CN107222460B - A kind of method and device that server data memory space is shared - Google Patents

A kind of method and device that server data memory space is shared Download PDF

Info

Publication number
CN107222460B
CN107222460B CN201710304801.0A CN201710304801A CN107222460B CN 107222460 B CN107222460 B CN 107222460B CN 201710304801 A CN201710304801 A CN 201710304801A CN 107222460 B CN107222460 B CN 107222460B
Authority
CN
China
Prior art keywords
module
token
server
mobile terminal
serial number
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710304801.0A
Other languages
Chinese (zh)
Other versions
CN107222460A (en
Inventor
陆舟
于华章
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Feitian Technologies Co Ltd
Original Assignee
Feitian Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Feitian Technologies Co Ltd filed Critical Feitian Technologies Co Ltd
Priority to CN201710304801.0A priority Critical patent/CN107222460B/en
Publication of CN107222460A publication Critical patent/CN107222460A/en
Application granted granted Critical
Publication of CN107222460B publication Critical patent/CN107222460B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0236Filtering by address, protocol, port number or service, e.g. IP-address or URL
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • H04L67/1004Server selection for load balancing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/55Push-based network services

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present invention discloses a kind of method and device that server data memory space is shared, belongs to information security field.The described method includes: certificate server generates challenging value when receiving the certification request of application server transmission, the user information in certification request is obtained, searches token serial number corresponding with user information;Pushing certification request is generated according to challenging value, user information and token serial number, and is sent to mobile terminal token, by challenging value preservation corresponding with token serial number to cache server.Using technical solution of the present invention, it will be not necessarily to persistence and the data for needing frequently to access saved into cache server, concurrently accessed for more certificate servers, reduce data processing difficulty, the space for saving certificate server memory block shortens the time of reading data.

Description

A kind of method and device that server data memory space is shared
Technical field
The present invention relates to information security field more particularly to a kind of server data memory space shared methods and dress It sets.
Background technique
With the covering and propagation of network, cloud service is more more and more universal in real life, nowadays, to meet more use Family use cloud service, therefore cloud service be on the internet in the form of cluster existing for.
And in the prior art, the single machine processing capacity and memory space of server are limited, if unconfined will ask It asks and is sent to single server, it is likely that the processing capacity for substantially exceeding server leads to server crash, and can not stablize can hold Continuous is that user provides reliable service, not only wastes space, but also expend the time in reading data.
Summary of the invention
The purpose of the present invention is to solve problems of the prior art, and it is empty to provide a kind of server data storage Between share method and device.
The technical solution adopted by the present invention is that:
On the one hand, a kind of shared method of server data memory space, method include:
When receiving the certification request of application server transmission, certificate server generates challenging value, obtains certification request In user information, search corresponding with user information token serial number;According to the challenging value of generation, the user information got And the token serial number found generates pushing certification request, sends pushing certification and requests to mobile terminal token, and will give birth to At challenging value corresponding with the token serial number found save to cache server;
When receiving the pushing certification response of mobile terminal token transmission, certificate server searches mobile terminal token pair The server seed key answered obtains challenging value from cache server according to token serial number, according to the server kind found Sub-key and the challenging value got generate response value;Judge the response value generated is with the response value in pushing certification response No matching is then to send certification success response to application server, otherwise sends authentication failure response to application server.
Specifically, when receiving the certification request of application server transmission, further includes: obtain the application in certification request Mark, and application message is obtained according to application identities;
Wherein, it is generated and is pushed according to the challenging value of generation, the user information got and the token serial number found Certification request, specifically: according to the challenging value of generation, the user information got, the token serial number and application found Information generates pushing certification request.
Further, it sends pushing certification to request to before mobile terminal token, further includes: certificate server is according to token Sequence number obtains corresponding certificate server IP from cache server, and the certificate server IP for judging itself IP and getting It is whether identical, it is that pushing certification request is sent to mobile terminal token, otherwise pushing certification request is sent to and is got The corresponding certificate server of certificate server IP;
Specifically, method further include: when receiving the pushing certification request that another certificate server is sent, authentication service The pushing certification received request is sent to mobile terminal token by device.
Further, further includes: when receiving the token serial number of mobile terminal token transmission, certificate server will be certainly Body IP is associated with preservation to cache server with token serial number foundation.
Further, after itself IP is associated with preservation to cache server with token serial number foundation by certificate server, Further include: certificate server obtains certificate server IP according to token serial number, and with according to token serial number from buffer service Corresponding certificate server IP is obtained in device to compare, if identical, without updating, is terminated;Otherwise, certificate server Associated certificate server IP is established with token serial number by updating, is terminated.
Optionally, it sends pushing certification to request to before mobile terminal token, further includes: certificate server, which sends push, to be recognized Card request is to cache server and generates authentication notification data, and authentication notification data are sent to mobile terminal token;
Specifically, method further include: after receiving the information for obtaining pushing certification request of mobile terminal token return, Certificate server obtains token serial number from obtaining in the information that pushing certification is requested, according to token serial number from cache server Middle acquisition pushing certification request, and push request certification is sent to mobile terminal token.
More specifically, authentication notification data are sent to mobile terminal token, specifically include: certificate server is according to token Sequence number obtains mobile terminal identification from cache server, and authentication notification data and mobile terminal identification are sent to Authentication notification data are sent to the corresponding mobile terminal of mobile terminal identification according to mobile terminal identification and enabled by iCloud, iCloud Board.
Wherein, when receiving the token serial number and mobile terminal identification of the transmission of mobile terminal token, certificate server Token serial number is associated with preservation to cache server with mobile terminal identification foundation.
Wherein, after token serial number being associated with preservation to cache server with mobile terminal identification foundation, further includes: certification Server obtains mobile terminal identification according to token serial number, and corresponding with being obtained from cache server according to token serial number Mobile terminal identification compare, if identical, without update, terminate;Otherwise, certificate server will update and token sequence Row number establishes associated mobile terminal identification, terminates.
Optionally, when receiving the token serial number of mobile terminal token transmission, further includes: certificate server and movement Terminal token establishes network data link.
Further, after certificate server and mobile terminal token establish network data link, further includes: certificate server The corresponding network data link mark of mobile terminal token is obtained, and network data link mark and token serial number are established and closed UNPROFOR is deposited to the memory block of certificate server.
Further, it sends pushing certification to request to before mobile terminal token, further includes: certificate server is according to order Card sequence number obtains corresponding network data link mark from the memory block of certificate server, and according to network data link mark Know and obtains corresponding network data link;
Wherein, pushing certification is sent to request to mobile terminal token, specifically: certificate server is according to network data link Mark obtains corresponding network data link, sends pushing certification by network data link and requests to mobile terminal token.
Specifically, it saves the challenging value of generation is corresponding with the token serial number found to cache server, specifically: Certificate server sends the request of storage challenging value to buffer service, buffer service according to preset storage rule by challenging value and Token serial number is stored into the list of cache server;
Specifically, challenging value is obtained from cache server according to token serial number, specifically: certificate server, which is sent, to be obtained The request of challenging value is to buffer service, buffer service query token sequence from the list of cache server according to token serial number Number corresponding challenging value, and return to certificate server.
Optionally, it by after the preservation to cache server corresponding with the token serial number found of the challenging value of generation, also wraps Include: certificate server setting challenging value is stored in the effective time of cache server, is more than effective time, cache server will be chosen War value is deleted.
Specifically, after judging whether the response value generated matches with the response value in pushing certification response, further includes: recognize Server is demonstrate,proved to delete the challenging value corresponding with token serial number saved in cache server.
On the other hand, the present invention provides the devices that a kind of server data memory space is shared, comprising:
First receiving module, for receiving the certification request of application server transmission;
First generation module generates when for receiving the certification request of application server transmission when the first receiving module Challenging value;
First obtains module, for obtaining the user information in certification request;
First searching module, for searching token serial number corresponding with user information;
Second generation module, the use that challenging value, the first acquisition module for being generated according to the first generation module are got The token serial number that family information and the first searching module are found generates pushing certification request;
First sending module is requested for sending pushing certification to mobile terminal token;
First preserving module, the token that challenging value and the first searching module for generating the first generation module are found Sequence number is corresponding to be saved to cache server;
Second receiving module, for receiving the pushing certification response of mobile terminal token transmission;
Second searching module, for searching the corresponding server seed key of mobile terminal token;
Second obtains module, and the token serial number for being obtained according to the first searching module is obtained from cache server and challenged Value;
Third generation module, server seed key and second for being found according to the second searching module obtain mould The challenging value that block is got generates response value;
First judgment module, the response value for judging that third generation module generates are pushed away with what the second receiving module received Send whether the response value in authentication response matches;
Second sending module, for judging that the response value that third generation module generates and second receives when first judgment module When response value successful match in the response of pushing certification that module receives, certification success response is sent to application server;
Third sending module, for judging that the response value that third generation module generates and second receives when first judgment module Response value in the response of pushing certification that module receives sends authentication failure response to application server when it fails to match.
Specifically, device further include: third obtains module, for obtaining the application identities in certification request;
4th obtains module, obtains application message for obtaining the application identities that module is got according to third;
Further, the second generation module is specifically used for: being obtained according to the challenging value of the first generation module generation, first What the token serial number and the 4th acquisition module that user information that module is got, the first searching module are found were got answers It is requested with information at pushing certification.
Wherein, device further include: the 5th obtains module, the 4th sending module of the second judgment module and the 5th sending module;
5th obtains module, obtains corresponding certificate server from cache server according to token serial number for device IP;
Whether the second judgment module is identical for judgment means IP and the 5th IP that gets of acquisition module;
4th sending module, the authentication service got for the acquisition of the second judgment module judgment means IP and the 5th module When device IP is identical, pushing certification request is sent to mobile terminal token;
5th sending module, the authentication service got for the acquisition of the second judgment module judgment means IP and the 5th module When device IP is not identical, pushing certification request is sent to the corresponding device of certificate server IP that the 5th acquisition module is got;
6th receiving module, the pushing certification request sent for receiving another device;
6th sending module, for will push away when the 6th receiving module receives the pushing certification request that another device is sent Certification request is sent to be sent to mobile terminal token.
Specifically, device further include: the 7th receiving module and the second preserving module;
7th receiving module, for receiving the token serial number of mobile terminal token transmission;
Second preserving module, for when receiving the token serial number of mobile terminal token transmission, device to be by itself IP Preservation is associated with to cache server with token serial number foundation.
Further, device further include: the 7th, which obtains module, the 8th acquisition module, the first contrast module and first, updates Module;
7th obtains module, for according to token serial number acquisition device IP;
8th obtain module, for according to token serial number from cache server acquisition device IP;
First contrast module obtains the device that module obtains for comparing the device IP and the 8th that the 7th acquisition module obtains Whether IP is identical;
First update module, for being obtained when the first contrast module comparison the 7th obtains the device IP and the 8th that module obtains It when the device IP difference that module obtains, updates and establishes associated device IP with token serial number, terminate.
Specifically, device further include: the 4th generation module, the 7th sending module, the 9th obtain module, the tenth acquisition module With the 8th sending module;
4th generation module requests to cache server for sending pushing certification and generates authentication notification data;
7th sending module, the authentication notification data for generating the 4th generation module are sent to mobile terminal token;
9th obtain module, for when receive mobile terminal token return obtain pushing certification request information after, Token serial number is obtained from obtaining in the information that pushing certification is requested;
Tenth obtains module, for being obtained from cache server according to the token serial number obtained in the 9th acquisition module Pushing certification is taken to request;
8th sending module, the push request certification for obtaining the tenth acquisition module are sent to mobile terminal token.
Further, the 7th sending module specifically includes: first acquisition unit and the first transmission unit;
First acquisition unit, for obtaining mobile terminal identification from cache server according to token serial number;
First transmission unit, for authentication notification data and mobile terminal identification to be sent to iCloud, iCloud according to Authentication notification data are sent to the corresponding mobile terminal token of mobile terminal identification by mobile terminal identification.
Specifically, exist further include: third preserving module;
Third preserving module, for when the token serial number and mobile terminal identification for receiving the transmission of mobile terminal token When, token serial number is associated with preservation to cache server with mobile terminal identification foundation.
Accordingly, device further include: the 11st obtains module, the 12nd acquisition module, the second contrast module and second more New module
11st obtains module, for token serial number to be associated with guarantor with mobile terminal identification foundation when third preserving module It deposits to cache server, mobile terminal identification is obtained according to token serial number;
12nd obtains module, for obtaining corresponding mobile terminal mark from cache server according to token serial number Know;
Second contrast module obtains the mobile terminal identification of module acquisition for comparing the 11st acquisition module and the 12nd It is whether identical;
Second update module, for being obtained when the 11st acquisition module of the second contrast module comparison and the 12nd acquisition module Mobile terminal identification difference when, update with token serial number establish associated mobile terminal identification, terminate.
Wherein, device further include: establish module, for when receive mobile terminal token transmission token serial number when, Device and mobile terminal token establish network data link.
Specifically, device further include: the 13rd obtains module and the 4th preserving module;
13rd obtains module, and for establishing after module establishes network data link, it is corresponding to obtain mobile terminal token Network data link mark;
4th preserving module saves depositing to device for network data link mark to be associated with token serial number foundation Storage area.
Specifically, device further include: the 14th obtains module;
14th obtains module, for obtaining corresponding network data chain from the memory block of device according to token serial number Line, and corresponding network data link is obtained according to network data link mark;
Further, the first sending module is specifically used for: obtaining the network data link mark that module obtains according to the 14th Know and obtain corresponding network data link, pushing certification is sent by network data link and is requested to mobile terminal token.
Further, in the first preserving module, it is specifically used for: sends the request of storage challenging value to buffer service, delay The service of depositing stores challenging value and token serial number into the list of cache server according to preset storage rule;
Further, second module is obtained, be specifically used for: sent the request for obtaining challenging value to buffer service, cache Service corresponding challenging value of query token sequence number from the list of cache server according to token serial number, and return to certification Server.
Optionally, device further include: setup module;
Setup module, the effective time for being stored in cache server for challenging value to be arranged, when challenging value is more than to cache When the effective time of server, cache server deletes challenging value.
Optionally, device can also include: removing module;
Whether removing module judges the response value in the response value generated and pushing certification response for first judgment module After matching, the challenging value corresponding with token serial number saved in cache server is deleted.
The beneficial effect that the present invention obtains is: using technical method of the invention, equilibrium treatment is used by the way of cluster The request at family, it would not be necessary to which the persistence and data for needing frequently to access are saved into cache server authenticates for more Server concurrently accesses, and greatly alleviates the pressure of rear end storage, simplifies flow chart of data processing, reduces data processing difficulty, Guarantee that the data of every server storage can be saved the space of certificate server memory block, be shortened reading data by intercommunication Time.
Detailed description of the invention
Illustrate the embodiment of the present invention or technical solution in the prior art in order to clearer, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with It obtains other drawings based on these drawings.
Fig. 1 is the method stream that server data memory space is shared in a kind of activation of the offer of the embodiment of the present invention 2 Cheng Tu;
Fig. 2 is the side that server data memory space is shared during a kind of pushing certification that the embodiment of the present invention 3 provides Operational flowchart when mobile terminal token starts in method;
Fig. 3 and Fig. 4 is that server data memory space is shared during a kind of pushing certification that the embodiment of the present invention 3 provides Method flow diagram;
Fig. 5 is the side that server data memory space is shared during a kind of pushing certification that the embodiment of the present invention 4 provides Operational flowchart when mobile terminal token starts in method;
Fig. 6 is the side that server data memory space is shared during a kind of pushing certification that the embodiment of the present invention 4 provides Method flow chart;
Fig. 7 is the side that server data memory space is shared during a kind of simple challenge that the embodiment of the present invention 5 provides Method flow chart;
Fig. 8 is the schematic diagram for the device that a kind of server data memory space that the embodiment of the present invention 6 provides is shared.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
The data of certificate server can set enough quantity according to demand in the present invention, with certificate server for 4 Illustrate for platform, illustrate herein, 4 certificate servers are respectively designated as No.1 certificate server, No. two certificate servers, three Number certificate server and No. four certificate servers, wherein No.1 certificate server IP is 192.168.3.28, No. two authentication services Device IP is 192.168.5.21, No. three certificate server IP are 192.168.45.48, No. four certificate server IP are 192.168.52.15, wherein 4 certificate servers individually can carry out additions and deletions to cache server and change the operation looked into;
The embodiment of the present invention 1 describes a kind of method that server data memory space is shared, and embodiment 2 describes A kind of shared method of server data memory space in activation, embodiment 3 describe during a kind of pushing certification The shared method of server data memory space, described in embodiment 4 is that server data stores during a kind of pushing certification The shared method in space, embodiment 5 describes the method that server data memory space during a kind of simple challenge is shared, Embodiment 6 describes a kind of device that server data memory space is shared.
Embodiment 1
The embodiment of the present invention 1 provides a kind of method that server data memory space is shared, comprising:
When receiving the certification request of application server transmission, certificate server generates challenging value, obtains certification request In user information, search corresponding with user information token serial number;According to the challenging value of generation, the user information got And the token serial number found generates pushing certification request, sends pushing certification and requests to mobile terminal token, and will give birth to At challenging value corresponding with the token serial number found save to cache server;
When receiving the pushing certification response of mobile terminal token transmission, certificate server searches mobile terminal token pair The server seed key answered obtains challenging value from cache server according to token serial number, according to the server kind found Sub-key and the challenging value got generate response value;Judge the response value generated is with the response value in pushing certification response No matching is then to send certification success response to application server, otherwise sends authentication failure response to application server.
Specifically, when receiving the certification request of application server transmission, further includes: obtain the application in certification request Mark, and application message is obtained according to application identities;
Wherein, it is generated and is pushed according to the challenging value of generation, the user information got and the token serial number found Certification request, specifically: according to the challenging value of generation, the user information got, the token serial number and application found Information generates pushing certification request.
Further, it sends pushing certification to request to before mobile terminal token, further includes: certificate server is according to token Sequence number obtains corresponding certificate server IP from cache server, and the certificate server IP for judging itself IP and getting It is whether identical, it is that pushing certification request is sent to mobile terminal token, otherwise pushing certification request is sent to and is got The corresponding certificate server of certificate server IP;
Specifically, method further include: when receiving the pushing certification request that another certificate server is sent, authentication service The pushing certification received request is sent to mobile terminal token by device.
Further, further includes: when receiving the token serial number of mobile terminal token transmission, certificate server will be certainly Body IP is associated with preservation to cache server with token serial number foundation.
Further, after itself IP is associated with preservation to cache server with token serial number foundation by certificate server, Further include: certificate server obtains certificate server IP according to token serial number, and with according to token serial number from buffer service Corresponding certificate server IP is obtained in device to compare, if identical, without updating, is terminated;Otherwise, certificate server will It updates and establishes associated certificate server IP with token serial number, terminate.
Optionally, it sends pushing certification to request to before mobile terminal token, further includes: certificate server, which sends push, to be recognized Card request is to cache server and generates authentication notification data, and authentication notification data are sent to mobile terminal token;
Specifically, method further include: after receiving the information for obtaining pushing certification request of mobile terminal token return, Certificate server obtains token serial number from obtaining in the information that pushing certification is requested, according to token serial number from cache server Middle acquisition pushing certification request, and push request certification is sent to mobile terminal token.
More specifically, authentication notification data are sent to mobile terminal token, specifically include: certificate server is according to token Sequence number obtains mobile terminal identification from cache server, and authentication notification data and mobile terminal identification are sent to Authentication notification data are sent to the corresponding mobile terminal of mobile terminal identification according to mobile terminal identification and enabled by iCloud, iCloud Board.
Wherein, when receiving the token serial number and mobile terminal identification of the transmission of mobile terminal token, certificate server Token serial number is associated with preservation to cache server with mobile terminal identification foundation.
Wherein, after token serial number being associated with preservation to cache server with mobile terminal identification foundation, further includes: certification Server obtains mobile terminal identification according to token serial number, and corresponding with being obtained from cache server according to token serial number Mobile terminal identification compare, if identical, without update, terminate;Otherwise, certificate server will update and token sequence Row number establishes associated mobile terminal identification, terminates.
Optionally, when receiving the token serial number of mobile terminal token transmission, further includes: certificate server and movement Terminal token establishes network data link.
Further, after certificate server and mobile terminal token establish network data link, further includes: certificate server The corresponding network data link mark of mobile terminal token is obtained, and network data link mark and token serial number are established and closed UNPROFOR is deposited to the memory block of certificate server.
Further, it sends pushing certification to request to before mobile terminal token, further includes: certificate server is according to order Card sequence number obtains corresponding network data link mark from the memory block of certificate server, and according to network data link mark Know and obtains corresponding network data link;
Wherein, pushing certification is sent to request to mobile terminal token, specifically: certificate server is according to network data link Mark obtains corresponding network data link, sends pushing certification by network data link and requests to mobile terminal token.
Specifically, it saves the challenging value of generation is corresponding with the token serial number found to cache server, specifically: Certificate server sends the request of storage challenging value to buffer service, buffer service according to preset storage rule by challenging value and Token serial number is stored into the list of cache server;
Specifically, challenging value is obtained from cache server according to token serial number, specifically: certificate server, which is sent, to be obtained The request of challenging value is to buffer service, buffer service query token sequence from the list of cache server according to token serial number Number corresponding challenging value, and return to certificate server.
Optionally, it by after the preservation to cache server corresponding with the token serial number found of the challenging value of generation, also wraps Include: certificate server setting challenging value is stored in the effective time of cache server, is more than effective time, cache server will be chosen War value is deleted.
Specifically, after judging whether the response value generated matches with the response value in pushing certification response, further includes: recognize Server is demonstrate,proved to delete the challenging value corresponding with token serial number saved in cache server.
Embodiment 2
The method shared the present embodiment provides server data memory space in a kind of activation is applied to referring to Fig. 1 In system including authentication management platform, certificate server and mobile terminal token, specifically include:
Step 101: authentication management platform generates the first activation request according to the user information in user record;
Before this step further include: authentication management platform receives the user record that the needs of administrator's selection activate, according to User record judges whether that corresponding user information can be obtained, if so, thening follow the steps 101, otherwise prompt information is endless It is whole, terminate;
In the present embodiment, after executing step 101 further include: judge whether that corresponding token identifications code can be got, move Dynamic terminal system version, if so, thening follow the steps 102, otherwise prompt information is imperfect, terminates;
Wherein, authentication management platform is in user's registration, it is desirable that user inputs token identifications code and mobile terminal system version This;
For example, authentication management platform receives the user record of administrator's selection are as follows:
User information includes: user name: abc@test.com, password: 168408afag
User mobile phone number: 01234567890
User name: abc
Subscriber mailbox: 123456789@163.com
Mobile terminal number: 18912345678
Token identifications code: 57987117827971672588
Mobile terminal system version: 1
Further, in the present embodiment, before step 101 further include:
Step 100-1: authentication management platform receives the activator button that administrator clicks;
Step 100-2: authentication management platform judges whether that last time activationary time can be got, if it is, executing step Rapid 101-3, it is no to then follow the steps 101;
Step 100-3: authentication management platform obtains present system time, judges present system time and last time activationary time Difference whether be greater than preset duration, if so, then follow the steps 101, otherwise return to not reproducible activation response, terminate;
Step 102: the first activation request is sent to certificate server by authentication management platform;
Step 103: certificate server obtains user information from the first activation request, calls random number generation function, raw At the first random number, ID is requested using the first random number as activation;
In the present embodiment, it is preferred that in order to guarantee safety, it is desirable that two-dimension code image can only be effective in the given time, because This, after certificate server generates activation request ID, activation request ID is saved into server memory block, and record server system It unites the time.
For example, the activation request ID generated is fasdcvxvdsafdsfzcxcsdfsdafcxz, when recording server system Between be 1417502570.
Step 104: after activation request ID is associated with by certificate server with user information foundation, by activation request ID and user Information is sent to cache server;
Step 105: certificate server generates the first activation and responds and return to authentication management platform;
Specifically, in the present embodiment, certificate server receives the first activation request from authentication management platform, before presetting Sew and is identified as yunxin: //, preset domain name are as follows: api-6 enterprises identify .cloudentify.com;
The the first activation response generated are as follows:
Does yunxin: //api-6 enterprise identify .cloudentify.com? reqid=activation request ID;
For example, certificate server identifies yunxin according to default prefix: //, the enterprise that gets identify dfserv, preset Domain name api-6 enterprise mark .cloudentify.com and activation request IDfasdcvxvdsafdsfzcxcsdfsdafcxz;
The the first activation response generated are as follows:
Yunxin: //api-dfserv.cloudentify.com? reqid= fasdcvxvdsafdsfzcxcsdfsdafcxz。
Step 106: authentication management platform generates two-dimension code image according to the first activation response received;
Specifically, in the present embodiment, authentication management platform is using e-mail activation mode according to the first activation received Response generates two-dimension code image.
Step 107: mobile terminal token scans the two-dimensional code, obtain terminal prot number, according to default domain name, enterprise mark and Terminal prot number obtains activation URL, by activation URL access registrar server, establishes network data link with certificate server, And the second activation is generated according to activation request ID and is requested;
In the present embodiment, mobile terminal token scans the two-dimensional code, and obtains the first activation response according to two-dimension code image, from Default domain name, enterprise's mark and activation request ID are obtained in first activation response.For example, mobile terminal token is rung from the first activation The activation request ID got in answering is fasdcvxvdsafdsfzcxcsdfsdafcxz;
Terminal is specially that pc machine, iPad, mobile phone (terminal device of the mobile terminal token off board) etc. can receive The terminal device of mail.For example, the terminal prot number that mobile terminal token is got is 1843, domain name and enterprise's mark are preset api-dfserv.cloudentify.com;
Obtained activation URL are as follows:
api-dfserv.cloudentify.com:1843/fasdcvxvdsafdsfzcxcsdfsdafcxz;By this URL access registrar server is activated, establishes network data link, specially TCP connection with certificate server, transmission data are preferred Using JSON data format;
In the present embodiment, this step further include: mobile terminal token obtains default activation line request type, obtains and saves Token identifications code and token release number, call and obtain system type function, mobile terminal system type is obtained, then to default Activation line request type, activation request ID, token identifications code, mobile terminal system type and token release number carry out the school mac It tests, obtains mac check code;
For example, the terminal prot number obtained is 1843, the default activation line request type got is 6, i.e., " reqtype":"6";The token identifications code got is 57,987,117,827,971 672588, i.e., " udid ": " 57987117827971672588";The token release number got is 2.5, i.e. app_version ": " 2.5 ";It calls and obtains system It unites type of functions, the mobile terminal system type got is Android system, then mobile terminal system type is set to 1 (if For IOS system, then 2) mobile terminal system type is set to, i.e. " os ": " 1 ";The mac check code being calculated is e532607 9df79129b8bd599301a1b9efb360b0cc6;Then according to default domain name, enterprise's mark, activation request ID and terminal end The second activation request that slogan generates are as follows:
{"os":"1","reqid":"fasdcvxvdsafdsfzcxcsdfsdafcxz","reqtype":"6"," udid":"57987117827971672588",app_version":"2.5","mac":"e5326079df79129b8bd59 9301a1b9efb360b0cc6"};
Step 108: the second activation request is sent to certificate server by network data link by mobile terminal token;
Step 109: after certificate server receives the second activation request data, obtaining activation from the second activation request and ask ID is sought, judges whether activation request ID is correct and effective, if it is thening follow the steps 110, otherwise reports an error, terminates.
In the present embodiment, judge whether activation request ID is correct and effective, specifically: judgement activation request ID and server Whether the activation request ID saved in memory block is identical, if it is, activation request ID is correct, otherwise activation request ID is being not just Really;And judge whether the difference of the system time saved in server system time and server memory block is (excellent in preset range It is selected as 120s) in, if it is, activation request ID is effective, the activation request ID otherwise received is invalid, deletes server storage ID is requested in activation in area;
In the present embodiment, step 109 further include: certificate server obtains token identifications code from the second activation request data With mobile terminal system type, and the Terminal Equipment Identifier of preservation is obtained from certificate server memory block according to activation request ID Code and mobile terminal system type, judge whether to match, if so, thening follow the steps 110, otherwise report an error, and terminate;
Step 110: certificate server obtains user information according to activation request ID from cache server;
Step 111: certificate server generates a token serial number according to token serial number generation method;
In the present embodiment, it is preferred that according to the genesis sequence of token serial number, generating a length is for OTP authentication center 10 token serial numbers, in addition to this it is possible to are as follows: default operation is carried out to user name, generates token serial number;
Wherein, it is preferred that token serial number generation method, specifically: according to the genesis sequence of token serial number, according to from 0000000001 sequence for starting to increase every time 1 generates a token serial number;
For example, activated token serial number is 1000000009, then this token serial number generated is 1000000010;
Step 112: token serial number, activation request ID are associated with by certificate server with user information foundation, are closed establishing The information preservation of connection is to cache server;
Step 113: certificate server calls random number generation function, generates the second random number, which is made The factor is generated for seed, the factor is generated according to seed and generates server seed key;
In the present embodiment, it is preferred that random number generation function calls in OTP authentication center, and Random.nextInt (10) is raw It is 10 metric second random numbers at length, generates the factor as seed;
For example, it is 30750849669824758444 that the second random number that certificate server generates, i.e. seed, which generate the factor,;
In the present embodiment, certificate server application is default to derive algorithm, generates the factor to seed and derives, is serviced Device seed key, it is preferred that certificate server application PBKDF2 derives algorithm, obtains the server seed key of 20 bytes, In addition to this it is possible to derive algorithm etc. for BF;
For example, it is 6595781253 that the second random number that certificate server generates, i.e. seed, which generate the factor,;
It generates the factor to seed to derive, obtained server seed key are as follows:
FB80ECDA5EDF464CF7715EE66A25ED079122D429。
Step 114: certificate server obtains corresponding enterprise's key according to user name, using enterprise's key pair server kind Sub-key is encrypted, and encryption server seed key is obtained, and encryption server seed key is associated with simultaneously with user name foundation It saves into certificate server memory block;
Specifically: certificate server carries out server seed key according to token serial number, using predetermined encryption algorithm Encryption, obtains binary encryption server seed key, then carries out to binary encryption server seed key Base64 conversion, obtains character string, it is preferred that predetermined encryption algorithm is 3DES algorithm, in addition to this it is possible to be SM3, RSA Algorithm etc.;
For example, enterprise's key that certificate server is got are as follows:
1F3D4E3A12459372B837193177913782;
The encryption server seed key for encrypting and being obtained after conversion using enterprise's key pair server seed key are as follows:
PL96EUSWSdPP2gj8fr6m-YXBpLWE0OTJjN2Q3LmR1b3NlY3VyaXR5LmNvbQ;
In the present embodiment, the generating process of the enterprise's key saved in certificate server is as follows:
Step 1: the administrator key of key operation platform reception key holder;
It wherein, is the safety for guaranteeing administrator key, the administrator key of key holder needs to regularly replace;
Step 2: key operation platform carries out default operation to administrator key, obtains master key, by master key save to In memory block;
Step 3: certificate server timing obtains master key to key operation platform, judges the master key got and service Whether the master key saved in device memory block is identical, if so, thening follow the steps 4, otherwise updates the master in server memory block Key executes step 4;
In the present embodiment, since administrator key needs to regularly replace, it is therefore preferred that certificate server is at intervals of two minutes The request for obtaining master key is sent to key operation platform, receives the current master key that key operation platform returns;
Step 4: certificate server obtains corresponding enterprise ID according to user name, carries out hash fortune to master key and enterprise ID It calculates, obtains enterprise's key, enterprise's key is saved into cache server;
Wherein, enterprise ID is in administrator's registration, and authentication management platform is the enterprise ID that the enterprise is randomly assigned, and with Multiple user names, which are established, to be associated with and saves into cache server;
In the present embodiment, since server seed key is encrypted using enterprise ID, work as some server When seed key is cracked, the server seed key of other enterprises can not be cracked simultaneously, and safety is more preferably;
Step 115: certificate server generates the factor according to token serial number and seed, using default building form, generates Second activation response;
In the present embodiment, it is preferred that certificate server generates the factor to seed according to token identifications code and encrypts, and obtains Encryption seed generates the factor;
This step further include: certificate server obtains password generated algorithm, according to the password generated algorithm got, setting Algorithm ID obtains present system time;
For example, it is 30750849669824758444 that the encryption seed that certificate server obtains, which generates the factor,;It gets Password generated algorithm is SM3 password generated algorithm, then sets 00 (if the password generated algorithm got is for algorithm ID 01) AUTH password generated algorithm, then set algorithm ID to;To activation line request type, activation request ID, algorithm ID, enable Card sequence number, encryption seed generate the factor, user name, enterprise's mark and server system time and carry out mac verification, obtain mac Check code;
Further, certificate server according to activation line request type, activation request ID, algorithm ID, token serial number, Encryption seed generates the factor, user name, enterprise's mark, server system time and mac check code and forms response data, using pre- If arranging key encrypts response data, the second activation response is obtained;
For example, the response data generated is
{"data":"pushtype":"6","reqid":"fasdcvxvdsafdsfzcxcsdfsdafcxz"," algid":"00","token":"1000000010","factor":"30750849669824758444","userid":" abc","compname":"dfserv","time":"1417502589"};
The second activation obtained after response data encryption is responded using default arranging key are as follows:
{"data":"591f86917938bb30066991c78f1e2b4c63a125ea90d8800418fa3e07dc2 d1187f7c64bac023a34d7dc58dcf7c79e99fccc874de6fba79a0eb50614fe73624d69b95fd92 d3cf83c1d2894355e790b2ff6dcce8892ed153681eb478521843eaf6f3a5623236754a7bb0b7 d709be74d79cd57a20d4a9af495e9c84918920dc0d1f94d032fd8f2baa4e6d8c230b2802e777 7a07e47fef374444b77412890c204fb729e6e10fd7fa658db115c32f713b53e1bbbba92d366c 0b69e7b70a87eeb564c51","mac":"f09749aa775b9eb84c0931e7250c95ea84ec901a"};
Step 116: the second activation response is sent to mobile terminal token by network data link by certificate server;
Step 117: mobile terminal token obtains seed from the second activation response and generates the factor and token serial number, according to Seed generates the factor and generates token seed key, and token seed key and built-in dynamic factor are calculated, and generates dynamic mouth It enables and token sequence number encrypts token seed key, crypto token seed key is obtained, by crypto token seed Key and token serial number are saved into token memory block;
This step specifically includes: the default arranging key of mobile terminal token application solves the second activation response data It is close, response data is obtained, seed is obtained from response data and generates the factor and token serial number;
This step, further includes: mobile terminal token acquisition algorithm ID from the second activation response, according to algorithm ID acquisition pair The password generated algorithm answered, from second activation response in obtain the server system time, according to the server system time calculate with The drift value of mobile terminal time, according to the password generated algorithm of the drift value application selection to token seed key and built-in Dynamic factor is calculated, and dynamic password is generated;
Before this step further include: mobile terminal token obtains activation request ID from the second activation response, judges to activate It requests the activation saved in ID and token request ID whether identical, if so, thening follow the steps 116, otherwise reports an error, terminate;
It is derived for example, mobile terminal of mobile telephone token generates the factor to seed, obtained token seed key is FB80 ECDA5EDF464CF7715EE66A25ED079122D429;
Getting corresponding password generated algorithm according to algorithm ID is OATH time type algorithm, in addition to this can also be state Close time type algorithm SM3 algorithm etc., the dynamic password of generation are 179059;
Step 118: mobile terminal token generates third activation according to dynamic password, token serial number and activation request ID and asks It asks;
In the present embodiment, it is preferred that mobile terminal token is requested ID according to default activation line request type, activation, swashed Success or failure result, token release number, token serial number and dynamic password living generate third activation request;
For example, the third generated activates request are as follows:
{"result":"1","reqtype":"7","otp":"179059","token":"1000000010"," reqid":"fasdcvx vdsafdsfzcxcsdfsdafcxz"};
In the present embodiment, since a mobile phone can be equipped with multiple token programs, the corresponding order of each token programs Card sequence number, after token serial number is sent to certificate server by mobile terminal token, certificate server is obtained and the token sequence The corresponding all information of row number, in addition to this, can not also on send token serial number, then certificate server according to activation request ID Obtain corresponding all information;
Step 119: third activation request is sent to certificate server by network data link by mobile terminal token;
Step 120: after certificate server receives third activation request, obtaining activation request from third activation request ID judges whether activation request ID is correct and effective, if it is thening follow the steps 121, otherwise reports an error, terminates;
Specifically: whether the activation request ID saved in certificate server ID and certificate server memory block is identical, if It is then to activate request ID correct, otherwise activation request ID is incorrect;
Step 121: certificate server obtains dynamic password from the third activation request received;
Step 122: certificate server calculates server seed key and built-in dynamic factor, generates dynamic mouth It enables;
In the present embodiment, specifically, certificate server obtains encryption server seed key and enterprise's key, using enterprise Industry key pair encryption server seed key is decrypted, and obtains server seed key, is generated according to server seed key Dynamic password;
For example, certificate server gets corresponding encryption seed server key according to user name ft are as follows:
PL96EUSWSdPP2gj8fr6m-YXBpLWE0OTJjN2Q3LmR1b3NlY3VyaXR5LmNvbQ;
The enterprise's key got are as follows:
1F3D4E3A12459372B837193177913782;
Decryption obtains server seed key are as follows:
FB80ECDA5EDF464CF7715EE66A25ED079122D429;
The dynamic password of generation is 179059;
Before this step further include: after certificate server receives third activation request, obtained from third activation request Activation request ID is taken, judges whether activation request ID is correct, if so, thening follow the steps 122, otherwise reports an error, terminates;
Specifically: certificate server judge in activation request ID and server memory block the activation that saves request ID whether phase Together, if it is, activation request ID is correct, otherwise activation request ID is incorrect;
Step 123: the dynamic password that certificate server judgement generates and the dynamic mouth got from third activation request It enables and whether matching, if so, thening follow the steps 125, otherwise activate response to the third that mobile terminal token returns to activation failure, Terminate;
In the present embodiment, after step 123 further include: the data in the server that empties the cache;
Specifically, certificate server notice cache server clears data;
Step 124: certificate server, which generates, activates successful third activation response;
Specifically, online activation result type, activationary time are preset in certificate server acquisition, according to default activation line class Type, activation request ID, activation successful result and activationary time generate third activation response;
For example, certificate server, which generates, activates successful third activation response are as follows:
{"pushtype":"7","reqid":"fasdcvxvdsafdsfzcxcsdfsdafcxz","result":" 1","time":"1417502590"};
Further, this step further include: certificate server obtains present system time, using present system time as upper Secondary activationary time saves;
Step 125: third activation response is sent to mobile terminal token by certificate server;
In the present embodiment, third activation response is sent to mobile terminal by network data link and enabled by certificate server Board;
Step 126: after mobile terminal token receives third activation response, judging whether third activation response activates into Function then activates completion if it is activating successfully, terminates, if it is failure response, then activates failure, terminates;
In this step, when activation fails further include: display activation failure information;When activation is completed further include: mobile terminal Token display activation successful information.
Embodiment 3
The embodiment of the present invention 3 provides a kind of shared method of server buffer during pushing certification, applied to including In the system of application server, certificate server and mobile terminal token, comprising:
Referring to fig. 2, when mobile terminal token starts, following operation is executed:
Step a1: mobile terminal token obtains the internal access address saved, is built according to access address and certificate server Vertical network data link;
Specifically, in the present embodiment, mobile terminal token obtains the internal access address saved, as internal preservation Domain name, such as: www.ftsafe.com.cn.After mobile terminal token obtains the internal access address saved, access is requested access to Network data link is established with certificate server automatically in address.
Step a2: the token serial number that inside saves is sent to load balancer by mobile terminal token;
Step a3: load balancer is sent to corresponding certificate server according to the default method of salary distribution, by token serial number;
In the present embodiment, token serial number is sent to idle certification according to default load balancing mode by load balancer Server will according to the sequence made an appointment after load balancer receives the token serial number of mobile terminal token transmission Token serial number is sent to certificate server, for example, token serial number is first sent to No.1 and is recognized according to the sequence from one to four Server is demonstrate,proved, if No.1 certificate server is idle, No.1 server handles token serial number, if No.1 authenticates Server is in running order, then token serial number is successively sent to No. two certificate servers, and so on.
Step a4: after certificate server receives token serial number, and token serial number and certificate server IP are uploaded To cache server, token serial number is established with network data link mark and is associated with, is saved to certificate server memory block;
In the present embodiment, network data link mark is a string of numbers, can be found by network data link mark Number corresponding network data link.
Step a5: cache server judges whether can to get and sequence of tokens according to the token serial number received Otherwise number corresponding certificate server IP is protected token serial number and certificate server IP are corresponding if so, then follow the steps a6 It deposits, terminates;
Step a6: certificate server obtains certificate server IP from cache server according to token serial number, judges to obtain The certificate server IP and certificate server IP that is uploaded to cache server it is whether identical, if it is, without updating, knot Beam, it is no to then follow the steps a7;
Step a7: cache server is according to the token serial number and certificate server IP received, update and sequence of tokens Number corresponding certificate server IP terminates.
As shown in Figure 3 and Figure 4, when application interface receives the user information of user's input, and receive user click it is true After recognizing button, following operation is executed:
Step 201: application server receives the user information from application interface;
In the present embodiment, user information can be user name, or username and password, the present embodiment are believed with user It ceases to illustrate for username and password;
For example, user information includes: user name: abc@test.com, password: 168408afag, user mobile phone number: 01234567890。
In the present embodiment, further includes: after application server receives user information, judge username and password whether just Really, if so, thening follow the steps 202, error message otherwise is returned to application interface, after application interface receives error message, The incorrect prompt information of user information is exported, is terminated;
Wherein, when username and password is incorrect, further includes: update verifying number, judge updated verifying number Whether preset times are reached, if it is, report an error, otherwise return step 201;
It further, further include that output prompt is again defeated after the application interface output incorrect prompt information of user information The prompt information of access customer information.
Step 202: application server generates certification request according to user information and the internal application identities saved;
For example, application interface is WEBSDK login interface, corresponding application identities are yiwnzh-ajg.
Step 203: certification request is sent to No.1 certificate server using load balancing mode by application server;
In the present embodiment, illustrate for there are 4 certificate servers, illustrate again, server can according to need Set enough quantity;
4 certificate servers are respectively designated as No.1 server, No. two servers, route server and No. four servers, Wherein, 4 certificate servers individually can change the operation looked into cache server progress additions and deletions, when application server takes to certification It is engaged in after device sends certification request, certification request is sent to certificate server according to the sequence made an appointment, for example, according to from one To four sequence, certification request is first sent to No.1 certificate server, if No.1 certificate server is idle, No.1 service Device executes authentication operation and certification request is successively sent to No. two certifications if No.1 certificate server is in running order Server, and so on;
Step 204: after No.1 certificate server receives certification request, generating challenging value, obtain and recognize from certification request User information and application identities in card request, corresponding token sequence is obtained according to user information from certificate server memory block Row number, and corresponding application message is obtained according to application identities;
In the present embodiment, preserved in certificate server memory block user information, server seed key, application message and Token serial number;
This step further include: judge application corresponding with application identities whether can be found from certificate server memory block Otherwise information returns to application server if it is, continuing and applies unregistered information;
In the present embodiment, it is preferred that generate the challenging value of preset length, preset length is 6 decimal datas;Wherein, Generating challenging value can be to call random number generation function to generate random number, using random number as challenging value, or: according to User name obtains corresponding server seed key from server memory block, calculates server seed key, generates Challenging value;
Wherein, server seed key is calculated, generates challenging value, specifically: using preset algorithm to server Seed key is calculated, and generates the metric challenging value that length is 6, it is preferred that preset algorithm is SM3 algorithm, may be used also Think OATH algorithm etc.;
For example, the challenging value generated is 308962.
Step 205: challenging value is associated with token serial number foundation and saves to cache server by No.1 certificate server;
Specifically, challenging value and token serial number are sent to buffer service by No.1 certificate server.
Step 206: No.1 certificate server obtains corresponding guarantor according to the token serial number received from cache server The information for the mobile terminal token deposited, certificate server IP;
Before this step further include: certificate server calls random number generation function, generates random number, which is made For certification request mark, it is associated with and is saved into cache server with user information foundation;
Further, further includes: certificate server obtains the current server time, using the current server time as certification The generation time of request mark saves into server memory block;
For example, the certification request mark that certificate server generates are as follows:
02c0e8b4-be19-49f6-aab6-273b38522cea;
The generation time of certification request mark is 1419325026;
Then, pushing certification request is generated according to challenging value, user information, token serial number and application message, specifically: it obtains The current server time is taken, according to challenging value, token serial number, user information, current server time, application message and certification Request mark generates pushing certification request;
For example, the pushing certification request generated are as follows:
{"appname":"WEBSDK","challenge":"308962","pushtype":"1","reqid":" 02c0e8b4-be19-49f6-aab6-273b38522cea","time":"1419325027","token":" 1000000003","userid":"abc@test.com"}。
Step 207: No.1 certificate server is pushed away according to the generation of challenging value, user information, token serial number and application message Send certification request;
Step 208: No.1 certificate server judges that the certificate server IP saved in cache server and No.1 certification take Whether business device IP is identical, if so, 209 are thened follow the steps, it is no to then follow the steps 211;
In the present embodiment, if No.1 certificate server IP is 192.168.3.28, and got from cache server Certificate server IP be 192.168.5.21, corresponding is No. two certificate server IP, indicate No.1 certificate server be not The certificate server that network data link is established with mobile terminal token, thens follow the steps 211.
Step 209: No.1 certificate server obtains corresponding network number according to token serial number from the server buffer According to link identification;
Step 210: pushing certification request is sent to pair by No.1 certificate server by the network data link that gets The mobile terminal token answered, mobile terminal token execute step 214;
Step 211: pushing certification is requested the certificate server IP being sent in cache server by No.1 certificate server Corresponding No. two certificate servers;
Step 212: No. two certificate servers obtain corresponding network number according to token serial number from the server buffer According to link identification;
Step 213: pushing certification request is sent to pair by No. two certificate servers by the network data link that gets The mobile terminal token answered, mobile terminal token execute step 214;
Step 214: mobile terminal token obtains challenging value, user information and application message and is shown from pushing certification request Show, selection of the user to be received to display information is waited to then follow the steps 215 if user selects confirmation to log in, otherwise terminate;
In the present embodiment, mobile terminal token is current according to challenging value, user information, application message and the token that gets Time is filled preset format, obtains display information.
Step 215: mobile terminal token calculates challenging value and the internal token seed key saved, generates first Response value generates pushing certification response data according to the first response value;
Wherein, mobile terminal token is according to login result, token current time, auth type, the first response value, token sequence Row number and certification request mark generate pushing certification response data;
For example, the first response value that mobile terminal token generates is 677165, then the pushing certification response data generated are as follows:
{"result":"1","time":"1419325027","reqtype":"2","otp":"677165"," token":"1000000003","reqid":"02c0e8b4-be19-49f6-aab6-273b38522cea"};
Wherein, login result 1 is expressed as allowing to log in, and token current time is 1419325027, auth type 2, As pushing certification type, the first response value are 677165, and token serial number 1000000003, certification request is identified as 02c0e8b4-be19-49f6-aab6-273b38522cea。
Step 216: mobile terminal token will be sent to No.1 in pushing certification response data by network data link and be authenticated Server;
Likewise, it is also using load balancing that pushing certification response data is sent to certificate server by mobile terminal token Mode carry out.
Step 217: No.1 certificate server obtains the challenging value of preservation from cache server;
Step 218: No.1 certificate server obtains the first response value from pushing certification response data, according to pushing certification Token serial number in response data obtains corresponding server seed key from server database;
Step 219: No.1 certificate server generates the second response value according to challenging value and server seed key, judges the Whether one response value and the second response value match, if so, thening follow the steps 220, otherwise generate authentication failure response, and should Authentication failure response is back to application server, terminates;
This step further include: No.1 certificate server deletes the data of the secondary certification saved in cache server, tool Body includes: to delete challenging value, certification request mark etc.;
In the present embodiment, when determining that the first response value and the second response value mismatch, further includes: No.1 certificate server To application server return authentication failure response, authentication failure response is back to application interface again by application server, using boundary After face receives authentication failure response, authentication output failure information terminates;
Further, after application interface authentication output failure information, it can also include: display login interface, continue User to be received inputs user information.
Step 220: No.1 certificate server generates certification success response, and the certification success response is back to using clothes Business device, certification terminate;
In the present embodiment, after application server receives certification success response, certification success response is back to using boundary Face, application interface allow user to access application, and show using the interface after logining successfully, and terminate using login authentication process.
Embodiment 4
The embodiment of the present invention 4 provides a kind of method that server buffer is shared, is applied to including application server, certification In the system of server, iCloud and mobile terminal token, comprising:
Referring to Fig. 5, when the starting of mobile terminal token, following operation is executed:
Step b1: mobile terminal token obtains the internal access address saved, is built according to access address and certificate server Vertical network data link;
Step b2: the token serial number that inside saves and mobile terminal identification are sent to load balancing by mobile terminal token Device;
For example, mobile terminal identification are as follows: 154654541fhah;
Step b3: token serial number and mobile terminal identification are sent to pair according to the default method of salary distribution by load balancer The certificate server answered;
Wherein, it is identical as the operation of step a3 in embodiment 3 to preset distribution method, is not repeating herein;
Step b4: after certificate server receives token serial number and mobile terminal identification, by token serial number and movement Terminal iidentification is sent to cache server;
Step b5: cache server judges whether can to get and sequence of tokens according to the token serial number received Otherwise number corresponding mobile terminal identification is protected token serial number and mobile terminal identification are corresponding if so, then follow the steps b6 It deposits, terminates;
Step b6: certificate server obtains mobile terminal identification from cache server according to token number, judges the shifting obtained Whether dynamic terminal iidentification and the mobile terminal identification for being uploaded to cache server are identical, if it is, terminate without updating, it is no Then follow the steps b7;
Step b7: cache server is according to the token serial number and mobile terminal identification received, update and sequence of tokens Number corresponding mobile terminal identification terminates.
As shown in fig. 6, when application interface receives the user information of user's input, and receive user and click ACK button Afterwards, following operation is executed:
Step 301: application server receives the user information from application interface;
In the present embodiment, user information can be user name, or username and password, the present embodiment are believed with user It ceases to illustrate for user name;
For example, user information includes: user name: abc@test.com;
In the present embodiment, further includes: after application server receives user name, judge be from application server for storage area It is no to find the user name, if so, thening follow the steps 302, error message, application interface otherwise are returned to application interface After receiving error message, the incorrect prompt information of user information is exported, is terminated;
It further, further include that output prompt is again defeated after the application interface output incorrect prompt information of user information Enter the prompt information of validated user information.
Step 302: application server generates certification request according to user information and the internal application identities saved;
For example, application interface is WEBSDK login interface, corresponding application identities are yiwnzh-ajg.
Step 303: certification request is sent to certificate server using load balancing mode by application server;
This step is identical as step 203 in embodiment 3, and details are not described herein.
Step 304: certificate server generates challenging value after receiving certification request, and challenging value is saved to buffer service Device;
In the present embodiment, it is preferred that generate the challenging value of preset length, preset length is 6 decimal datas;Wherein, Generating challenging value can be to call random number generation function to generate random number, using random number as challenging value, or: according to User name obtains corresponding server seed key from server memory block, calculates server seed key, generates Challenging value;
Wherein, server seed key is calculated, generates challenging value, specifically: using preset algorithm to server Seed key is calculated, and generates the metric challenging value that length is 6, it is preferred that preset algorithm is SM3 algorithm, may be used also Think OATH algorithm etc.;
For example, the challenging value generated is 308962.
Step 305: certificate server from certification request obtain certification request in user information and application identities, according to Application identities obtain corresponding application message;
This step further include: judge application letter corresponding with application identities whether can be found from server memory block Otherwise breath returns to application server if it is, continuing and applies unregistered information;
Step 306: certificate server obtains corresponding token serial number according to user information from server database;
User information, server seed key, application message and token are preserved in the present embodiment, in server database Sequence number.
Step 307: certificate server, which generates push according to challenging value, user information, token serial number and application message, to be recognized Card request;
Before this step further include: certificate server calls random number generation function, generates random number, which is made For certification request mark, it is associated with and is saved into cache server with user information foundation;
Further, further includes: certificate server obtains the current server time, using the current server time as certification The generation time of request mark saves into server memory block;
For example, the certification request mark that certificate server generates are as follows:
02c0e8b4-be19-49f6-aab6-273b38522cea;
The generation time of certification request mark is 1419325026;
In the present embodiment, pushing certification is generated according to challenging value, user information, token serial number and application message to ask It asks, specifically: the current server time is obtained, according to challenging value, token serial number, user information, the current server time, is answered It is identified with information, mobile terminal identification and certification request and generates pushing certification request;
For example, the pushing certification request generated are as follows:
{"appname":"WEBSDK","challenge":"308962","pushtype":"1","reqid":" 02c0e8b4-be19-49f6-aab6-273b38522cea","time":"1419325027","token":" 1000000003","userid":"abc@test.com","phoneid":"154654541fhah"}。
Step 308: certificate server obtains mobile terminal identification according to token serial number from cache server;
Step 309: pushing certification is requested deposit cache server by certificate server;
Wherein, authentication notification data are used to indicate pushing certification and request the position in cache server.
Step 310: certificate server requests to generate authentication notification data according to pushing certification;
Step 311: authentication notification data and mobile terminal identification are sent to iCloud by certificate server;
Authentication notification data are sent to the mobile terminal identification and corresponded to by step 312:iCloud according to mobile terminal identification Mobile terminal token in;
Step 313: mobile terminal token, which is generated, obtains the information of pushing certification request comprising authentication notification data, and leads to It crosses network data link and is sent to certificate server;
Step 314: after certificate server receives the information for obtaining pushing certification request comprising authentication notification data, from Push request certification is obtained in cache server;
Step 315: pushing certification request is sent to mobile terminal token by certificate server;
Step 316: mobile terminal token obtains challenging value, user information and application message and is shown from pushing certification request Show, selection of the user to be received to display information is waited to then follow the steps 317 if user selects confirmation to log in, otherwise terminate;
In the present embodiment, mobile terminal token is current according to challenging value, user information, application message and the token that gets Time is filled preset format, obtains display information.
Step 317: mobile terminal token calculates challenging value and the internal token seed key saved, generates first Response value generates pushing certification response data according to the first response value;
Wherein, mobile terminal token is according to login result, token current time, auth type, the first response value, token sequence Row number and certification request mark generate pushing certification response data;
For example, the first response value that mobile terminal token generates is 677165, then the pushing certification response data generated are as follows:
{"result":"1","time":"1419325027","reqtype":"2","otp":"677165"," token":"1000000003","reqid":"02c0e8b4-be19-49f6-aab6-273b38522cea"};
Wherein, login result 1 is expressed as allowing to log in, and token current time is 1419325027, auth type 2, As pushing certification type, the first response value are 677165, and token serial number 1000000003, certification request is identified as 02c0e8b4-be19-49f6-aab6-273b38522cea。
Step 318: mobile terminal token will be sent in pushing certification response data to authentication service by network data link Device;
Step 319: certificate server obtains the challenging value of preservation from cache server;
Step 320: certificate server obtains the first response value from pushing certification response data, and according to authentication response number Token serial number in obtains corresponding server seed key from server database;
Step 321: certificate server generates the second response value according to challenging value and server seed key, judges that first answers It answers value and whether the second response value matches, if so, thening follow the steps 322, otherwise terminate;
This step further include: No.1 certificate server deletes the data of the secondary certification saved in cache server, tool Body includes: to delete challenging value, certification request mark etc.;
In the present embodiment, when determining that the first response value and the second response value mismatch, further includes: No.1 certificate server To application server return authentication failure response, authentication failure response is back to application interface again by application server, using boundary After face receives authentication failure response, authentication output failure information terminates;
Further, after application interface authentication output failure information, it can also include: display login interface, continue User to be received inputs user information.
Step 322: certificate server generates certification success response, and the certification success response is back to application service Device, certification terminate.
In the present embodiment, after application server receives certification success response, certification success response is back to using boundary Face, application interface allow user to access application, and show using the interface after logining successfully, and terminate using login authentication process.
Embodiment 5
The embodiment of the present invention 5 provides a kind of shared method of server data memory space during simple challenge, answers For include application server, certificate server and mobile device token system in, as shown in fig. 7, comprises:
Step 401: application server receives the user information from application interface;
In the present embodiment, user information can be user name, or username and password, the present embodiment are believed with user It ceases to illustrate for user name;
For example, user information includes: user name: abc@test.com;
In the present embodiment, further includes: after application server receives user name, judge be from application server for storage area It is no to find the user name, if so, thening follow the steps 302, error message, application interface otherwise are returned to application interface After receiving error message, the incorrect prompt information of user information is exported, is terminated;
It further, further include that output prompt is again defeated after the application interface output incorrect prompt information of user information Enter the prompt information of validated user information.
Step 402: application server generates certification request according to user information and the internal application identities saved;
For example, application interface is WEBSDK login interface, corresponding application identities are yiwnzh-ajg.
Step 403: certification request is sent to certificate server using load balancing mode by application server;
Step 404: after certificate server receives certification request, from the user's letter obtained in certification request in certification request Breath and application identities, obtain corresponding token serial number according to user information, and according to application from certificate server memory block Mark obtains corresponding application message;
This step further include: judge application letter corresponding with application identities whether can be found from server memory block Otherwise breath returns to application server if it is, continuing and applies unregistered information;
In the present embodiment, it is preferred that generate the challenging value of preset length, preset length is 6 decimal datas;Wherein, Generating challenging value can be to call random number generation function to generate random number, using random number as challenging value, or: according to User name obtains corresponding server seed key from server memory block, calculates server seed key, generates Challenging value;
Wherein, server seed key is calculated, generates challenging value, specifically: using preset algorithm to server Seed key is calculated, and generates the metric challenging value that length is 6, it is preferred that preset algorithm is SM3 algorithm, may be used also Think OATH algorithm etc.;
For example, the challenging value generated is 308962.
Step 405: certificate server generates challenging value, and sends cache server for token serial number, challenging value;
Specifically, in the present embodiment, token serial number and challenging value are in the form of " token serial number: challenging value " list It is sent to cache server.
Step 406: certificate server, which generates push according to challenging value, token serial number, user information and Apply Names, to be recognized Card request;
Before this step further include: certificate server calls random number generation function, generates random number, which is made For certification request mark, it is associated with and is saved into cache server with user information foundation;
Further, further includes: certificate server obtains the current server time, using the current server time as certification The generation time of request mark saves into server memory block;
For example, the certification request mark that certificate server generates are as follows:
02c0e8b4-be19-49f6-aab6-273b38522cea;
The generation time of certification request mark is 1419325026;
Then, pushing certification request is generated according to challenging value, user information, token serial number and application message, specifically: it obtains The current server time is taken, according to challenging value, token serial number, user information, current server time, application message, movement Terminal iidentification and certification request mark generate pushing certification request;
For example, the pushing certification request generated are as follows:
{"appname":"WEBSDK","challenge":"308962","pushtype":"1","reqid":" 02c0e8b4-be19-49f6-aab6-273b38522cea","time":"1419325027","token":" 1000000003","userid":"abc@test.com","phoneid":"154654541fhah"}。
Step 407: certificate server obtains corresponding network data chain according to token serial number from the server buffer Line;
Step 408: pushing certification request is sent to corresponding by certificate server by the network data link got Mobile terminal token;
Step 409: mobile terminal token obtains challenging value, user information and application message and is shown from pushing certification request Show, selection of the user to be received to display information is waited to then follow the steps 410 if user selects confirmation to log in, otherwise terminate;
In the present embodiment, mobile terminal token is current according to challenging value, user information, application message and the token that gets Time is filled preset format, obtains display information.
Step 410: mobile terminal token calculates challenging value and the internal token seed key saved, generates first Response value generates pushing certification response data according to the first response value;
Wherein, mobile terminal token is according to login result, token current time, auth type, the first response value, token sequence Row number and certification request mark generate pushing certification response data;
For example, the first response value that mobile terminal token generates is 677165, then the pushing certification response data generated are as follows:
{"result":"1","time":"1419325027","reqtype":"2","otp":"677165"," token":"1000000003","reqid":"02c0e8b4-be19-49f6-aab6-273b38522cea"};
Wherein, login result 1 is expressed as allowing to log in, and token current time is 1419325027, auth type 2, As pushing certification type, the first response value are 677165, and token serial number 1000000003, certification request is identified as 02c0e8b4-be19-49f6-aab6-273b38522cea。
Step 411: mobile terminal token will be sent in pushing certification response data to authentication service by network data link Device;
Step 412: certificate server gets client push authentication response data, obtains from pushing certification response data The first response value is taken, according to the token number in authentication response data, the challenging value of preservation is obtained from cache server;
In the present embodiment, there is certification to identify in pushing certification response data, therefrom obtain the " token in cache server Sequence number: challenging value " list is obtained from " token serial number: challenging value " list according to the token number in authentication response data Challenging value.
Step 413: certificate server obtains the seed in certificate server with the token serial number in authentication response data Key;
Step 414: certificate server generates the second response value according to challenging value and server seed key, judges that first answers It answers value and whether the second response value matches, if so, thening follow the steps 415, otherwise terminate;
This step further include: No.1 certificate server deletes the data of the secondary certification saved in cache server, tool Body includes: to delete pushing certification response data, challenging value, " token serial number: challenging value " list, certification request mark etc.;
In the present embodiment, when determining that the first response value and the second response value mismatch, further includes: No.1 certificate server To application server return authentication failure response, authentication failure response is back to application interface again by application server, using boundary After face receives authentication failure response, authentication output failure information terminates;
Further, after application interface authentication output failure information, it can also include: display login interface, continue User to be received inputs user information.
Step 415: certificate server generates certification success response, and the certification success response is back to application service Device, certification terminate.
In the present embodiment, after application server receives certification success response, certification success response is back to using boundary Face, application interface allow user to access application, and show using the interface after logining successfully, and terminate using login authentication process.
In the present invention, in addition to the transmission mode in embodiment, application interface and application server, application server and certification Communication data between server, certificate server and terminal token is the algorithm negotiated in advance by both sides and key handling mistake 's;Further, the communication data between them can also include length and check bit, and recipient passes through the length in communication data Whether the communication data that degree and check bit judgement receive is correct, normal operating process is carried out if correct, if incorrect lead to Know sender's error in data, sender retransmits communication data;Further, the communication data between them can also be into Row network encryption or use secret software transmission etc., to guarantee the peace of the communication data between application server and application interface Quan Xing.
Embodiment 6
The embodiment of the present invention 6 provides a kind of device that server data memory space is shared, as shown in Figure 8, comprising:
First receiving module 101, for receiving the certification request of application server transmission;
First generation module 102, for receiving the certification request of application server transmission when the first receiving module 101 When, generate challenging value;
First obtains module 103, for obtaining the user information in certification request;
First searching module 104, for searching token serial number corresponding with user information;
Second generation module 105, challenging value, the first acquisition module 103 for being generated according to the first generation module 102 obtain The token serial number that the user information and the first searching module 104 got are found generates pushing certification request;
First sending module 106 is requested for sending pushing certification to mobile terminal token;
First preserving module 107, the challenging value for generating the first generation module 102 are looked into the first searching module 104 The token serial number found is corresponding to be saved to cache server;
Second receiving module 108, for receiving the pushing certification response of mobile terminal token transmission;
Second searching module 109, for searching the corresponding server seed key of mobile terminal token;
Second obtains module 110, and the token serial number for being obtained according to the first searching module 104 is obtained from cache server Take challenging value;
Third generation module 111, the server seed key and second for being found according to the second searching module 109 It obtains the challenging value that module 110 is got and generates response value;
First judgment module 112, the response value and the second receiving module 108 generated for judging third generation module 111 Whether the response value in pushing certification response received matches;
Second sending module 113, for judging the response value that third generation module 111 generates when first judgment module 112 When response value successful match in the pushing certification response received with the second receiving module 108, recognize to application server transmission Demonstrate,prove success response;
Third sending module 114, for judging the response value that third generation module 111 generates when first judgment module 112 The response value in pushing certification response received with the second receiving module 108 is recognized to application server transmission when it fails to match Demonstrate,prove failure response.
Specifically, the device in the present embodiment further include: third obtains module, for obtaining the application mark in certification request Know;
4th obtains module, obtains application message for obtaining the application identities that module is got according to third;
Further, in the present embodiment, the second generation module 105, is specifically used for: raw according to the first generation module 102 At challenging value, the token serial number that finds of the first acquisition module 103 user information, the first searching module 104 for getting And the 4th the application message that gets of acquisition module requested at pushing certification.
In the present embodiment, device further include: the 5th obtains module, the 4th sending module of the second judgment module and the 5th hair Send module;
5th obtains module, obtains corresponding certificate server from cache server according to token serial number for device IP;
Whether the second judgment module is identical for judgment means IP and the 5th IP that gets of acquisition module;
4th sending module, the authentication service got for the acquisition of the second judgment module judgment means IP and the 5th module When device IP is identical, pushing certification request is sent to mobile terminal token;
5th sending module, the authentication service got for the acquisition of the second judgment module judgment means IP and the 5th module When device IP is not identical, pushing certification request is sent to the corresponding device of certificate server IP that the 5th acquisition module is got;
6th receiving module, the pushing certification request sent for receiving another device;
6th sending module, for will push away when the 6th receiving module receives the pushing certification request that another device is sent Certification request is sent to be sent to mobile terminal token.
Specifically, in the present embodiment, device further include:: the 7th receiving module and the second preserving module;
7th receiving module, for receiving the token serial number of mobile terminal token transmission;
Second preserving module, for when receiving the token serial number of mobile terminal token transmission, device to be by itself IP Preservation is associated with to cache server with token serial number foundation.
Further, in the present embodiment, device further include: the 7th obtains module, the 8th acquisition module, the first comparison mould Block and the first update module;
7th obtains module, for according to token serial number acquisition device IP;
8th obtain module, for according to token serial number from cache server acquisition device IP;
First contrast module obtains the device that module obtains for comparing the device IP and the 8th that the 7th acquisition module obtains Whether IP is identical;
First update module, for being obtained when the first contrast module comparison the 7th obtains the device IP and the 8th that module obtains It when the device IP difference that module obtains, updates and establishes associated device IP with token serial number, terminate.
Specifically, in the present embodiment, device further include: the 4th generation module, the 7th sending module, the 9th obtain mould Block, the tenth obtain module and the 8th sending module;
4th generation module requests to cache server for sending pushing certification and generates authentication notification data;
7th sending module, the authentication notification data for generating the 4th generation module are sent to mobile terminal token;
9th obtain module, for when receive mobile terminal token return obtain pushing certification request information after, Token serial number is obtained from obtaining in the information that pushing certification is requested;
Tenth obtains module, for being obtained from cache server according to the token serial number obtained in the 9th acquisition module Pushing certification is taken to request;
8th sending module, the push request certification for obtaining the tenth acquisition module are sent to mobile terminal token.
Further, in the present embodiment, the 7th sending module specifically includes: first acquisition unit and first is sent Unit;
First acquisition unit, for obtaining mobile terminal identification from cache server according to token serial number;
First transmission unit, for authentication notification data and mobile terminal identification to be sent to iCloud, iCloud according to Authentication notification data are sent to the corresponding mobile terminal token of mobile terminal identification by mobile terminal identification.
Specifically, in the present embodiment further include: third preserving module;
Third preserving module, for when the token serial number and mobile terminal identification for receiving the transmission of mobile terminal token When, token serial number is associated with preservation to cache server with mobile terminal identification foundation.
Accordingly, in the present embodiment, device further include: the 11st obtains module, the 12nd acquisition module, the second comparison Module and the second update module
11st obtains module, for token serial number to be associated with guarantor with mobile terminal identification foundation when third preserving module It deposits to cache server, mobile terminal identification is obtained according to token serial number;
12nd obtains module, for obtaining corresponding mobile terminal mark from cache server according to token serial number Know;
Second contrast module obtains the mobile terminal identification of module acquisition for comparing the 11st acquisition module and the 12nd It is whether identical;
Second update module, for being obtained when the 11st acquisition module of the second contrast module comparison and the 12nd acquisition module Mobile terminal identification difference when, update with token serial number establish associated mobile terminal identification, terminate.
In the present embodiment, device further include: module is established, for when the token sequence for receiving the transmission of mobile terminal token When row number, device and mobile terminal token establish network data link.
In the present embodiment, device further include: the 13rd obtains module and the 4th preserving module;
13rd obtains module, and for establishing after module establishes network data link, it is corresponding to obtain mobile terminal token Network data link mark;
4th preserving module saves depositing to device for network data link mark to be associated with token serial number foundation Storage area.
Specifically, in the present embodiment, device further include: the 14th obtains module;
14th obtains module, for obtaining corresponding network data chain from the memory block of device according to token serial number Line, and corresponding network data link is obtained according to network data link mark;
Further, the first sending module 106, is specifically used for: obtaining the network data chain that module obtains according to the 14th Line obtains corresponding network data link, sends pushing certification by network data link and requests to mobile terminal token.
Further, in the present embodiment, in the first preserving module 107, it is specifically used for: sends asking for storage challenging value It asks to buffer service, buffer service stores challenging value and token serial number to cache server according to preset storage rule In list;
Further, in the present embodiment, second module 110 is obtained, be specifically used for: sending the request for obtaining challenging value To buffer service, buffer service corresponding challenge of query token sequence number from the list of cache server according to token serial number Value, and return to certificate server.
Optionally, in the present embodiment, device further include: setup module;
Setup module, the effective time for being stored in cache server for challenging value to be arranged, when challenging value is more than to cache When the effective time of server, cache server deletes challenging value.
Optionally, in the present embodiment, device can also include: removing module;
Whether removing module judges the response value in the response value generated and pushing certification response for first judgment module After matching, the challenging value corresponding with token serial number saved in cache server is deleted.
The foregoing is only a preferred embodiment of the present invention, but scope of protection of the present invention is not limited thereto, Anyone skilled in the art in the technical scope disclosed by the present invention, can easily think of the change or the replacement, all It is covered by the protection scope of the present invention.Therefore, protection scope of the present invention should be subject to the protection scope in claims.

Claims (28)

1. a kind of shared method of server data memory space, which is characterized in that the described method includes:
When receiving the certification request of application server transmission, certificate server generates challenging value, obtains the certification request In user information, search corresponding with user information token serial number;According to the challenging value of generation, the user got Information and the token serial number found generate pushing certification request, send the pushing certification and request to mobile terminal to enable Board, and save the challenging value of the generation is corresponding with the token serial number found to cache server;
When receiving the pushing certification response of mobile terminal token transmission, it is corresponding that certificate server searches mobile terminal token Server seed key obtains challenging value from cache server according to token serial number, close according to the server seed found Key and the challenging value got generate response value;Judge the response value generated is with the response value in pushing certification response No matching is then to send certification success response to application server, otherwise sends authentication failure response to application server;
The transmission pushing certification is requested to before mobile terminal token, further includes: the certificate server sends push Certification request is to cache server and generates authentication notification data, and the authentication notification data are sent to mobile terminal token;
The method also includes: after receiving the information for obtaining pushing certification request of mobile terminal token return, certification clothes Business device obtains token serial number from the information that the acquisition pushing certification is requested, according to the token serial number from buffer service The pushing certification request is obtained in device, and push request certification is sent to mobile terminal token.
2. the method according to claim 1, wherein described when the certification request for receiving application server transmission When, further includes: the application identities in the certification request are obtained, and obtain application message according to the application identities;
The challenging value according to generation, the user information got and the token serial number found generate pushing certification and ask It asks, specifically: believed according to the challenging value of generation, the user information got, the token serial number found and the application Breath generates pushing certification request.
3. requesting the method according to claim 1, wherein the certificate server sends pushing certification to caching Server simultaneously generates authentication notification data, the authentication notification data is sent to the replacement of mobile terminal token are as follows: the certification Server obtains corresponding certificate server IP according to the token serial number from cache server, and judges itself IP and obtain Whether the certificate server IP got is identical, is, pushing certification request is sent to mobile terminal token, otherwise by institute It states pushing certification request and is sent to the corresponding certificate server of certificate server IP got;
After receiving the information for obtaining pushing certification request of mobile terminal token return, certificate server is pushed away from the acquisition It send and obtains token serial number in the information of certification request, the push is obtained from cache server according to the token serial number Certification request, and push request certification is sent to mobile terminal token, it replaces are as follows: when receiving another certificate server When the pushing certification request of transmission, the pushing certification received request is sent to mobile terminal token by certificate server.
4. according to the method described in claim 3, it is characterized in that, the method also includes: when receiving mobile terminal token When the token serial number of transmission, itself IP is associated with preservation to buffer service with token serial number foundation by certificate server Device.
5. according to the method described in claim 4, it is characterized in that, the certificate server is by itself IP and the sequence of tokens Number establishing association saves to after cache server, further includes: the certificate server is obtained according to the token serial number and authenticated Server ip, and compared with corresponding certificate server IP is obtained from cache server according to the token serial number, If identical, without updating, terminate;Otherwise, the certificate server will update establish with the token serial number it is associated Certificate server IP terminates.
6. the method according to claim 1, wherein described be sent to mobile terminal for the authentication notification data Token specifically includes: the certificate server obtains mobile terminal identification from cache server according to the token serial number, and Authentication notification data and the mobile terminal identification are sent to iCloud, the iCloud will according to the mobile terminal identification The authentication notification data are sent to the corresponding mobile terminal token of the mobile terminal identification.
7. according to the method described in claim 6, it is characterized in that, the method also includes: when receiving mobile terminal token When the token serial number and mobile terminal identification of transmission, certificate server is by the token serial number and the mobile terminal identification Association is established to save to cache server.
8. the method according to the description of claim 7 is characterized in that described by the token serial number and the mobile terminal mark Know after establishing association preservation to cache server, further includes: the certificate server is obtained according to the token serial number and moved Terminal iidentification, and compared with corresponding mobile terminal identification is obtained from cache server according to the token serial number, If identical, without updating, terminate;Otherwise, the certificate server will update establish with the token serial number it is associated Mobile terminal identification terminates.
9. the method according to claim 4 or 7, which is characterized in that when the token sequence for receiving the transmission of mobile terminal token When row number, further includes: certificate server and the mobile terminal token establish network data link.
10. according to the method described in claim 9, it is characterized in that, the certificate server and the mobile terminal token are built After vertical network data link, further includes: the certificate server obtains the corresponding network data link of the mobile terminal token Mark, and network data link mark is associated with token serial number foundation and saves depositing to the certificate server Storage area.
11. according to the method described in claim 10, it is characterized in that,
The transmission pushing certification is requested to before mobile terminal token, further includes: the certificate server is according to Token serial number obtains corresponding network data link mark from the memory block of the certificate server, and according to the network Data link identity obtains corresponding network data link;
The transmission pushing certification is requested to mobile terminal token, specifically: the certificate server is according to the network Data link identity obtains corresponding network data link, by the network data link send the pushing certification request to Mobile terminal token.
12. the method according to claim 1, wherein the challenging value by the generation is found with described Token serial number it is corresponding save to cache server, specifically: the certificate server sends the request of storage challenging value extremely Buffer service, the buffer service store the challenging value and the token serial number to caching according to preset storage rule In the list of server;
It is described that challenging value is obtained from cache server according to token serial number, specifically: the certificate server sends to obtain and choose The request of war value to buffer service, the buffer service inquires the order according to token serial number from the list of cache server The corresponding challenging value of card sequence number, and return to the certificate server.
13. the method according to claim 1, wherein the challenging value by the generation is found with described Token serial number corresponding save to cache server, further includes: certificate server be arranged the challenging value be stored in it is described The effective time of cache server, is more than effective time, and the cache server deletes the challenging value.
14. the method according to claim 1, wherein response value and the pushing certification that the judgement generates After whether the response value in response matches, further includes: the certificate server in cache server by saving with the order The corresponding challenging value of card sequence number is deleted.
15. a kind of shared device of server data memory space characterized by comprising
First receiving module, for receiving the certification request of application server transmission;
First generation module generates when for receiving the certification request of application server transmission when first receiving module Challenging value;
First obtains module, for obtaining the user information in the certification request;
First searching module, for searching token serial number corresponding with the user information;
Second generation module, the challenging value, the first acquisition module for being generated according to first generation module obtain The token serial number that the user information and first searching module got are found generates pushing certification request;
First sending module is requested for sending the pushing certification to mobile terminal token;
First preserving module, what challenging value and first searching module for generating first generation module were found The token serial number is corresponding to be saved to cache server;
Second receiving module, for receiving the pushing certification response of mobile terminal token transmission;
Second searching module, for searching the corresponding server seed key of the mobile terminal token;
Second obtains module, and the token serial number for being obtained according to first searching module is obtained from cache server The challenging value;
Third generation module, server seed key and described second for being found according to second searching module obtain The challenging value that modulus block is got generates response value;
First judgment module, the response value for judging that the third generation module generates connect with second receiving module Whether the response value in pushing certification response received matches;
Second sending module, for when the first judgment module judge the response value that the third generation module generates with When response value successful match in the response of the pushing certification that second receiving module receives, sent to application server Authenticate success response;
Third sending module, for when the first judgment module judge the response value that the third generation module generates with Response value in the response of the pushing certification that second receiving module receives is sent to application server when it fails to match Authentication failure response;
Described device, further includes: the 4th generation module, the 7th sending module, the 9th obtain module, the tenth acquisition module and the 8th Sending module;
4th generation module requests to cache server for sending pushing certification and generates authentication notification data;
7th sending module, the authentication notification data for generating the 4th generation module are sent to mobile whole Hold token;
It is described 9th obtain module, for when receive mobile terminal token return obtain pushing certification request information after, Token serial number is obtained from the information that the acquisition pushing certification is requested;
Described tenth obtains module, for being taken from caching according to the token serial number obtained in the 9th acquisition module The pushing certification request is obtained in business device;
8th sending module, the push request certification for obtaining the tenth acquisition module, which is sent to mobile terminal, to be enabled Board.
16. device according to claim 15, which is characterized in that further include: third obtains module and the 4th and obtains module;
The third obtains module, for obtaining the application identities in the certification request;
Described 4th obtains module, obtains application message for obtaining the application identities that module is got according to the third;
Second generation module, is specifically used for: challenging value, the first acquisition mould generated according to first generation module The token serial number and the described 4th that user information that block is got, first searching module are found obtain module and obtain To application message requested at pushing certification.
17. device according to claim 15, which is characterized in that further include: the 5th obtain module, the second judgment module, 4th sending module and the 5th sending module;It further include the 6th sending module and the 6th receiving module;
Described 5th obtains module, for obtaining corresponding certificate server from cache server according to the token serial number IP;
Second judgment module, the certificate server IP got for judging described device IP and the 5th acquisition module It is whether identical;
4th sending module judges that described device IP and the described 5th obtains module and obtains for second judgment module When the certificate server IP arrived is identical, pushing certification request is sent to mobile terminal token;
5th sending module judges that described device IP and the described 5th obtains module and obtains for second judgment module When the certificate server IP arrived is not identical, pushing certification request is sent to the certification that the 5th acquisition module is got The corresponding device of server ip;
6th receiving module, the pushing certification request sent for receiving another device;
6th sending module, when for receiving the pushing certification request of another device transmission when the 6th receiving module, Pushing certification request is sent to mobile terminal token.
18. device according to claim 17, which is characterized in that further include: the 7th receiving module and the second preserving module;
7th receiving module, for receiving the token serial number of mobile terminal token transmission;
Second preserving module, for receiving the token serial number of mobile terminal token transmission when the 7th receiving module When, itself IP is associated with preservation to cache server with token serial number foundation by described device.
19. device according to claim 17, which is characterized in that further include: the 7th obtain module, the 8th obtain module, First contrast module and the first update module;
Described 7th obtains module, for according to the token serial number acquisition device IP;
It is described 8th obtain module, for according to the token serial number from cache server acquisition device IP;
First contrast module obtains what the acquisition module of device IP and the 8th that module obtains obtained for comparing the described 7th Whether device IP is identical;
First update module, for when first contrast module compare it is described 7th obtain module obtain device IP with When the device IP difference that the 8th acquisition module obtains, updates and establish associated device IP with the token serial number, terminate.
20. device according to claim 19, which is characterized in that the 7th sending module specifically includes: first obtains Unit and the first transmission unit;
The first acquisition unit, for obtaining mobile terminal identification from cache server according to the token serial number;
First transmission unit, for the authentication notification data and the mobile terminal identification to be sent to iCloud, institute It states iCloud and the authentication notification data is sent to by the corresponding shifting of the mobile terminal identification according to the mobile terminal identification Dynamic terminal token.
21. device according to claim 20, which is characterized in that described device further include: third preserving module;
The third preserving module, for when the token serial number and mobile terminal identification for receiving the transmission of mobile terminal token When, the token serial number is associated with preservation to cache server with mobile terminal identification foundation.
22. device according to claim 21, which is characterized in that further include: the 11st obtains module, the 12nd acquisition mould Block, the second contrast module and the second update module
Described 11st obtains module, for working as the third preserving module for the token serial number and the mobile terminal mark Know after establishing association preservation to cache server, mobile terminal identification is obtained according to the token serial number;
Described 12nd obtains module, for obtaining corresponding mobile terminal from cache server according to the token serial number Mark;
Second contrast module obtains the movement that module and the 12nd acquisition module obtain for comparing the described 11st Whether terminal iidentification is identical;
Second update module, for obtaining module and the described 12nd when second contrast module comparison the described 11st When obtaining the mobile terminal identification difference that module obtains, updates and establish associated mobile terminal identification with the token serial number.
23. device described in 7 or 21 according to claim 1, which is characterized in that further include:
Module is established, for when receiving the token serial number of mobile terminal token transmission, described device and the movement to be eventually End token establishes network data link.
24. device according to claim 23, which is characterized in that further include: the 13rd, which obtains module and the 4th, saves mould Block;
Described 13rd obtains module, establishes after module establishes network data link for described, obtains the mobile terminal and enable The corresponding network data link mark of board;
4th preserving module, for network data link mark to be associated with preservation extremely with token serial number foundation The memory block of described device.
25. device according to claim 24, which is characterized in that further include: the 14th obtains module;
Described 14th obtains module, for obtaining corresponding net from the memory block of described device according to the token serial number Network data link identity, and corresponding network data link is obtained according to network data link mark;
First sending module, is specifically used for: obtaining the network data link mark that module obtains according to the described 14th Know and obtain corresponding network data link, the pushing certification is sent by the network data link and requests to mobile terminal to enable Board.
26. device according to claim 15, which is characterized in that first preserving module is specifically used for: sending storage The request of challenging value is to buffer service, and the buffer service is according to preset storage rule by the challenging value and the token sequence Row number is stored into the list of cache server;
Described second obtains module, is specifically used for: send the request for obtaining challenging value to buffer service, the buffer service according to Token serial number inquires the corresponding challenging value of the token serial number from the list of cache server, and returns to the certification Server.
27. device according to claim 15, which is characterized in that further include: setup module;
The setup module, the effective time for being stored in the cache server for the challenging value to be arranged, when the challenge Value is more than in the effective time of the cache server, and the cache server deletes the challenging value.
28. device according to claim 15, which is characterized in that further include: removing module;
The removing module, the response value generated for first judgment module judgement and answering in pushing certification response It answers after whether value match, the challenging value corresponding with the token serial number saved in cache server is deleted.
CN201710304801.0A 2017-05-03 2017-05-03 A kind of method and device that server data memory space is shared Active CN107222460B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710304801.0A CN107222460B (en) 2017-05-03 2017-05-03 A kind of method and device that server data memory space is shared

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710304801.0A CN107222460B (en) 2017-05-03 2017-05-03 A kind of method and device that server data memory space is shared

Publications (2)

Publication Number Publication Date
CN107222460A CN107222460A (en) 2017-09-29
CN107222460B true CN107222460B (en) 2019-10-08

Family

ID=59943831

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710304801.0A Active CN107222460B (en) 2017-05-03 2017-05-03 A kind of method and device that server data memory space is shared

Country Status (1)

Country Link
CN (1) CN107222460B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108696509B (en) * 2018-04-11 2020-09-11 海信集团有限公司 Access processing method and device for terminal
CN110460567B (en) * 2019-06-28 2020-11-06 华为技术有限公司 Identity authentication method and device
CN110767291A (en) * 2019-10-15 2020-02-07 武汉联影医疗科技有限公司 Medical image processing method, apparatus and storage medium
CN110765168B (en) * 2019-11-01 2022-11-11 福建顶点软件股份有限公司 Data searching method and device based on user information
CN111447220B (en) * 2020-03-26 2022-08-23 金蝶软件(中国)有限公司 Authentication information management method, server of application system and computer storage medium
US11811776B2 (en) * 2020-06-30 2023-11-07 Western Digital Technologies, Inc. Accessing shared pariiiions on a storage drive of a remote device
CN111522516B (en) * 2020-07-06 2020-10-27 飞天诚信科技股份有限公司 Processing method and system for cloud broadcast print data
CN114050901B (en) * 2021-09-28 2023-10-27 新华三大数据技术有限公司 Authentication method and device of terminal, electronic equipment and readable storage medium
CN115529314A (en) * 2022-09-20 2022-12-27 北京恩吉鸿业能源科技有限责任公司 Communication method based on Netty server cluster
CN116738508B (en) * 2023-06-07 2024-02-09 杭州派迩信息技术有限公司 Data storage method and system based on group collaboration

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1937498A (en) * 2006-10-09 2007-03-28 网之易信息技术(北京)有限公司 Dynamic cipher authentication method, system and device
CN101847296A (en) * 2009-03-25 2010-09-29 索尼公司 Integrated circuit, encrypt communication apparatus, system and method and information processing method
CN103346885A (en) * 2013-06-26 2013-10-09 飞天诚信科技股份有限公司 Method for activating token equipment
CN104639562A (en) * 2015-02-27 2015-05-20 飞天诚信科技股份有限公司 Work method of authentication pushing system and equipment
CN104660416A (en) * 2015-02-13 2015-05-27 飞天诚信科技股份有限公司 Work methods of voice certification system and equipment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1937498A (en) * 2006-10-09 2007-03-28 网之易信息技术(北京)有限公司 Dynamic cipher authentication method, system and device
CN101847296A (en) * 2009-03-25 2010-09-29 索尼公司 Integrated circuit, encrypt communication apparatus, system and method and information processing method
CN103346885A (en) * 2013-06-26 2013-10-09 飞天诚信科技股份有限公司 Method for activating token equipment
CN104660416A (en) * 2015-02-13 2015-05-27 飞天诚信科技股份有限公司 Work methods of voice certification system and equipment
CN104639562A (en) * 2015-02-27 2015-05-20 飞天诚信科技股份有限公司 Work method of authentication pushing system and equipment

Also Published As

Publication number Publication date
CN107222460A (en) 2017-09-29

Similar Documents

Publication Publication Date Title
CN107222460B (en) A kind of method and device that server data memory space is shared
CN104639562B (en) A kind of system of pushing certification and the method for work of equipment
CN104539701B (en) A kind of equipment of activation line mobile terminal token and the method for work of system
CN105376216B (en) A kind of remote access method, proxy server and client
US10887103B2 (en) Operating method for push authentication system and device
CN104205891B (en) Virtual SIM card cloud platform
CN105577691B (en) A kind of safety access method and server
JP4770494B2 (en) Cryptographic communication method and system
CN109815656A (en) Login authentication method, device, equipment and computer readable storage medium
WO2018145605A1 (en) Authentication method and server, and access control device
US20120284506A1 (en) Methods and apparatus for preventing crimeware attacks
US11343243B2 (en) Machine-to-machine streaming authentication of network elements
KR20200107931A (en) System and method for key generation and storage for multi-point authentication
JP2018525947A (en) Confirmation information update method and apparatus
WO2007104243A1 (en) The managing system of accounts security based on the instant message and its method
WO2012151312A1 (en) System and method for providing access credentials
US9608971B2 (en) Method and apparatus for using a bootstrapping protocol to secure communication between a terminal and cooperating servers
RU2008144205A (en) DEVICE AND METHOD FOR PROTECTED DATA TRANSFER
DK2924944T3 (en) Presence authentication
CN107251528A (en) It is used as the network identity of service
CN108347428A (en) Accreditation System, the method and apparatus of application program based on block chain
CN108134787A (en) A kind of identity identifying method and authentication device
US20120102319A1 (en) System and Method for Reliably Authenticating an Appliance
WO2019170026A1 (en) Wearable device-based identity authentication method and system
CN106453321A (en) Authentication server, system and method, and to-be-authenticated terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant