate information of the user and the name of the user are not matched, the digital identity server can verify that the user information of the user is error information.
For another example, it is assumed that the user information of the user includes: the digital identity server can access a database by calling a user information verification interface so as to judge whether the communication number of the user is matched with the valid certificate information of the user; if the communication number of the user is matched with the valid certificate information of the user, the digital identity server can verify that the user information of the user is correct information; if the communication number of the user and the valid certificate information of the user are not matched, the digital identity server can verify that the user information of the user is error information.
Of course, the digital identity server may also verify whether the user information of the user is correct in other ways.
Further, if the user information of the user is verified to be correct information, step S603 is executed; if the user information of the user is verified as error information, step S607 is executed.
And step S603, inquiring digital identity information corresponding to the user information according to the intelligent contract.
In this step, the digital identity server may query whether there is digital identity information corresponding to the user information according to the intelligent contract. If the digital identity information corresponding to the user information is not inquired according to the intelligent contract, executing step S604; if the digital identity information corresponding to the user information is inquired according to the intelligent contract, step S606 is executed.
And step S604, generating digital identity information corresponding to the user information according to the intelligent contract.
In this step, the digital identity server may generate digital identity information corresponding to the user information according to the digital identity information generation rule in the smart contract, and then may perform the following steps S605A and/or S605B.
Step S605A, sending a registration response 1 to the terminal.
The registration response 1 is used to indicate that the registration is successful, so that the user can send a login request or an internet access request to the digital identity server through the terminal to perform network connection.
Step S605B, store the user information and the digital identity information in the block chain in an associated manner.
In this step, the digital identity server may store the user information of the user and the digital identity information of the user in the block chain in an associated manner, so that the digital identity information corresponding to the user information of the user may be obtained from the block chain when receiving the internet access request sent by the terminal.
Step S606, sending a registration response 2 to the terminal.
The registration response 2 is used to indicate that the user information is registered with corresponding digital identity information, so that the user can send a login request or an internet access request to the digital identity server through the terminal to perform network connection.
Step S607, the registration response 3 is transmitted to the terminal.
Wherein, the registration response 3 is used to indicate that the registration fails, so that the user can check whether the user information is correct and then re-register.
To sum up, in this embodiment of the application, when the digital identity server receives a registration request sent by the terminal and verifies that user information carried in the registration request is correct information, the digital identity server generates corresponding digital identity information for the terminal by querying according to an intelligent contract, so that when the terminal performs network connection, the digital identity server can obtain corresponding login information from a block chain according to the digital identity information and send the obtained login information to the terminal, so that the terminal automatically performs network connection according to the obtained login information, thereby facilitating optimization of a login process during network connection.
Fig. 7 is a flowchart illustrating a network connection method according to another embodiment of the present application. Based on the foregoing embodiments, in the embodiments of the present application, a description is provided of an implementation manner of the digital identity server when receiving the login request sent by the terminal. As shown in fig. 7, the method of the embodiment of the present application may include:
and step S701, receiving a login request sent by the terminal.
In the embodiment of the application, when a user inputs user information of the user to a login page of a digital identity app in the terminal and inputs a login submitting instruction, the terminal can send a login request to the digital identity server; correspondingly, the digital identity server receives the login request sent by the terminal; wherein, the login request may include user information of the user; of course, other information, such as short message authentication information, etc., may also be included.
It should be understood that the digital identity server may also receive login requests sent by the terminal in other manners.
Step S702, verifying whether the user information of the user is correct.
If the user information is verified to be correct information, executing step S703; if the user information is verified as error information, step S704 is executed.
In this step, the specific verification method of the digital identity server may refer to the verification method in step S602, which is not described herein again.
Step S703, sending a login response 1 to the terminal.
The login response 1 is used to indicate that the login is successful, so that the user further sends the internet access request to the digital identity server through the terminal, and the like, thereby implementing automatic network connection.
Step S704, sending a login response 2 to the terminal.
The login response 2 is used to indicate that the login fails, so that the user can log in again through the terminal.
To sum up, in the embodiment of the present application, when receiving the login request sent by the terminal, the digital identity server verifies whether the user information carried in the login request is correct, and then sends a corresponding login response to the terminal according to the verification result, so that the terminal executes a corresponding operation according to the received login response.
Fig. 8 is a flowchart illustrating a network connection method according to another embodiment of the present application. In the embodiments, a description is given of an implementation manner of the digital identity server after sending the login information of the user to the terminal. As shown in fig. 8, the method of the embodiment of the present application may include:
step S801, receiving network connection indication information sent by the AAA server, where the network connection indication information is used to indicate whether the network connection of the terminal is successful.
In this embodiment, after the digital identity server sends the login information of the user to the terminal, the terminal automatically performs network connection according to the login information of the user. For example, the terminal may automatically send the login information of the user to the BRAS through the portal server, so that the BRAS authenticates the login information of the user to the AAA server.
