CN111327457A - Block link interface configuration method based on communication security authentication - Google Patents
Block link interface configuration method based on communication security authentication Download PDFInfo
- Publication number
- CN111327457A CN111327457A CN202010068903.9A CN202010068903A CN111327457A CN 111327457 A CN111327457 A CN 111327457A CN 202010068903 A CN202010068903 A CN 202010068903A CN 111327457 A CN111327457 A CN 111327457A
- Authority
- CN
- China
- Prior art keywords
- communication
- module
- interface
- user
- controller
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000004891 communication Methods 0.000 title claims abstract description 62
- 238000000034 method Methods 0.000 title claims abstract description 24
- 238000012795 verification Methods 0.000 claims abstract description 18
- 238000009434 installation Methods 0.000 claims abstract description 8
- 230000009286 beneficial effect Effects 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 230000007547 defect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0866—Checking the configuration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0893—Assignment of logical groups to network elements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Abstract
The invention discloses a block link interface configuration method based on communication security authentication, which comprises a user system, wherein the user system is connected with an installation authentication device, the installation authentication device is connected with a configuration module, the user system comprises a request user and a communication user, the security authentication device comprises a controller, a storage module, a signature module and a verification module, the system, the storage module, the signature module and the verification module are connected in parallel with the controller, the configuration module comprises a block chain and block chain link points, the block chain nodes are connected in parallel with the block chain, the user system is connected with the security authentication device to perform signature authentication on a communication request, and simultaneously, the block chain nodes are generated by the block chain to separately connect two users, thereby avoiding configuration confusion, ensuring the stability of communication and effectively improving the communication security, effectively improve communication efficiency and information security, do benefit to and use and promote.
Description
Technical Field
The invention relates to the technical field of communication authentication, in particular to a block link interface configuration method based on communication security authentication.
Background
Under the current technological development conditions, the importance of information is more and more prominent, and the requirements for information interaction are increasingly increased, so that the communication safety is emphasized, and the information confidentiality requirement is higher and higher.
Most of the existing communication methods are to directly perform configuration interaction between users, which not only cannot ensure efficient structural configuration and affect communication efficiency, but also easily causes a state of configuration disorder and affects communication security, and thus a new configuration method is yet to be proposed.
Disclosure of Invention
The invention aims to solve the defects in the prior art, and provides a block link interface configuration method based on communication security authentication.
In order to achieve the purpose, the invention adopts the following technical scheme:
a block link interface configuration method based on communication security authentication comprises a user system, wherein the user system is connected with an installation authentication device, the installation authentication device is connected with a configuration module, the user system comprises a request user and a communication user, the security authentication device comprises a controller, a storage module, a signature module and a verification module, the controller, the storage module, the signature module and the verification module are connected in parallel with the controller, the configuration module comprises a block link and block link points, and block link nodes are connected in parallel with the block link.
Preferably, the block link point configuration is generated with an interface, and the interface is connected to the verification module in parallel.
Preferably, the requesting user and the communication user are connected to the security authentication module in parallel, and the requesting user and the communication user are connected to the controller in parallel.
Preferably, the controller is connected to the configuration module, and the controller is connected to the block chain.
Preferably, the configuration method comprises the following steps:
s1, requesting the user to send a communication request to the security authentication device, and receiving the request by the controller;
s2, the signature module carries out signature authentication on the request, and the storage module stores the request and the signature state;
s3, the controller sends the request and the signature state to the block chain to generate a block chain node;
s4, generating a configuration interface by the block link points according to the request content and returning the configuration interface to the security authentication device;
s5, the verification module verifies and matches the interface content, if not, the interface is abandoned, and if yes, the interface returns to the controller;
and S6, connecting the interface content conforming to the verification to the communication user by the controller, namely, completing the configuration of the communication interface.
Preferably, the step S1 numbers the communication requests according to the times and time sequence, and the numbering rule is a time-times-communication user code.
Preferably, the signature authentication in step S2 is signed by means of a digital key.
Preferably, the abandonment interface of step S5 further includes clearing the associated blockchain node and the memory contents.
According to the block link interface configuration method based on communication security authentication, a user system is connected to a security authentication device, signature authentication can be performed on a communication request, and meanwhile, two users are independently connected through block link generation block link nodes, so that configuration disorder is avoided, the stability of communication is guaranteed, the communication security is effectively improved, and furthermore, a plurality of block link nodes can be generated, so that the same requesting user can be simultaneously configured with a plurality of communication users, and the communication users are isolated from each other, the communication efficiency and the information security are effectively improved, and the block link interface configuration method is beneficial to use and popularization.
Drawings
Fig. 1 is a schematic block diagram of the present invention.
In the figure: 1 user system, 11 requesting user, 12 communication user, 2 security authentication device, 21 controller, 22 storage module, 23 signature module, 24 verification module, 3 configuration module, 31 block chain, 32 block chain node, 33 interface.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is further described in detail with reference to the following embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
A block link interface configuration method based on communication security authentication comprises a user system 1, wherein the user system 1 is connected with an installation authentication device 2, the installation authentication device 2 is connected with a configuration module 3, the user system 1 comprises a request user 11 and a communication user 12, the security authentication device 2 comprises a controller 21, a storage module 22, a signature module 23 and a verification module 24, the controller 21, the storage module 22, the signature module 23 and the verification module 24 are connected in parallel with the controller 21, the configuration module 3 comprises a block chain 31 and block chain link points 32, and the block chain nodes 32 are connected in parallel with the block chain 31.
Preferably, the blockchain node 32 is configured to generate an interface 33, and the interface 33 is connected to the verification module 24 in parallel.
Preferably, the requesting user 11 and the communicating user 12 are connected to the security authentication module 2 in parallel, and the requesting user 11 and the communicating user 12 are connected to the controller 21 in parallel.
Preferably, the controller 21 is connected to the configuration module 3, and the controller 21 is connected to the block chain 31.
Preferably, the configuration method comprises the following steps:
s1, requesting the user to send a communication request to the security authentication device, and receiving the request by the controller;
s2, the signature module carries out signature authentication on the request, and the storage module stores the request and the signature state;
s3, the controller sends the request and the signature state to the block chain to generate a block chain node;
s4, generating a configuration interface by the block link points according to the request content and returning the configuration interface to the security authentication device;
s5, the verification module verifies and matches the interface content, if not, the interface is abandoned, and if yes, the interface returns to the controller;
and S6, connecting the interface content conforming to the verification to the communication user by the controller, namely, completing the configuration of the communication interface.
Preferably, the step S1 numbers the communication requests according to the times and time sequence, and the numbering rule is time-times-communication user code.
Preferably, the signature authentication in step S2 is signed by using a digital key.
Preferably, the abandonment interface of step S5 further includes clearing the associated blockchain node and the memory contents.
According to the block link interface configuration method based on communication security authentication, a user system is connected to a security authentication device, signature authentication can be performed on a communication request, and meanwhile, two users are independently connected through block link generation block link nodes, so that configuration disorder is avoided, the stability of communication is guaranteed, the communication security is effectively improved, and furthermore, a plurality of block link nodes can be generated, so that the same requesting user can be simultaneously configured with a plurality of communication users, and the communication users are isolated from each other, the communication efficiency and the information security are effectively improved, and the block link interface configuration method is beneficial to use and popularization.
Claims (8)
1. A block link interface configuration method based on communication security authentication comprises a user system (1), and is characterized in that: the user system (1) is connected with an installation authentication device (2), the installation authentication device (2) is connected with a configuration module (3), the user system (1) comprises a request user (11) and a communication user (12), the safety authentication device (2) comprises a controller (21), a storage module (22), a signature module (23) and a verification module (24), the controller (21), the storage module (22), the signature module (23) and the verification module (24) are connected in parallel to the controller (21), the configuration module (3) comprises a block chain (31) and block chain nodes (32), and the block chain nodes (32) are connected in parallel to the block chain (31).
2. A block link interface configuration method based on communication security authentication according to claim 1, characterized in that: the blockchain node (32) is configured to generate an interface (33), the interface (33) being connected in parallel to the verification module (24).
3. A block link interface configuration method based on communication security authentication according to claim 1, characterized in that: the requesting user (11) and the communication user (12) are connected to the security authentication module (2) in parallel, and the requesting user (11) and the communication user (12) are connected to the controller (21) in parallel.
4. A block link interface configuration method based on communication security authentication according to claim 1, characterized in that: the controller (21) is connected to a configuration module (3), and the controller (21) is connected to a block chain (31).
5. A block link interface configuration method based on communication security authentication according to claim 1, characterized in that: the configuration method comprises the following steps:
s1, requesting the user to send a communication request to the security authentication device, and receiving the request by the controller;
s2, the signature module carries out signature authentication on the request, and the storage module stores the request and the signature state;
s3, the controller sends the request and the signature state to the block chain to generate a block chain node;
s4, generating a configuration interface by the block link points according to the request content and returning the configuration interface to the security authentication device;
s5, the verification module verifies and matches the interface content, if not, the interface is abandoned, and if yes, the interface returns to the controller;
and S6, connecting the interface content conforming to the verification to the communication user by the controller, namely, completing the configuration of the communication interface.
6. A block link interface configuration method based on communication security authentication according to claim 5, characterized in that: the step S1 is to send the communication request to be numbered according to the number and time sequence, and the numbering rule is time-number-communication user code.
7. A block link interface configuration method based on communication security authentication according to claim 5, characterized in that: the signature authentication of the step S2 is signed by means of a digital key.
8. A block link interface configuration method based on communication security authentication according to claim 5, characterized in that: the relinquishing interface of step S5 further includes clearing the associated blockchain node and the stored content.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010068903.9A CN111327457B (en) | 2020-01-21 | 2020-01-21 | Block link interface configuration method based on communication security authentication |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010068903.9A CN111327457B (en) | 2020-01-21 | 2020-01-21 | Block link interface configuration method based on communication security authentication |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111327457A true CN111327457A (en) | 2020-06-23 |
CN111327457B CN111327457B (en) | 2022-07-05 |
Family
ID=71171282
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010068903.9A Active CN111327457B (en) | 2020-01-21 | 2020-01-21 | Block link interface configuration method based on communication security authentication |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111327457B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112835979A (en) * | 2021-02-02 | 2021-05-25 | 山东寻声网络科技有限公司 | Material evidence storage and data analysis system based on block chain technology |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130014033A1 (en) * | 2011-07-08 | 2013-01-10 | WoGo LLC | Systems and methods for facilitating user interaction between multiple virtual environments |
CN108769186A (en) * | 2018-05-28 | 2018-11-06 | 中国联合网络通信集团有限公司 | service authority control method and device |
CN109218082A (en) * | 2018-08-24 | 2019-01-15 | 维沃移动通信有限公司 | A kind of network configuration parameters processing method, device and equipment |
CN110348242A (en) * | 2017-06-12 | 2019-10-18 | 腾讯科技(深圳)有限公司 | Service request processing method and device |
CN110380919A (en) * | 2019-08-30 | 2019-10-25 | 北京东软望海科技有限公司 | Processing method, device, electronic equipment and the readable storage medium storing program for executing of block chain request |
-
2020
- 2020-01-21 CN CN202010068903.9A patent/CN111327457B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130014033A1 (en) * | 2011-07-08 | 2013-01-10 | WoGo LLC | Systems and methods for facilitating user interaction between multiple virtual environments |
CN110348242A (en) * | 2017-06-12 | 2019-10-18 | 腾讯科技(深圳)有限公司 | Service request processing method and device |
CN108769186A (en) * | 2018-05-28 | 2018-11-06 | 中国联合网络通信集团有限公司 | service authority control method and device |
CN109218082A (en) * | 2018-08-24 | 2019-01-15 | 维沃移动通信有限公司 | A kind of network configuration parameters processing method, device and equipment |
CN110380919A (en) * | 2019-08-30 | 2019-10-25 | 北京东软望海科技有限公司 | Processing method, device, electronic equipment and the readable storage medium storing program for executing of block chain request |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112835979A (en) * | 2021-02-02 | 2021-05-25 | 山东寻声网络科技有限公司 | Material evidence storage and data analysis system based on block chain technology |
Also Published As
Publication number | Publication date |
---|---|
CN111327457B (en) | 2022-07-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111010376B (en) | Master-slave chain-based Internet of things authentication system and method | |
US10862959B2 (en) | Consensus system and method for adding data to a blockchain | |
CN110958110B (en) | Block chain private data management method and system based on zero knowledge proof | |
CN106453636A (en) | Credible block generation method and system | |
CN104202168A (en) | Cloud data integrity verification method based on trusted third party | |
CN112583596B (en) | Complete cross-domain identity authentication method based on block chain technology | |
CN111683136B (en) | Node safety monitoring method and device of power distribution Internet of things and power distribution Internet of things system | |
CN112217793B (en) | Cross-system trust management system suitable for power Internet of things | |
CN110958111A (en) | Electric power mobile terminal identity authentication mechanism based on block chain | |
CN110324331B (en) | Block chain-based identity authentication method for safety and stability control terminal of power system | |
CN111786785B (en) | Block chain-based power distribution Internet of things node switching method and device | |
CN103220673A (en) | Wireless local area network (WLAN) user authentication method, authentication server and user equipment (UE) | |
CN111327457B (en) | Block link interface configuration method based on communication security authentication | |
CN114900316B (en) | Block chain-based quick identity authentication method and system for Internet of things equipment | |
CN111371562A (en) | Super book Fabric-SDK (Standard software development kit) cryptographic algorithm expansion and transformation method | |
CN110691358B (en) | Access control system based on attribute cryptosystem in wireless sensor network | |
CN110098920B (en) | Block chain link point load balancing method and device for reducing node collision | |
CN102255904A (en) | Communication network and terminal authentication method thereof | |
CN112364387B (en) | Identity authentication method and device based on blockchain network, medium and equipment | |
CN107276997B (en) | A kind of intelligent cut-in method, the apparatus and system of electric power mobile application terminal | |
CN109495499B (en) | Encryption algorithm-based communication protocol bidirectional verification automatic test tool and method | |
WO2003036867B1 (en) | System and method for performing mutual authentication between mobile terminal and server | |
CN111797171A (en) | Data synchronization system based on block chain cross-chain technology | |
Duan et al. | Sharded blockchain architecture oriented to multilateral collaboration of source-grid-load-storage | |
CN113660632B (en) | V2X identity management method and management system based on blockchain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20231126 Address after: 315000, 347 # and 349 # Wanda Road, Haishu District, Ningbo City, Zhejiang Province Patentee after: Ningbo Aoyou Intelligent Technology Co.,Ltd. Address before: 250014 Room 301, No. 15, Yanzishan Road, Lixia District, Jinan City, Shandong Province Patentee before: Shandong Gongchain Information Technology Co.,Ltd. |