CN101699894A - Method and device for processing authentication request in authentication server cluster - Google Patents

Method and device for processing authentication request in authentication server cluster Download PDF

Info

Publication number
CN101699894A
CN101699894A CN200910193829.7A CN200910193829A CN101699894A CN 101699894 A CN101699894 A CN 101699894A CN 200910193829 A CN200910193829 A CN 200910193829A CN 101699894 A CN101699894 A CN 101699894A
Authority
CN
China
Prior art keywords
certificate server
cluster
authentication request
load
threshold value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN200910193829.7A
Other languages
Chinese (zh)
Other versions
CN101699894B (en
Inventor
林凡
王胜男
张永强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
GCI Science and Technology Co Ltd
Original Assignee
GCI Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by GCI Science and Technology Co Ltd filed Critical GCI Science and Technology Co Ltd
Priority to CN2009101938297A priority Critical patent/CN101699894B/en
Publication of CN101699894A publication Critical patent/CN101699894A/en
Application granted granted Critical
Publication of CN101699894B publication Critical patent/CN101699894B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Computer And Data Communications (AREA)

Abstract

The invention discloses a method and device for processing an authentication request in an authentication server cluster. The method comprises the following steps: when an authentication request is received, selecting an authentication server for processing the authentication request, wherein the selection policy of the authentication server is characterized by ensuring that the authentication server for processing the authentication request has a lowest load in the designated range; and if the selected authentication server does not start the corresponding identification service entity, after the identification service entity is started in the selected authentication server, processing the authentication request. When an authentication server with a load smaller than a threshold value exists in the cluster, the designated range means the authentication server with the load smaller than the threshold value in the cluster, and when the loads of all authentication servers in the cluster exceed the threshold value, the designated range means all authentication servers in the cluster. The invention can realize the purpose of processing many authentication requests with low cost.

Description

In the certificate server cluster, handle the method and apparatus of authentication request
Technical field
The present invention relates to the technical field of wireless communication system, particularly in the certificate server cluster, handle the method for authentication request.
Background technology
In recent years, be that the broadband wireless network of representative obtains fast development with wireless lan (wlan) and wireless MAN (WMAN) technology, various Wideband technology are used widely in the world.For wireless network, its security threat that faces than the cable network sternness many.The network monitoring person may pretend to be other users to obtain useful information, also can illegally obtain user's information by the eavesdropping user's communications.China's wide-band wireless IP standard operation group has proposed the ternary equity and has differentiated (Triple-element Peer Authentication, be called for short TePA) trusted infrastructure, be applied to WLAN and formed WLAN authentication and privacy infrastructure (WLAN Authentication and PrivacyInfrastructure, be called for short WAPI) agreement, can effectively solve the safety problem that IEEE 802.11 agreements exist.We can say that WAPI is the application example of TePA, is used to solve WLAN (wireless local area network) access security problem.Application number is that 200810027930.0 patent " a kind of safety access method of wireless MAN " (hereinafter to be referred as WMAN-SA) is the Another application example of TePA, is used to solve wireless MAN access security problem.Above-mentioned WAPI and WMAN-SA secure network all comprise three network element: terminal, access point and certificate server.
In a wireless network based on TePA (as WAPI and WMAN-SA network), terminal and access point are realized the target of mutual authenticating identity by discriminating service entities (ASE) authentication service that is provided in the certificate server.Can see at present, certificate server based on WAPI or WMAN-SA agreement, specific access point and terminal all need specify one to differentiate service entities (ASE), if the certificate of terminal differentiates that by difference service entities (ASE) issues, then the access point request of certificate authentication message that needs to comprise access point and terminal certificate sends to corresponding discriminating service entities and authenticates.
Along with popularizing of network, certificate server need provide the access authentication service for increasing user's (access point and terminal), under this condition, even separate unit certificate server performance is high again, the access authentication service that can provide also is limited, therefore, generally adopts many certificate servers to constitute the certificate server cluster and provides service for numerous users, but wish that cluster inside is provided with user transparent, the authentication authorization and accounting server cluster externally performance as same station server.This mode has been used for reference the relevant technologies in parallel computation and the load balancing research, has formed present server cluster technology.
If adopt the server cluster technology, will have many certificate servers in the cluster.Discriminating service entities in every certificate server cryptographic algorithm that uses public-key carries out the operation of consumption calculations resources such as digital certificate signature and checking, needs the support of the higher computational resources such as cryptography hardware acceleration device of cost.
If every certificate server all enable support all differentiate that service entities provide authentication service, may in every certificate server, increase the cryptography hardware acceleration device, could satisfy the efficient of cryptography calculating; Simultaneously, every certificate server is enabled all discriminating service entities of support, can increase the space of the various information of storing when each differentiates service entities work exponentially, causes unnecessary resource overhead.So need a kind of method, can handle under the prerequisite to a plurality of authentication request guaranteeing to satisfy cluster, save the cryptography computational resource as much as possible and differentiate the storage overhead of service entities, reduce system operation cost.
Summary of the invention
The objective of the invention is on the basis that effectively economizes on resources to realize that the certificate server cluster handles a plurality of authentication request.
For solving the problems of the technologies described above, in the certificate server cluster, handle the method for authentication request, when receiving authentication request, choose certificate server and handle this authentication request, it is characterized in that: with the certificate server of guaranteeing to handle this authentication request is that strategy at the minimum certificate server of specified scope internal burden carries out described choosing
If selected certificate server does not start corresponding discriminating service entities, handle this authentication request again after then in selected certificate server, enabling this discriminating service entities,
A. to there being the situation of load less than the certificate server of threshold value in the cluster, described specified scope is meant the certificate server of cluster internal burden less than threshold value,
B. to the load of all certificate servers in the cluster all above the situation of threshold value, described specified scope is meant all certificate servers in the cluster.
Authentication request can be enabled or be configured to said method neatly in selected certificate server provide the discriminating service entities of authentication service to handle authentication request.
The described method of handling authentication request in the certificate server cluster is characterized in that: when receiving authentication request, judge whether the certificate server of enabling the discriminating service entities corresponding with the reception authentication request is arranged in the cluster,
A. as not having, then choose the certificate server of cluster internal burden minimum;
B. if any, then judge whether exist load less than threshold value in the certificate server enabled this discriminating service entities---
B1. as existing, then choose the certificate server of wherein load minimum,
B2. as do not exist, then judging whether exist load less than threshold value in the certificate server of not enabled this discriminating service entities---B21. then chooses the certificate server of load minimum in the certificate server of having enabled this discriminating service entities as existence; B22. as do not exist, then choose the certificate server of load minimum in the certificate server of this discriminating service entities of not enabled.
The described method of handling authentication request in the certificate server cluster is characterized in that: when receiving authentication request, judge whether there be the certificate server of load less than threshold value in the cluster; When choosing, get rid of the certificate server outside the pairing specified scope of judged result.
In the certificate server cluster, handle the device of authentication request, it is characterized in that: comprise
Be used for when receiving authentication request, be taken at the selecting device that the minimum certificate server of specified scope internal burden is handled this authentication request, it is characterized in that:
Selecting device has and is used for
The certificate server of guaranteeing to handle this authentication request is at the minimum certificate server of specified scope internal burden
Really protection device;
Do not start corresponding discriminating service entities if also comprise the certificate server that is used for being got, then in the certificate server of being got, enable the device of enabling of handling this authentication request behind this discriminating service entities again,
A. to there being the situation of load less than the certificate server of threshold value in the cluster, described specified scope is meant the certificate server of cluster internal burden less than threshold value,
B. to the load of all certificate servers in the cluster all above the situation of threshold value, described specified scope is meant all certificate servers in the cluster.
The described device of in the certificate server cluster, handling authentication request, it is characterized in that, comprise first judgment means, second judgment means, the 3rd judgment means, wherein, first judgment means is when receiving authentication request, judge whether the certificate server of enabling the discriminating service entities corresponding with the reception authentication request is arranged in the cluster
A. as not having, then described selecting device is chosen the certificate server of cluster internal burden minimum;
B. if any, then second judgment means judges whether to exist load less than threshold value in the certificate server enabled this discriminating service entities---
B1. as existing, then selecting device is chosen the certificate server of wherein load minimum,
B2. as not existing, then the 3rd judgment means judges whether exist load less than threshold value in the certificate server of this discriminating service entities of not enabled---B21. is as existing, and then selecting device is chosen the certificate server of load minimum in the certificate server of enabling this discriminating service entities; B22. as do not exist, then selecting device is chosen the certificate server of load minimum in the certificate server of this discriminating service entities of not enabled.
The described device of in the certificate server cluster, handling authentication request, it is characterized in that: comprise judgment means, it is used for when receiving authentication request, judge and whether have the certificate server of load in the cluster less than threshold value, when described selecting device is chosen, get rid of the certificate server outside the pairing specified scope of judged result.
The present invention with respect to the beneficial effect of prior art is:
The present invention is by enabling or be configured to the discriminating service entities that authentication request provides authentication service neatly in the certificate servers different in cluster, cluster can be handled a plurality of authentication request, compare with all discriminating service entities of all enabling support at every certificate server, saved the storage resources of cryptographic calculations resource and storage various information, realization certificate server cluster is handled a plurality of authentication request on the basis that effectively economizes on resources.
Description of drawings
Fig. 1 is that certificate server cluster of the present invention is formed schematic diagram.
Embodiment
The present invention is further detailed explanation by embodiment below in conjunction with accompanying drawing.
Referring to Fig. 1, the certificate server cluster comprises load balance scheduler, many certificate servers and shared storage device etc.Many certificate servers (AS0, AS1......ASn) and load balance scheduler carry out the network interconnection by converging node (as switch etc.).
Load balance scheduler, be used to receive the authenticating user identification request message, resolve this authentication request message, obtain affiliated the discriminating service entities and the numbering thereof of this authentication request message, and, distribute this authentication request message and give certain specific authentication server of having enabled this discriminating service entities in the cluster according to the loading condition of each certificate server.
Support a plurality of discriminating service entities of operation in every certificate server in many certificate servers, each differentiates that service entities handles the user authentication request message of this authenticated domain, and authentication response message is sent to the user.Each certificate server should be periodically with in the state information updating of its operation certificate server information table (AS information table) in the shared storage device.
The information of service entities and certificate server is respectively differentiated in the shared storage device storage, and its memory contents is as follows:
1, each certificate server information table (AS information table), information in the table: certificate server numbering (AS ID, ID=1,2 ..., n), running status (normal/fault), loading condition (packet loss, CPU take situation), the local discriminating service entities information of having created (ASE information) etc.Wherein, ASE information comprises: the ASE numbering (ASE ID, ID=1,2 ..., i), ASE type (supporting WAPI or WMAN-SA or other types authentication protocol), ASE state (un-activation/activate/suspend/withdraw from).
2, ASE management information table comprises the information of all ASE that created in the certificate server cluster in the table.Information in the table: ASE numbering (ASE ID, ID=1,2 ..., m), ASE type (supporting WAPI or WMAN-SA or other types authentication protocol), and corresponding ASE certificate information.
In order to enable or be configured to the discriminating service entities that authentication request provides authentication service neatly, load balance scheduler can be in real time manages and controls the discriminating service entities of each certificate server, and its process is as follows:
1) load balance scheduler differentiates that to target the certificate server at service entities (ASE) place sends ASE configuration change request message.Field contents in the ASE configuration change request message comprises: target authentication server numbering, the ASE state after ASE numbering, ASE type, message freshness sign, the change.
2) after the target authentication server is received this ASE configuration change request message, should preferentially carry out this message.Resolve this message, obtain each field contents of message, and carry out following operation:
2.1) check message freshness sign, be resend message as definite this message, then abandon, and in this sign of the local storage of certificate server.
2.2) if this certificate server has been enabled this discriminating service entities, should determine then whether ASE numbering, the ASE type of ASE numbering, ASE type (WAPI authentication protocol) and certificate server this locality in the message be consistent, as inconsistent, then abandon this message; Whether " the ASE state of change " that reply is described than local ASE state and message field be consistent, as unanimity, then certificate server should send ASE configuration change response message to load balance scheduler, description status unusual (, should be inconsistent under " before the change " and " after the change " ASE state normal condition) as the ASE state information recording exceptional in the certificate server reason information table of differentiating service entities.As inconsistent, adjusting local ASE state is " the ASE state of change " that message field is described.
2.3) if this discriminating service entities of not enabled is gone back in this certificate server this locality, then should from shared storage device, read certificate information and private key, create and differentiate service entities, and be set to " the ASE state after the change " that message field is described.And send ASE configuration change response message to load balance scheduler, target authentication server change adjustment ASE state successfully be described.Wherein, the field contents in the ASE configuration change response message comprises: target authentication server numbering, the ASE state after ASE numbering, ASE type, message freshness sign, the change, change result.
3) after load balance scheduler is received this ASE configuration change response message, resolve this message, obtain each field contents of message, and carry out following operation:
3.1) check that the message freshness identifies.Message freshness sign should be consistent with the message freshness sign in the former ASE configuration change request message.As inconsistent, then abandon; As unanimity, then carry out next step;
3.2) determine the ASE state consistency of ASE state after ASE numbering in the message, ASE type (WAPI authentication protocol), the change and the ASE numbering in the former ASE configuration change request message, ASE type, change as inconsistent, then to abandon this message; As unanimity, check then whether " change result " be successful, as " change result " indication failure, then retransmit ASE configuration change request message or do other alarming processing according to strategy.
Be example with network below, the course of work of certificate server cluster of the present invention be described in detail in detail based on the TePA trusted infrastructure:
1, load balance scheduler is waited for and is received user authentication request message;
2, receive user authentication request message after, load balance scheduler is resolved this message, determines the discriminating service entities under this user.Load balance scheduling is in shared storage device, inquiry ASE management information table, as in the ASE management information table, not finding the ASE information of having created, then should send warning information or carry out log record to load balance scheduler, show that this user authentication request is unusual request.
3 if the normal users authentication request, when receiving authentication request, choosing certificate server and handle this authentication request, is that strategy at the minimum certificate server of specified scope internal burden carries out described choosing with the certificate server of guaranteeing to handle this authentication request
If selected certificate server does not start corresponding discriminating service entities, handle this authentication request again after then in selected certificate server, enabling this discriminating service entities,
3.1. to there being the situation of load less than the certificate server of threshold value in the cluster, described specified scope is meant the certificate server of cluster internal burden less than threshold value,
3.2. all above the situation of threshold value, described specified scope is meant all certificate servers in the cluster to the load of all certificate servers in the cluster.
First kind of implementation procedure is: when receiving authentication request and inquire corresponding ASE information in management information table, load balance scheduler should be inquired about each certificate server information table (AS information table), and the result is as follows:
If each certificate server information table of A (AS information table) does not all have this ASE information, then load balance scheduler should be according to the loading condition of present each AS, according to load-balancing algorithm, select the AS of load minimum, send ASE configuration change request message (" the ASE state after the change " in the message is " activation ") and create and activate the discriminating service entities, send ASE configuration change response message to load balance scheduler, the success of announcement change state, then target AS changes its AS information table.After establishment and activation were finished, load balance scheduler sent to this AS with this user authentication request and handles.As change the ASE state and fail, send ASE configuration change response message to load balance scheduler, the failure of announcement change state, after load balance scheduler is received this message, should select except this certificate server, the certificate server of load minimum sends ASE configuration change request message, and handling process is the same.
This kind situation does not judge whether there be the step of load less than the certificate server of threshold value in the cluster, handles this authentication request but directly select the minimum certificate server of load to enable corresponding ASE.This means if there be the certificate server of load less than threshold value, then the scope of appointment is to be scope with load less than the certificate server of threshold value surely, if there be not the certificate server of load less than threshold value, then the scope of appointment is to be scope with all certificate servers in the cluster surely.
Enabled this ASE if B has one or more certificate server information tables (AS information table) to show, two kinds of situations arranged so:
B1 wherein has in the certain threshold value of loading on of certificate server (threshold value can be defined by the keeper), then this user authentication request can be issued the certificate server of load minimum.
This kind situation belongs to find in the scope of load less than the certificate server of threshold value enables the discriminating service entities (ASE) corresponding with the reception authentication request, thereby is that specified scope selects the minimum certificate server of load to handle this authentication request with load less than the certificate server of threshold value.
The load of B2, each certificate server has all surpassed certain threshold value, at this moment, load balance scheduler is according to the result who just begins authentication query server info table (AS information table), take the AS information table of this ASE of other not enableds, the certificate server of this ASE of these not enableds judged whether not surpass the certificate server of threshold value:
B21, as other certificate server loads all above threshold value, then user authentication request is issued the certificate server of the load minimum of enabling ASE.This kind situation belongs to the load of all certificate servers in the cluster all above threshold value, and all find in the certificate server above threshold value at the cluster internal burden and to enable the discriminating service entities (ASE) corresponding, thereby be that specified scope selects the minimum certificate server of load to handle this authentication request with all certificate servers in the cluster with the reception authentication request.
B22, also do not surpass the certificate server of threshold value as there being load, select not surpass the AS of the load minimum of threshold value, send ASE configuration change request message (" the ASE state of change " in the message is " activation ") and activate its discriminating service entities, send ASE configuration change response message to load balance scheduler, the success of announcement change state, then target AS changes its AS information table, then changes the AS information table of memory device.As change the ASE state and fail, send ASE configuration change response message to load balance scheduler, the failure of announcement change state, after load balance scheduler is received this message, should select except this certificate server, the certificate server that does not surpass the load minimum of threshold value sends ASE configuration change request message, and handling process is the same.
This kind situation belongs to and has the certificate server of load less than threshold value in the cluster, and do not find enabled corresponding A SE in load less than the certificate server of threshold value, thereby be that specified scope is selected the minimum certificate server of load to enable corresponding ASE to handle this authentication request less than the certificate server of threshold value with load.
Second kind of implementation procedure is: before choosing, judge whether there be the certificate server of load less than threshold value in the cluster; When choosing, get rid of the certificate server outside the pairing specified scope of judged result.Choose by two kinds of situations after promptly judging;
(1). when having load in the cluster less than the certificate server of threshold value, be that specified scope is searched and enabled the discriminating service entities (ASE) corresponding with received authentication request and the minimum certificate server of load is handled this authentication request less than the certificate server of threshold value just with these loads, if do not find enabled corresponding A SE, then in this scope, select the minimum certificate server of load to enable corresponding ASE and handle this authentication request;
(2). when the load of all certificate servers in the cluster during all above threshold value, be that specified scope is searched and enabled the discriminating service entities (ASE) corresponding with received authentication request and the minimum certificate server of load is handled this authentication request just with all certificate servers in the cluster, if do not find enabled corresponding A SE, then in this scope, select the minimum certificate server of load to enable corresponding ASE and handle this authentication request.
Above-mentioned two kinds of implementation procedure main distinctions are that first kind of implementation procedure judged whether to enable ASE before this and according to the ASE situation of enabling all or part of certificate server carried out load judgment again, so under the fewer situation of the certificate server of enabling corresponding A SE, can dwindle the scope of certificate server being carried out load judgment, second kind of implementation procedure is to judge that earlier load carries out the ASE situation of enabling according to load state to all or part of certificate server again and judge, can dwindle certificate server is carried out the scope that ASE enables the situation judgement so surpass under the many situations of the certificate server of threshold value (being under the bigger situation of whole certificate server cluster load pressure) in load.
Two kinds of implementation procedures can both guarantee to choose the minimum certificate server of load in specified scope, and enable neatly or be configured to authentication request and provide the discriminating service entities of authentication service to handle authentication request.
4, receive the certificate server of user authentication request, this ID authentication request is verified and authenticating user identification, construct the authentication response message, and this authentication response message is sent to the user.

Claims (6)

1. in the certificate server cluster, handle the method for authentication request, when receiving authentication request, choose certificate server and handle this authentication request, it is characterized in that: to guarantee
The certificate server of handling this authentication request is at the minimum certificate server of specified scope internal burden
Strategy carry out described choosing,
If selected certificate server does not start corresponding discriminating service entities, handle this authentication request again after then in selected certificate server, enabling this discriminating service entities,
A. to there being the situation of load less than the certificate server of threshold value in the cluster, described specified scope is meant the certificate server of cluster internal burden less than threshold value,
B. to the load of all certificate servers in the cluster all above the situation of threshold value, described specified scope is meant all certificate servers in the cluster.
2. the method for handling authentication request in the certificate server cluster according to claim 1 is characterized in that: when receiving authentication request, judge whether the certificate server of enabling the discriminating service entities corresponding with the reception authentication request is arranged in the cluster,
A. as not having, then choose the certificate server of cluster internal burden minimum;
B. if any, then judge whether exist load less than threshold value in the certificate server enabled this discriminating service entities---
B1. as existing, then choose the certificate server of wherein load minimum,
B2. as do not exist, then judging whether exist load less than threshold value in the certificate server of not enabled this discriminating service entities---B21. then chooses the certificate server of load minimum in the certificate server of having enabled this discriminating service entities as existence; B22. as do not exist, then choose the certificate server of load minimum in the certificate server of this discriminating service entities of not enabled.
3. the method for handling authentication request in the certificate server cluster according to claim 1 is characterized in that: when receiving authentication request, judge whether there be the certificate server of load less than threshold value in the cluster; When choosing, get rid of the certificate server outside the pairing specified scope of judged result.
4. in the certificate server cluster, handle the device of authentication request, it is characterized in that comprising
Be used for when receiving authentication request, be taken at the selecting device that the minimum certificate server of specified scope internal burden is handled this authentication request, it is characterized in that:
Selecting device has and is used for
The certificate server of guaranteeing to handle this authentication request is at the minimum certificate server of specified scope internal burden
Really protection device;
Do not start corresponding discriminating service entities if also comprise the certificate server that is used for being got, then in the certificate server of being got, enable the device of enabling of handling this authentication request behind this discriminating service entities again,
A. to there being the situation of load less than the certificate server of threshold value in the cluster, described specified scope is meant the certificate server of cluster internal burden less than threshold value,
B. to the load of all certificate servers in the cluster all above the situation of threshold value, described specified scope is meant all certificate servers in the cluster.
5. the device of in the certificate server cluster, handling authentication request according to claim 4, it is characterized in that, comprise first judgment means, second judgment means, the 3rd judgment means, wherein, first judgment means is when receiving authentication request, judge whether the certificate server of enabling the discriminating service entities corresponding with the reception authentication request is arranged in the cluster
A. as not having, then described selecting device is chosen the certificate server of cluster internal burden minimum;
B. if any, then second judgment means judges whether to exist load less than threshold value in the certificate server enabled this discriminating service entities---
B1. as existing, then selecting device is chosen the certificate server of wherein load minimum,
B2. as not existing, then the 3rd judgment means judges whether exist load less than threshold value in the certificate server of this discriminating service entities of not enabled---B21. is as existing, and then selecting device is chosen the certificate server of load minimum in the certificate server of enabling this discriminating service entities; B22. as do not exist, then selecting device is chosen the certificate server of load minimum in the certificate server of this discriminating service entities of not enabled.
6. the device of in the certificate server cluster, handling authentication request according to claim 4, it is characterized in that: comprise judgment means, it is used for when receiving authentication request, judge and whether have the certificate server of load in the cluster less than threshold value, when described selecting device is chosen, get rid of the certificate server outside the pairing specified scope of judged result.
CN2009101938297A 2009-11-10 2009-11-10 Method and device for processing authentication request in authentication server cluster Expired - Fee Related CN101699894B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2009101938297A CN101699894B (en) 2009-11-10 2009-11-10 Method and device for processing authentication request in authentication server cluster

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2009101938297A CN101699894B (en) 2009-11-10 2009-11-10 Method and device for processing authentication request in authentication server cluster

Publications (2)

Publication Number Publication Date
CN101699894A true CN101699894A (en) 2010-04-28
CN101699894B CN101699894B (en) 2012-07-25

Family

ID=42148334

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2009101938297A Expired - Fee Related CN101699894B (en) 2009-11-10 2009-11-10 Method and device for processing authentication request in authentication server cluster

Country Status (1)

Country Link
CN (1) CN101699894B (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102710419A (en) * 2011-12-21 2012-10-03 大唐软件技术股份有限公司 User authentication method and device
CN103593634A (en) * 2013-11-08 2014-02-19 国家电网公司 Network centralized decoding system and method of identity card identifier
CN103795694A (en) * 2012-10-31 2014-05-14 中国电信股份有限公司 License control method and license control system
CN104700057A (en) * 2015-04-02 2015-06-10 山东信通电子股份有限公司 Sharable resources type resident identification card reading achievement method and resident identification card reader
CN105657067A (en) * 2016-03-24 2016-06-08 网易(杭州)网络有限公司 Game verification method and device, game server and verification server
CN107580004A (en) * 2017-10-31 2018-01-12 深圳竹云科技有限公司 A kind of new authentication method and authentication center's framework
CN108616762A (en) * 2016-12-12 2018-10-02 北京视联动力国际信息技术有限公司 A kind of sharing method regarding networked server and regard networked server
WO2019144505A1 (en) * 2018-01-29 2019-08-01 平安科技(深圳)有限公司 Method, device, electronic equipment for selecting authentication channel and medium
CN110719245A (en) * 2018-07-11 2020-01-21 中国移动通信集团浙江有限公司 Internet of things data transmission method and system

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100389555C (en) * 2005-02-21 2008-05-21 西安西电捷通无线网络通信有限公司 An access authentication method suitable for wired and wireless network
CN100454876C (en) * 2007-02-06 2009-01-21 西安西电捷通无线网络通信有限公司 Method for applying for certificate in wireless LAN WAPI safety mechanism
CN100456726C (en) * 2007-03-15 2009-01-28 北京安拓思科技有限责任公司 Network system and method for realizing the Internet access authentication based on WAPI
CN101262454A (en) * 2008-04-21 2008-09-10 中国科学院计算技术研究所 A network digital media content distribution method and system
CN101442749B (en) * 2008-12-15 2011-12-28 广州杰赛科技股份有限公司 Authentication method for wireless netted network based on WAPI

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102710419A (en) * 2011-12-21 2012-10-03 大唐软件技术股份有限公司 User authentication method and device
CN102710419B (en) * 2011-12-21 2015-02-18 大唐软件技术股份有限公司 User authentication method and device
CN103795694A (en) * 2012-10-31 2014-05-14 中国电信股份有限公司 License control method and license control system
CN103593634A (en) * 2013-11-08 2014-02-19 国家电网公司 Network centralized decoding system and method of identity card identifier
CN104700057A (en) * 2015-04-02 2015-06-10 山东信通电子股份有限公司 Sharable resources type resident identification card reading achievement method and resident identification card reader
CN105657067A (en) * 2016-03-24 2016-06-08 网易(杭州)网络有限公司 Game verification method and device, game server and verification server
CN108616762A (en) * 2016-12-12 2018-10-02 北京视联动力国际信息技术有限公司 A kind of sharing method regarding networked server and regard networked server
CN108616762B (en) * 2016-12-12 2019-11-19 视联动力信息技术股份有限公司 A kind of sharing method and view networked server of view networked server
CN107580004A (en) * 2017-10-31 2018-01-12 深圳竹云科技有限公司 A kind of new authentication method and authentication center's framework
WO2019144505A1 (en) * 2018-01-29 2019-08-01 平安科技(深圳)有限公司 Method, device, electronic equipment for selecting authentication channel and medium
CN110719245A (en) * 2018-07-11 2020-01-21 中国移动通信集团浙江有限公司 Internet of things data transmission method and system

Also Published As

Publication number Publication date
CN101699894B (en) 2012-07-25

Similar Documents

Publication Publication Date Title
CN101699894B (en) Method and device for processing authentication request in authentication server cluster
US20130174239A1 (en) Reinforced authentication system and method using context information at the time of access to mobile cloud service
EP2742711B1 (en) Detection of suspect wireless access points
US8139521B2 (en) Wireless nodes with active authentication and associated methods
CN101345743B (en) Method and system for preventing network attack by utilizing address analysis protocol
CN103313429B (en) A kind of processing method identifying forgery WIFI hot spot
CN110267270B (en) Identity authentication method for sensor terminal access edge gateway in transformer substation
US9490986B2 (en) Authenticating a node in a communication network
GB2424559A (en) Selecting authentication protocol for a device in an EAP system from preferably the most recently used or most often used by that device
US9602499B2 (en) Authenticating a node in a communication network
US20060161770A1 (en) Network apparatus and program
CN110958111A (en) Electric power mobile terminal identity authentication mechanism based on block chain
GB2430580A (en) Mutual Authentication of Access Points in a Wireless Network.
WO2007026230A2 (en) Arbitrary mac address usage in a wlan system
CN101699893B (en) Method for changing states of authentication service entities of certificate server cluster
CN101527907B (en) Wireless local area network access authentication method and wireless local area network system
WO2012126286A1 (en) Aaa server status detection method and system
Sudha et al. A review on privacy requirements and application layer security in internet of things (IoT)
CN101600200A (en) Method for switching among heterogeneous networks, mobile node and authenticating access point
US11784993B2 (en) Cross site request forgery (CSRF) protection for web browsers
CN201252570Y (en) Security gateway client end device
US11811817B2 (en) SSL proxy whitelisting
CN100499649C (en) Method for realizing safety coalition backup and switching
CN107566418B (en) Security management method and access device
CN110636464A (en) Communication system for communication between Internet of things equipment and communication system with enterprise intranet

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20120725

Termination date: 20201110