In this embodiment, the AAA server stores the generated at least one piece of login information, and the AAA server may verify that the user's login information is correct information by matching the user's login information with the at least one piece of login information, if the user's login information matches with a certain piece of login information in the at least one piece of login information; if the login information of the user is not matched with each login information in the at least one login information, the AAA server may verify that the login information of the user is error information. Illustratively, if the arbitrary login information includes: when the AAA server judges whether any two login information are matched, the AAA server can judge whether the user accounts in the two login information are the same and whether the passwords in the two login information are the same; if the user account numbers in the two login information are the same and the passwords in the two login information are the same, the AAA server can determine that the two login information are matched; if the user account numbers in the two login information are not the same, and/or the passwords in the two login information are not the same, the AAA server may determine that the two login information do not match.
It should be understood that the AAA server may also authenticate the login information of the user through other manners, which is not limited in the embodiment of the present application.
Further, after the AAA server verifies the login information of the user, the AAA server may transmit network connection indication information to the portal server through the BRAS, and then the portal server may transmit the network connection indication information to the digital identity server, so that the digital identity server may transmit the network connection indication information to the terminal; wherein the network connection indication information is used to indicate whether the network connection of the terminal is successful. Illustratively, if the AAA server verifies that the login information of the user is correct information, the network connection indication information is used to indicate that the network connection of the terminal is successful; or, if the AAA server verifies that the login information of the user is error information, the network connection instruction information is used to instruct the terminal that the network connection has failed.
In this step, the digital identity server may receive the network connection indication information sent by the AAA server. For example, the digital identity server may receive the network connection indication information, which is sent by the AAA server after verifying the login information of the user and then sequentially passing through the BRAS and the portal server.
It should be understood that the digital identity server may also receive the network connection indication information sent by the AAA server in other manners.
Step S802, sending the network connection indication information to the terminal.
In this step, the digital identity server sends the network connection indication information to the terminal, so that the terminal can execute corresponding operations. For example, if the network connection indication information is used to indicate that the network connection of the terminal is successful, the user may perform an internet access operation through the terminal; if the network connection indication information is used to indicate that the network connection of the terminal fails, the user may re-trigger an internet access request and the like through the terminal.
Fig. 9 is a flowchart illustrating a network connection method according to another embodiment of the present application. On the basis of the foregoing embodiments, the present application describes an implementation manner of the terminal when performing network connection. It should be understood that the executing body of the embodiment of the present application may be the terminal described above, or a network connection device in the terminal (for convenience of description, the executing body is taken as the terminal described above for example). For example, the terminal or the network connection device in the terminal in the embodiment of the present application may be implemented by software and/or hardware.
As shown in fig. 9, the method of the embodiment of the present application may include:
step S901, sending an internet access request to a digital identity server.
In this embodiment of the application, when a user inputs an internet surfing instruction to a network connection page of a digital identity app in the terminal, the terminal may send an internet surfing request to the digital identity server, where the internet surfing request may include but is not limited to: the user information of the user is convenient for the digital identity server to obtain the digital identity information corresponding to the user information from the blockchain according to the user information of the user, obtain the login information associated with the digital identity information of the user from the blockchain according to the digital identity information of the user, and then send the login information of the user obtained from the blockchain to the terminal.
The user information of the user related in the embodiment of the present application may include at least one of: the communication number of the user, the effective certificate information of the user and the name of the user; of course, other information may be included, which is not limited in the embodiments of the present application. The valid certificate information of the user may include, but is not limited to: an identification number, or alternatively, a passport number.
It should be understood that the terminal may also send the internet access request to the digital identity server in other manners.
Step S902, receiving the login information of the user sent by the digital identity server.
In this step, the terminal may receive login information of the user sent by the digital identity server, where the login information of the user may be login information associated with digital identity information corresponding to the user information of the user, which is acquired by the digital identity server from the block chain.
And step S903, performing network connection according to the login information.
In this step, the terminal may automatically perform network connection according to the login information of the user received in step S902, without the user inputting a password for manually inputting network connection.
Alternatively, the terminal may automatically send login information of the user to an AAA server, so that the AAA server verifies the login information of the user, and then return network connection indication information to the terminal through the digital server, where the network connection indication information indicates whether the network connection of the terminal is successful. Further, the terminal may receive the network connection indication information sent by the digital identity server, so that the terminal performs a corresponding operation; the network connection indication information may be sent by the AAA server to the digital identity server after the AAA server verifies the login information of the user.
For example, if the AAA server verifies that the login information of the user is correct information, the network connection indication information is used to indicate that the network connection of the terminal is successful, so that the user can perform internet access operations and the like through the terminal. Or, if the AAA server verifies that the login information is error information, the network connection indication information is used to indicate that the network connection of the terminal fails, so that the user may re-trigger an internet access request and the like through the terminal.
The AAA server may refer to the relevant content in step S801 to verify the login information of the user, which is not described herein again.
For example, the terminal may automatically send the login information of the user to the BRAS through the portal server, so that the BRAS may authenticate the login information of the user to the AAA server; further, the AAA server may transmit the network connection indication information to the portal server through the BRAS after verifying the login information of the user, and then the portal server may transmit the network connection indication information to the digital identity server so that the digital identity server may transmit the network connection indication information to the terminal.
It should be understood that the terminal may also perform network connection in other manners according to the login information.
To sum up, in the embodiment of the present application, after sending an internet access request to a digital identity server, the terminal receives login information of the user sent by the digital identity server, and then performs network connection according to the login information; the login information of the user may be login information associated with digital identity information corresponding to the user information of the user, which is acquired by the digital identity server from the blockchain. Therefore, compared with the existing mode that the terminal needs to manually input the user account and the password, the terminal in the embodiment of the application can automatically perform network connection according to the login information associated with the digital identity information of the user sent by the digital identity server, and the user does not need to manually input the password, so that the login process is optimized, and the user privacy information can be effectively protected.
Fig. 10 is a flowchart illustrating a network connection method according to another embodiment of the present application. Based on the above embodiments, the present application describes an implementation manner of the terminal registration. As shown in fig. 10, the method of the embodiment of the present application may include:
step S1001, a registration request is sent to the digital identity server.
In this embodiment of the application, when a user inputs user information of the user to a registration page of a digital identity app in the terminal and inputs a registration submission instruction, the terminal may send a registration request to the digital identity server, so that the digital identity server verifies information carried in the registration request; wherein, the registration request may include user information of the user; of course, other information, such as short message authentication information, etc., may also be included.
The manner in which the digital identity server verifies the user information of the user may refer to the related content in step S602, which is not described herein again.
It should be understood that the terminal may also send the registration request to the digital identity server in other manners.
Step S1002, receiving a registration response sent by the digital identity server after verifying the user information of the user.
In this step, the terminal may receive a registration response sent by the digital identity server after verifying the user information of the user, so that the terminal performs a corresponding operation according to the registration response.
Illustratively, if the digital identity server verifies that the user information of the user is correct information, the digital identity information corresponding to the user information is not queried according to an intelligent contract, and the digital identity information corresponding to the user information of the user is generated according to the intelligent contract, the registration response is used to indicate that the registration is successful, so that the user can send a login request or an internet access request to the digital identity server through the terminal to perform network connection.
In another example, if the digital identity server verifies that the user information of the user is correct information and queries digital identity information corresponding to the user information of the user according to the smart contract, the registration response is used to indicate that the user information of the user is registered with corresponding digital identity information, so that the user can send a login request or an internet access request to the digital identity server through the terminal to perform network connection.
In another example, if the digital identity server verifies that the user information of the user is error information, the registration response is used to indicate that the registration is failed, so that the user can check whether the user information is correct and then re-register.
Fig. 11 is a flowchart illustrating a network connection method according to another embodiment of the present application. In the present embodiment, a description is given of an implementation manner of the terminal login in the above-described embodiment. As shown in fig. 11, the method of the embodiment of the present application may include:
step S1101, sending a login request to the digital identity server.
In the embodiment of the application, when a user inputs user information of the user to a login page of a digital identity app in the terminal and inputs a login submission instruction, the terminal can send a login request to the digital identity server, so that the digital identity server can verify information carried in the login request; wherein, the login request may include user information of the user; of course, other information, such as short message authentication information, etc., may also be included.
The manner in which the digital identity server verifies the user information of the user may refer to the related content in step S602, which is not described herein again.
It should be understood that the terminal may also send the login request to the digital identity server in other manners.
Step S1102, receiving a login response sent by the digital identity server after verifying the user information of the user.
In this step, the terminal may receive a login response sent by the digital identity server after verifying the user information of the user, so that the terminal may perform a corresponding operation according to the login response.
Exemplarily, if the digital identity server verifies that the user information of the user is correct information, the login response is used to indicate that the login is successful, so that the user further sends the internet access request to the digital identity server through the terminal, thereby implementing automatic network connection; or, if the digital identity server verifies that the user information of the user is error information, the login response is used to indicate that the login fails, so that the user can log in again through the terminal, and the like.
Fig. 12 is a flowchart illustrating a network connection method according to another embodiment of the present application. Based on the foregoing embodiments, in the embodiments of the present application, a description is provided for an implementation manner of the terminal registration in combination with the terminal side and the digital identity server side. As shown in fig. 12, the method of the embodiment of the present application may include:
step S1201, the terminal sends a registration request to the digital identity server.
Wherein, the registration request may include user information of the user; of course, other information, such as short message authentication information, etc., may also be included.
Step S1202, the digital identity server verifies whether the received user information of the user is correct.
If the user information of the user is verified to be correct information, then step S1203 is executed; if the user information of the user is verified as error information, step S1207 is executed.
Step S1203, the digital identity server queries digital identity information corresponding to the user information according to the intelligent contract.
If the digital identity information corresponding to the user information is not inquired according to the intelligent contract, executing a step S1204; if the digital identity information corresponding to the user information is inquired according to the intelligent contract, step S1206 is executed.
And step S1204, the digital identity server generates digital identity information corresponding to the user information according to the intelligent contract.
In this step, the digital identity server may generate digital identity information corresponding to the user information according to the digital identity information generation rule in the intelligent contract, and then may perform the following steps S1205A and/or S1205B.
Step S1205A, the digital identity server sends a registration response 1 to the terminal.
Wherein, the registration response 1 is used to indicate that the registration is successful.
Step S1205B, the digital identity server stores the user information and the digital identity information in the block chain in an associated manner.
Step S1206, the digital identity server sends a registration response 2 to the terminal.
The registration response 2 is used to indicate that the user information is registered with corresponding digital identity information.
Step S1207, the digital identity server sends a registration response 3 to the terminal.
Wherein the registration response 3 is used to indicate that the registration has failed.
To sum up, in this embodiment of the application, the terminal sends a registration request to the digital identity server, so that when the digital identity server verifies that user information carried in the registration request is correct information, the digital identity server generates corresponding digital identity information for the terminal by querying according to an intelligent contract, so that when the terminal performs network connection, the digital identity server can obtain corresponding login information from a block chain according to the digital identity information and send the obtained login information to the terminal, so that the terminal automatically performs network connection according to the obtained login information, and therefore, the login process during network connection is favorably optimized.
Fig. 13 is a flowchart illustrating a network connection method according to another embodiment of the present application. In the embodiments of the present application, the terminal side and the digital identity server side are combined to describe an implementation manner of the terminal login and the network connection. As shown in fig. 13, the method of the embodiment of the present application may include:
step S1301, the terminal sends a login request to the digital identity server.
Wherein, the login request may include user information of the user; of course, other information, such as short message authentication information, etc., may also be included.
Step S1302, the digital identity server verifies whether the received user information of the user is correct.
If the user information is verified to be correct information, executing step S1303; if the user information is verified as error information, step S1308 is performed.
Step S1303, the digital identity server sends a login response 1 to the terminal.
The login response 1 is used to indicate that the login is successful, so that the user further sends the internet access request to the digital identity server through the terminal, and the like, thereby implementing automatic network connection.
Step S1304, the terminal sends an internet access request to the digital identity server.
The internet access request may include, but is not limited to: the user information of the user.
Step S1305, the digital identity server obtains the digital identity information of the user from the blockchain according to the user information, and obtains the login information of the user from the blockchain according to the digital identity information of the user.
Step S1306, the digital identity server sends the login information of the user to the terminal.
Step S1307, the terminal performs network connection according to the received login information.
Step S1308, the digital identity server sends a login response 2 to the terminal.
The login response 2 is used to indicate that the login fails, so that the user can log in again through the terminal.
To sum up, in the embodiment of the present application, after the terminal successfully logs in, the terminal sends an internet access request to the digital identity server, so that the digital identity server obtains, from the blockchain, login information associated with digital identity information corresponding to user information carried in the internet access request, and sends the login information to the terminal, so that the terminal performs network connection according to the login information. Therefore, in the embodiment of the application, the terminal can automatically perform network connection according to the login information of the user sent by the digital identity server, and the user does not need to manually input a password, so that the login process is optimized on one hand, and the privacy information of the user can be effectively protected on the other hand.
Optionally, the digital identity server may further store network connection record information (e.g., record information such as network connection time and network connection address) of the terminal in the block chain to implement behavior storage, so as to manage and control the network connection behavior of the user.
Fig. 14 is a schematic structural diagram of a server according to an embodiment of the present application. Optionally, the server provided in the embodiment of the present application may be a digital identity server. As shown in fig. 14, the digital identity server provided in the embodiment of the present application may include: a first receiving module 1401, a first obtaining module 1402, a second obtaining module 1403, and a first sending module 1404.
The first receiving module 1401 is configured to receive an internet access request sent by a terminal; wherein, the request for surfing the internet comprises: user information of a user;
a first obtaining module 1402, configured to obtain digital identity information of the user from a blockchain according to the user information;
a second obtaining module 1403, configured to obtain login information of the user from the blockchain according to the digital identity information of the user;
a first sending module 1404, configured to send login information of the user to the terminal, where the login information is used for the terminal to perform network connection.
In one possible implementation manner, the digital identity server further includes:
a second receiving module, configured to receive a registration request sent by the terminal; wherein, the registration request includes: user information of the user;
the first verification module is used for verifying whether the user information of the user is correct or not;
the query module is used for querying digital identity information corresponding to the user information according to the intelligent contract if the first verification module verifies that the user information is correct information;
and the generating module is used for generating the digital identity information corresponding to the user information according to the intelligent contract if the digital identity information corresponding to the user information is not inquired by the inquiring module.
In one possible implementation manner, the digital identity server further includes:
a second sending module, configured to send a registration response to the terminal; wherein the registration response is used to indicate that the registration was successful; and/or the presence of a gas in the gas,
and the storage module is used for storing the user information and the digital identity information into the block chain in an associated manner.
In one possible implementation manner, the digital identity server further includes:
a third sending module, configured to send a registration response to the terminal; if the first verification module verifies that the user information is correct information and the query module queries digital identity information corresponding to the user information according to the intelligent contract, the registration response is used for indicating that the user information is registered with corresponding digital identity information; or, if the first verification module verifies that the user information is error information, the registration response is used for indicating that the registration fails.
In one possible implementation manner, the digital identity server further includes:
a third receiving module, configured to receive a login request sent by the terminal; wherein, the login request includes: user information of the user;
the second verification module is used for verifying whether the user information of the user is correct or not;
a fourth sending module, configured to send a login response to the terminal; if the second verification module verifies that the user information is correct information, the login response is used for indicating that the login is successful; or, if the second verification module verifies that the user information is error information, the login response is used for indicating that the login fails.
In one possible implementation manner, the digital identity server further includes:
a fourth receiving module, configured to receive network connection indication information sent by an AAA server, where the network connection indication information is used to indicate whether network connection of the terminal is successful;
a fifth sending module, configured to send the network connection indication information to the terminal;
if the AAA server verifies that the login information is correct information, the network connection indication information is used for indicating that the network connection of the terminal is successful; or, if the AAA server verifies that the login information is error information, the network connection indication information is used to indicate that the network connection of the terminal fails.
The digital identity server provided in the embodiment of the present application may be configured to execute the technical solution in the embodiment of the network connection method of the present application, and the implementation principle and the technical effect are similar, which are not described herein again.
Fig. 15 is a schematic structural diagram of a terminal according to an embodiment of the present application. As shown in fig. 15, a terminal provided in an embodiment of the present application may include: a first sending module 1501, a first receiving module 1502 and a connection module 1503.
The first sending module 1501 is configured to send an internet access request to a digital identity server; wherein, the request for surfing the internet comprises: user information of a user;
a first receiving module 1502, configured to receive login information of the user sent by the digital identity server, where the login information is login information that is acquired by the digital identity server from a blockchain and is associated with digital identity information corresponding to user information of the user;
a connection module 1503, configured to perform network connection according to the login information.
In a possible implementation manner, the connection module 1503 is specifically configured to:
sending the login information to an AAA server;
receiving network connection indication information sent by the digital identity server; the network connection indication information is used for indicating whether the network connection of the terminal is successful or not;
if the AAA server verifies that the login information is correct information, the network connection indication information is used for indicating that the network connection of the terminal is successful; or, if the AAA server verifies that the login information is error information, the network connection indication information is used to indicate that the network connection of the terminal fails.
In a possible implementation manner, the terminal further includes:
a second sending module, configured to send a registration request to the digital identity server; wherein, the registration request includes: user information of the user;
a second receiving module, configured to receive a registration response sent by the digital identity server after verifying the user information of the user;
if the digital identity server verifies that the user information is correct information, digital identity information corresponding to the user information is not inquired according to an intelligent contract, and digital identity information corresponding to the user information is generated according to the intelligent contract, the registration response is used for indicating that the registration is successful; or, if the digital identity server verifies that the user information is correct information and inquires digital identity information corresponding to the user information according to an intelligent contract, the registration response is used for indicating that the user information is registered with corresponding digital identity information; or, if the digital identity server verifies that the user information is error information, the registration response is used for indicating that the registration fails.
In a possible implementation manner, the terminal further includes:
a third sending module, configured to send a login request to the digital identity server; wherein, the login request includes: user information of the user;
a third receiving module, configured to receive a login response sent by the digital identity server after verifying the user information of the user; if the digital identity server verifies that the user information is correct information, the login response is used for indicating that the login is successful; or, if the digital identity server verifies that the user information is error information, the login response is used for indicating login failure.
The terminal provided in the embodiment of the present application may be configured to execute the technical solution in the embodiment of the network connection method of the present application, and the implementation principle and the technical effect are similar, which are not described herein again.
Fig. 16 is a schematic structural diagram of an electronic device according to an embodiment of the present application. Optionally, the electronic device in the embodiment of the present application may include, but is not limited to: the terminal or the digital identity server.
As shown in fig. 16, an electronic device provided in an embodiment of the present application may include: a memory 1601 and a processor 1602. Optionally, the electronic device may further comprise a transceiver 1603, the transceiver 1603 being configured to communicate with other devices.
Wherein the memory 1601 is used for storing program instructions; the processor 1602 is configured to call and execute the program instructions stored in the memory 1601, and when the processor 1602 executes the program instructions stored in the memory 1601, the electronic device is configured to execute a technical scheme related to a digital identity server in the foregoing network connection method embodiment of the present application, or a technical scheme related to a terminal in the foregoing network connection method embodiment of the present application, which has similar implementation principles and technical effects, and is not described herein again.
It should be understood that, when the electronic device in the embodiment of the present application includes the digital identity server, the electronic device is configured to execute the technical solution related to the digital identity server in the above-mentioned network connection method embodiment of the present application; when the electronic device in the embodiment of the present application includes a terminal, the electronic device is configured to execute a technical scheme related to the terminal in the above-mentioned embodiment of the network connection method of the present application.
An embodiment of the present application further provides a computer-readable storage medium, where instructions are stored in the computer-readable storage medium, and when the instructions are executed on a computer, the computer executes the technical solution related to the terminal or the digital identity server in the foregoing network connection method embodiment of the present application, and implementation principles and technical effects thereof are similar, and are not described herein again.
It should be understood by those of ordinary skill in the art that, in the various embodiments of the present application, the sequence numbers of the above-mentioned processes do not mean the execution sequence, and the execution sequence of the processes should be determined by their functions and inherent logic, and should not limit the implementation process of the embodiments of the present application.
Those of ordinary skill in the art will understand that: all or a portion of the steps of implementing the above-described method embodiments may be performed by hardware associated with program instructions. The program may be stored in a computer-readable storage medium. When executed, the program performs steps comprising the method embodiments described above; and the aforementioned storage medium includes: various media that can store program codes, such as ROM, RAM, magnetic or optical disks.
Finally, it should be noted that: the above embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present application.

Claims (14)

1. A network connection method, comprising:
receiving an internet surfing request sent by a terminal; wherein, the request for surfing the internet comprises: user information of a user;
acquiring digital identity information of the user from a block chain according to the user information;
acquiring login information of the user from the block chain according to the digital identity information of the user;
and sending the login information of the user to the terminal, wherein the login information is used for the terminal to carry out network connection.
2. The method of claim 1, wherein before the receiving the internet access request sent by the terminal, the method further comprises:
receiving a registration request sent by the terminal; wherein, the registration request includes: user information of the user;
verifying whether the user information of the user is correct;
if the user information is verified to be correct information, inquiring digital identity information corresponding to the user information according to the intelligent contract; and if the digital identity information corresponding to the user information is not inquired, generating the digital identity information corresponding to the user information according to the intelligent contract.
3. The method of claim 2, wherein after generating digital identity information corresponding to the user information according to a smart contract, the method further comprises:
sending a registration response to the terminal; wherein the registration response is used to indicate that the registration was successful; and/or the presence of a gas in the gas,
and storing the user information and the digital identity information into the block chain in an associated manner.
4. The method of claim 2, wherein after verifying whether the user information of the user is correct, the method further comprises:
sending a registration response to the terminal; if the user information is verified to be correct information and digital identity information corresponding to the user information is inquired according to the intelligent contract, the registration response is used for indicating that the user information is registered with the corresponding digital identity information; or, if the user information is verified to be error information, the registration response is used for indicating that the registration fails.
5. The method according to any one of claims 1-4, wherein before the receiving the request for surfing the internet sent by the terminal, the method further comprises:
receiving a login request sent by the terminal; wherein, the login request includes: user information of the user;
verifying whether the user information of the user is correct;
sending a login response to the terminal; if the user information is verified to be correct information, the login response is used for indicating that the login is successful; or, if the user information is verified to be error information, the login response is used for indicating that the login fails.
6. The method according to any of claims 1-4, wherein after sending the login information of the user to the terminal, the method further comprises:
receiving network connection indication information sent by an AAA server, wherein the network connection indication information is used for indicating whether the network connection of the terminal is successful or not;
sending the network connection indication information to the terminal;
if the AAA server verifies that the login information is correct information, the network connection indication information is used for indicating that the network connection of the terminal is successful; or, if the AAA server verifies that the login information is error information, the network connection indication information is used to indicate that the network connection of the terminal fails.
7. A network connection method, comprising:
sending an internet surfing request to a digital identity server; wherein, the request for surfing the internet comprises: user information of a user;
receiving login information of the user, which is sent by the digital identity server, wherein the login information is obtained by the digital identity server from a blockchain and is associated with digital identity information corresponding to the user information of the user;
and performing network connection according to the login information.
8. The method of claim 7, wherein the performing network connection according to the login information comprises:
sending the login information to an AAA server;
receiving network connection indication information sent by the digital identity server; the network connection indication information is used for indicating whether the network connection of the terminal is successful or not;
if the AAA server verifies that the login information is correct information, the network connection indication information is used for indicating that the network connection of the terminal is successful; or, if the AAA server verifies that the login information is error information, the network connection indication information is used to indicate that the network connection of the terminal fails.
9. The method according to claim 7 or 8, wherein before receiving the login information of the user sent by the digital identity server, the method further comprises:
sending a registration request to the digital identity server; wherein, the registration request includes: user information of the user;
receiving a registration response sent by the digital identity server after verifying the user information of the user;
if the digital identity server verifies that the user information is correct information, digital identity information corresponding to the user information is not inquired according to an intelligent contract, and digital identity information corresponding to the user information is generated according to the intelligent contract, the registration response is used for indicating that the registration is successful; or, if the digital identity server verifies that the user information is correct information and inquires digital identity information corresponding to the user information according to an intelligent contract, the registration response is used for indicating that the user information is registered with corresponding digital identity information; or, if the digital identity server verifies that the user information is error information, the registration response is used for indicating that the registration fails.
10. The method according to claim 7 or 8, wherein before receiving the login information of the user sent by the digital identity server, the method further comprises:
sending a login request to the digital identity server; wherein, the login request includes: user information of the user;
receiving a login response sent by the digital identity server after verifying the user information of the user; if the digital identity server verifies that the user information is correct information, the login response is used for indicating that the login is successful; or, if the digital identity server verifies that the user information is error information, the login response is used for indicating login failure.
11. A server, wherein the server is a digital identity server, and wherein the digital identity server comprises:
the first receiving module is used for receiving an internet surfing request sent by the terminal; wherein, the request for surfing the internet comprises: user information of a user;
the first acquisition module is used for acquiring the digital identity information of the user from the block chain according to the user information;
the second acquisition module is used for acquiring the login information of the user from the block chain according to the digital identity information of the user;
and the first sending module is used for sending the login information of the user to the terminal, wherein the login information is used for the terminal to carry out network connection.
12. A terminal, comprising:
the first sending module is used for sending an internet surfing request to the digital identity server; wherein, the request for surfing the internet comprises: user information of a user;
a first receiving module, configured to receive login information of the user sent by the digital identity server, where the login information is login information associated with digital identity information corresponding to user information of the user, which is acquired by the digital identity server from a blockchain;
and the connection module is used for carrying out network connection according to the login information.
13. An electronic device, comprising: a memory and a processor;
wherein the memory is to store program instructions;
the processor to invoke and execute program instructions stored in the memory, the electronic device to perform the method of any of claims 1-6 or 7-10 when the processor executes the program instructions stored in the memory.
14. A computer-readable storage medium having stored therein instructions which, when executed on a computer, cause the computer to perform the method of any one of claims 1-6 or 7-10.
CN201911403821.9A 2019-12-30 2019-12-30 Network connection method, device and storage medium Active CN111064749B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911403821.9A CN111064749B (en) 2019-12-30 2019-12-30 Network connection method, device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911403821.9A CN111064749B (en) 2019-12-30 2019-12-30 Network connection method, device and storage medium

Publications (2)

Publication Number Publication Date
CN111064749A true CN111064749A (en) 2020-04-24
CN111064749B CN111064749B (en) 2022-03-01

Family

ID=70305099

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911403821.9A Active CN111064749B (en) 2019-12-30 2019-12-30 Network connection method, device and storage medium

Country Status (1)

Country Link
CN (1) CN111064749B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113348454A (en) * 2021-06-25 2021-09-03 商汤国际私人有限公司 Cluster management method and device, electronic equipment and storage medium
WO2022042745A1 (en) * 2020-08-31 2022-03-03 北京书生网络技术有限公司 Key management method and apparatus
CN114422132A (en) * 2022-03-29 2022-04-29 天聚地合(苏州)科技股份有限公司 Account login method and system based on block chain
CN114640490A (en) * 2020-12-16 2022-06-17 智弘软体科技股份有限公司 Method and architecture for terminal use safety, monitoring and management of equipment account
TWI773025B (en) * 2020-12-16 2022-08-01 智弘軟體科技股份有限公司 Processes and method for safe of use, monitoring and management of device accounts in terminal manner
US11533306B2 (en) 2020-12-16 2022-12-20 Global Wisdom Software Technology CO. LTD. Processes and method for safe of use, monitoring and management of device accounts in terminal manner

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101166094A (en) * 2007-08-10 2008-04-23 林明辉 A method for client to automatically log in the server via intelligent encryption mode
CN106529946A (en) * 2016-11-01 2017-03-22 北京金股链科技有限公司 Method for realizing user identity digitalization based on block chain
CN107026813A (en) * 2016-01-29 2017-08-08 中国电信股份有限公司 Access authentication method, system and the portal server of WiFi network
CN108684041A (en) * 2018-05-31 2018-10-19 上海邑游网络科技有限公司 The system and method for login authentication
CN109040068A (en) * 2018-08-02 2018-12-18 中国联合网络通信集团有限公司 Strange land authentication method, authentication server and the block chain of broadband user
US20190058595A1 (en) * 2017-08-16 2019-02-21 Royal Bank Of Canada Platform for generating authenticated data objects
US20190163896A1 (en) * 2017-11-28 2019-05-30 American Express Travel Related Services Company, Inc. Single Sign-On Solution Using Blockchain
US20190229930A1 (en) * 2018-01-24 2019-07-25 Comcast Cable Communications, Llc Blockchain for the connected home
CN110175436A (en) * 2019-05-16 2019-08-27 中细软集团有限公司 The generation of block chain digital certificate, verification method, computer equipment and storage medium
CN110324314A (en) * 2019-05-23 2019-10-11 深圳壹账通智能科技有限公司 User registering method and device, storage medium, electronic equipment
US20190333030A1 (en) * 2018-04-30 2019-10-31 Bank Of America Corporation Blockchain-based digital token utilization

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101166094A (en) * 2007-08-10 2008-04-23 林明辉 A method for client to automatically log in the server via intelligent encryption mode
CN107026813A (en) * 2016-01-29 2017-08-08 中国电信股份有限公司 Access authentication method, system and the portal server of WiFi network
CN106529946A (en) * 2016-11-01 2017-03-22 北京金股链科技有限公司 Method for realizing user identity digitalization based on block chain
US20190058595A1 (en) * 2017-08-16 2019-02-21 Royal Bank Of Canada Platform for generating authenticated data objects
US20190163896A1 (en) * 2017-11-28 2019-05-30 American Express Travel Related Services Company, Inc. Single Sign-On Solution Using Blockchain
US20190229930A1 (en) * 2018-01-24 2019-07-25 Comcast Cable Communications, Llc Blockchain for the connected home
US20190333030A1 (en) * 2018-04-30 2019-10-31 Bank Of America Corporation Blockchain-based digital token utilization
CN108684041A (en) * 2018-05-31 2018-10-19 上海邑游网络科技有限公司 The system and method for login authentication
CN109040068A (en) * 2018-08-02 2018-12-18 中国联合网络通信集团有限公司 Strange land authentication method, authentication server and the block chain of broadband user
CN110175436A (en) * 2019-05-16 2019-08-27 中细软集团有限公司 The generation of block chain digital certificate, verification method, computer equipment and storage medium
CN110324314A (en) * 2019-05-23 2019-10-11 深圳壹账通智能科技有限公司 User registering method and device, storage medium, electronic equipment

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022042745A1 (en) * 2020-08-31 2022-03-03 北京书生网络技术有限公司 Key management method and apparatus
CN114640490A (en) * 2020-12-16 2022-06-17 智弘软体科技股份有限公司 Method and architecture for terminal use safety, monitoring and management of equipment account
TWI773025B (en) * 2020-12-16 2022-08-01 智弘軟體科技股份有限公司 Processes and method for safe of use, monitoring and management of device accounts in terminal manner
US11533306B2 (en) 2020-12-16 2022-12-20 Global Wisdom Software Technology CO. LTD. Processes and method for safe of use, monitoring and management of device accounts in terminal manner
CN113348454A (en) * 2021-06-25 2021-09-03 商汤国际私人有限公司 Cluster management method and device, electronic equipment and storage medium
CN114422132A (en) * 2022-03-29 2022-04-29 天聚地合(苏州)科技股份有限公司 Account login method and system based on block chain
CN114422132B (en) * 2022-03-29 2022-08-26 天聚地合(苏州)科技股份有限公司 Account login method and system based on block chain

Also Published As

Publication number Publication date
CN111064749B (en) 2022-03-01

Similar Documents

Publication Publication Date Title
CN111064749B (en) Network connection method, device and storage medium
US11005848B2 (en) Service processing method, apparatus and server
US20190253428A1 (en) Invisible password reset protocol
US10243945B1 (en) Managed identity federation
CN108880822B (en) Identity authentication method, device and system and intelligent wireless equipment
WO2018145605A1 (en) Authentication method and server, and access control device
CN112651011B (en) Login verification method, device and equipment for operation and maintenance system and computer storage medium
US20130055362A1 (en) Authenticating via mobile device
CN108701309A (en) A kind of distributed user profile authentication system for security of e-commerce transactions
US10216943B2 (en) Dynamic security questions in electronic account management
US9747434B1 (en) Authenticating with an external device by providing a message having message fields arranged in a particular message field order
US11971942B2 (en) System and method for sharing information using a machine-readable code on a mobile device
US9356968B1 (en) Managing authentication using common authentication framework circuitry
US20190342753A1 (en) Device configuration method, apparatus and system
US10637805B2 (en) Instant messaging method, server, and storage medium
US11941103B2 (en) Multidevice user authentication in group-based communication systems
US10282461B2 (en) Structure-based entity analysis
US11695543B2 (en) Blockchain network control system and methods
US20210241270A1 (en) System and method of blockchain transaction verification
US20230078667A1 (en) Data transmission method and apparatus, device, storage medium, and computer program product
WO2019011187A1 (en) Method, device, and apparatus for loss reporting, removing loss report, and service management of electronic account
CN110162994A (en) Authority control method, system, electronic equipment and computer readable storage medium
US20210182440A1 (en) System for preventing access to sensitive information and related techniques
US11502830B2 (en) Ultrasound split key transmission for enhanced security
CN107453872A (en) A kind of unified safety authentication method and system based on Mesos container cloud platforms

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant