CN110086785A - User authen method and device based on VPN - Google Patents

User authen method and device based on VPN Download PDF

Info

Publication number
CN110086785A
CN110086785A CN201910295739.2A CN201910295739A CN110086785A CN 110086785 A CN110086785 A CN 110086785A CN 201910295739 A CN201910295739 A CN 201910295739A CN 110086785 A CN110086785 A CN 110086785A
Authority
CN
China
Prior art keywords
authentication mode
user account
account information
information
certificate server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910295739.2A
Other languages
Chinese (zh)
Inventor
陈立
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou DPTech Technologies Co Ltd
Original Assignee
Hangzhou DPTech Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou DPTech Technologies Co Ltd filed Critical Hangzhou DPTech Technologies Co Ltd
Priority to CN201910295739.2A priority Critical patent/CN110086785A/en
Publication of CN110086785A publication Critical patent/CN110086785A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application is for a kind of user authen method and device based on VPN, applied in vpn server, the described method includes: being searched and the matched first identifier information of first user account information in the corresponding relationship of identification information and authentication mode after receiving the first user account information;If finding the first identifier information, the first authentication mode corresponding with the first identifier information is obtained from the corresponding relationship;First user account information is authenticated by the corresponding certificate server of first authentication mode.Using embodiments herein, no longer need to be authenticated according to the priority orders of pre-set each authentication mode, it is time-consuming so as to greatly reduce certification, promote user experience.

Description

User authen method and device based on VPN
Technical field
This application involves network communication technology fields, are specifically designed a kind of based on Virtual Private Network (Virtual Private Network, VPN) user authen method and device.
Background technique
VPN belongs to remote access technology, is briefly exactly to set up dedicated network using common network.Using VPN's In the process, user authentication is an essential operation, and being often limited to huge, certification safety of certification number of users etc. needs It wants, Third Party Authentication, which has become, provides the main selection of the user authentication based on VPN.Wherein, recognized using more third party Card includes remote customer dialing authentication system (Remote Authentication Dial In User Service, RADIUS) Certification, Light Directory Access Protocol (Lightweight Directory Access Protocol, LDAP) certification, hypertext Transport protocol (Hyper Text Transfer Protocol, HTTP) certification etc..Because there are miscellaneous authentication mode, It just will appear the problem of different enterprises, different user are using different authentication mode, then, how vpn server selects authenticating party Formula just becomes each provider server urgent problem.
Currently, vpn server can preset the priority orders of each authentication mode, user account information is received Afterwards, the corresponding certificate server of each authentication mode is passed sequentially through to be authenticated.In the user mode, due to being directed to each user Account information is authenticated according to the priority orders of pre-set each authentication mode, if available authentication mode is excellent When first grade is lower, then before certification be all it is useless, it is time-consuming that this just will increase certification, seriously affects user experience.
Summary of the invention
In view of this, the application provides a kind of user authen method and device based on VPN, to solve to increase certification consumption When, the problem of seriously affecting user experience.
Specifically, the application is achieved by the following technical solution:
A kind of user authen method based on VPN is applied in vpn server, which comprises
After receiving the first user account information, searched and described first in the corresponding relationship of identification information and authentication mode The matched first identifier information of user account information;
If finding the first identifier information, obtained from the corresponding relationship corresponding with the first identifier information The first authentication mode;
First user account information is authenticated by the corresponding certificate server of first authentication mode.
A kind of user authentication device based on VPN is applied in vpn server, and described device includes:
Searching module, after receiving the first user account information, in the corresponding relationship of identification information and authentication mode It searches and the matched first identifier information of first user account information;
Module is obtained, if obtaining from the corresponding relationship and described for finding the first identifier information Corresponding first authentication mode of one identification information;
Authentication module, for being believed by the corresponding certificate server of first authentication mode first user account Breath is authenticated.
By the above technical solution provided by the present application as it can be seen that after the first user account information of reception, can directly identify Searched in the corresponding relationship of information and authentication mode with the matched first identifier information of the first user account information, if finding the One identification information then obtains corresponding with first identifier information the first authentication mode from the corresponding relationship, first is recognized by this The corresponding certificate server of card mode authenticates the first user account information, no longer needs to according to pre-set each certification The priority orders of mode are authenticated, time-consuming so as to greatly reduce certification, promote user experience.
Detailed description of the invention
Fig. 1 is a kind of flow chart of user authen method based on VPN shown in the application;
Fig. 2 is the flow chart of another user authen method based on VPN shown in the application;
Fig. 3 is a kind of structural schematic diagram of user authentication device based on VPN shown in the application.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment Described in embodiment do not represent all embodiments consistent with the application.On the contrary, they be only with it is such as appended The example of the consistent device and method of some aspects be described in detail in claims, the application.
It is only to be not intended to be limiting the application merely for for the purpose of describing particular embodiments in term used in this application. It is also intended in the application and the "an" of singular used in the attached claims, " " and "the" including most shapes Formula, unless the context clearly indicates other meaning.It is also understood that term "and/or" used herein refers to and includes One or more associated any or all of project listed may combine.
It will be appreciated that though various information, but this may be described using term first, second, third, etc. in the application A little information should not necessarily be limited by these terms.These terms are only used to for same type of information being distinguished from each other out.For example, not departing from In the case where the application range, the first information can also be referred to as the second information, and similarly, the second information can also be referred to as One information.Depending on context, word as used in this " if " can be construed to " ... when " or " when ... When " or " in response to determination ".
To solve the above-mentioned problems, the embodiment of the invention provides a kind of user authen methods based on VPN, to subtract significantly Few certification is time-consuming, promotes user experience.Referring to Figure 1, Fig. 1 is a kind of user authen method based on VPN shown in the application Flow chart, be applied to vpn server in.
S11: the first user account information is received.
When user needs to authenticate, user account information can be sent, which can be defined as the first user Account information, the first user account information can be, but not limited to as user name.
S12: it is searched and the first user account information matched first in the corresponding relationship of identification information and authentication mode Identification information.
The corresponding relationship of identification information and authentication mode can be preset, the corresponding authentication mode of identification information is stored, After receiving the first user account information, matched identification information can be directly searched in the corresponding relationship.Wherein, mark letter The format of breath be not it is fixed, can be the combination of a string of characters, string number or other symbols, it is only necessary to guarantee that every kind is recognized The identification information of card mode is inconsistent;The identification information of same authentication mode can not be unique, and multiple identification informations can To belong to same authentication mode simultaneously, it is only necessary to be matched to one such identification information, so that it may quickly determine authenticating party Formula.
If finding first identifier information, S13 is executed: corresponding with first identifier information the is obtained from corresponding relationship One authentication mode.
S14: the first user account information is authenticated by the corresponding certificate server of the first authentication mode.
By the above technical solution provided by the present application as it can be seen that after the first user account information of reception, can directly identify Searched in the corresponding relationship of information and authentication mode with the matched first identifier information of the first user account information, if finding the One identification information then obtains corresponding with first identifier information the first authentication mode from the corresponding relationship, first is recognized by this The corresponding certificate server of card mode authenticates the first user account information, no longer needs to according to pre-set each certification The priority orders of mode are authenticated, time-consuming so as to greatly reduce certification, promote user experience.
Specifically, being searched and the first user account in the corresponding relationship of identification information and authentication mode in above-mentioned S12 The first identifier information of information matches, realization process specifically include:
Obtain the corresponding relationship of identification information and authentication mode;
The identification information for being contained in the first user account information is searched in corresponding relationship;
If finding the identification information for being contained in the first user account information, obtain matching with the first user account information First identifier information.
What is searched in corresponding relationship is not to be fully equivalent to the identification information of the first user account information, and be contained within The identification information of first user account information, the identification information can be defined as first identifier information, that is to say, that the first user Account information includes first identifier information.For example, the first user account information is lisi@radius, if depositing in corresponding relationship In identification information@radius, since lisi@radius includes@radius ,@radius is the first of lisi@radius Identification information.
A kind of optional embodiment, as shown in Fig. 2, on the basis of Fig. 1 further include:
If not finding first identifier information, execute S15: the first priority that detection obtains each authentication mode is suitable Sequence.
Due to not finding first identifier information, then authentication mode can not be directly determined, each certification can be detected first The priority orders of mode, the priority orders can be defined as the first priority orders.
S16: the corresponding certificate server of each authentication mode is passed sequentially through to the first user according to the first priority orders Account information is authenticated, until being used by the corresponding certificate server of the second authentication mode in each authentication mode first Family account information authenticates successfully or is recognized by the corresponding certificate server of each authentication mode the first user account information Card failure.
By S15 and S16, even if authenticating party cannot quickly be determined by the corresponding relationship of identification information and authentication mode Formula can also be then based on the priority orders and be authenticated with the priority orders of each authentication mode of real-time detection, so as to To ensure to authenticate the first user account information.
Specifically, the detection in above-mentioned S15 obtains the first priority orders of each authentication mode, realization process is specifically wrapped It includes:
The probe requests message is sent to the corresponding certificate server of each authentication mode simultaneously;
To receive the chronological order for the detection response message that the corresponding certificate server of each authentication mode returns Determine the first priority orders of each authentication mode.
Due to sending the probe requests message to the corresponding certificate server of each authentication mode simultaneously, rung then returning to detection When answering the chronological order difference of message, illustrate that the speed of the response speed of each certificate server is different, can be based on recognizing The speed of the response speed of server is demonstrate,proved to determine the first priority orders of each authentication mode.
A kind of optional embodiment, after above-mentioned S16, further includes:
If by the corresponding certificate server of the second authentication mode in each authentication mode to the first user account information It authenticates successfully, then the first user account information is added in the corresponding user account information set of the second authentication mode;
Determine whether the quantity of the user account information in user account information set reaches the first given threshold;
If it is determined that the quantity of the user account information in user account information set reaches the first given threshold, it is determined that use The highest common divisor substring of any two user account information in the account information set of family, wherein each highest common divisor substring Length is not less than setting length;
Count the number of each highest common divisor substring;
It is more than that the highest common divisor substring of the second given threshold and the second authentication mode are added in corresponding relationship by number.
Assuming that the second authentication mode is RADIUS authentication, used by the corresponding certificate server of RADIUS authentication first After family account information authenticates successfully, the first user account information can be added to the corresponding user account information of RADIUS authentication Set, the corresponding user account information set of RADIUS authentication can be as shown in table 1 below:
Table 1
If it is determined that the quantity of the user account information in table 1 reaches the first given threshold, it is determined that any two in table 1 The highest common divisor substring of user account information, wherein the length of each highest common divisor substring is not less than setting length, the first setting Threshold value can be, but not limited to be set as 10,20,15 etc., and setting length can be, but not limited to be set as 4,5,6 etc., and here the One given threshold is 10, sets length as 4, the number of the highest common divisor substring determined and statistics is as shown in table 2:
Table 2
The highest common divisor substring that number in table 2 is more than the second given threshold can be counted, wherein the second given threshold can With but be not limited to be set as 5,6,7 etc., the second given threshold is 5 here, can determine that number is more than 5 most by table 2 Big pact substring is as shown in table 3 below:
Table 3
Finally, the highest common divisor substring in table 3 can be added to identification information and authenticating party with RADIUS authentication mode In the corresponding relationship of formula.
The corresponding relationship of real-time update identification information and authentication mode may be implemented, through the above way so as to ensure The accuracy of the corresponding relationship of identification information and authentication mode, and then ensure quickly to determine the corresponding authenticating party of user account information Formula.
A kind of optional embodiment, after above-mentioned S14, the above method further include:
If being detected by the corresponding certificate server of the first authentication mode to the first user account information authentification failure Second priority orders of the authentication mode into each authentication mode in addition to the first authentication mode, it is suitable according to the second priority Sequence passes sequentially through the corresponding certificate server of authentication mode in each authentication mode in addition to the first authentication mode and uses first Family account information is authenticated, the third in authentication mode in through each authentication mode in addition to the first authentication mode The corresponding certificate server of authentication mode to the first user account information authenticate successfully or by each authentication mode except the The corresponding certificate server of authentication mode except one authentication mode is to the equal authentification failure of the first user account information;And/or it will The corresponding authentification failure number of first identifier information adds 1, however, it is determined that the corresponding authentification failure number of first identifier information surpasses after adding 1 Third given threshold is crossed, then deletes first identifier information from corresponding relationship.
In order to ensure authenticating to the first user account information, passing through the corresponding certificate server of the first authentication mode It, can be by other in each authentication mode in addition to the first authentication mode after the first user account information authentification failure The corresponding certificate server of authentication mode authenticates it.In order to ensure the standard of identification information and the corresponding relationship of authentication mode True property can update after passing through the corresponding certificate server of the first authentication mode to the first user account information authentification failure The corresponding authentification failure number of first identifier information, and surpass after determining that the corresponding authentification failure number of first identifier information adds 1 Cross third given threshold, then from corresponding relationship delete first identifier information, third given threshold can according to actual needs into Row setting, for example, can be set as 3,4,5 etc..
Fig. 3 is referred to, Fig. 3 is a kind of structural schematic diagram of user authentication device based on VPN shown in the application, application In vpn server, which includes:
Searching module 31, after receiving the first user account information, in the corresponding relationship of identification information and authentication mode Middle lookup and the matched first identifier information of the first user account information;
Module 32 is obtained, if obtaining and first identifier information from corresponding relationship for finding first identifier information Corresponding first authentication mode;
Authentication module 33, for being carried out by the corresponding certificate server of the first authentication mode to the first user account information Certification.
By the above technical solution provided by the present application as it can be seen that after the first user account information of reception, can directly identify Searched in the corresponding relationship of information and authentication mode with the matched first identifier information of the first user account information, if finding the One identification information then obtains corresponding with first identifier information the first authentication mode from the corresponding relationship, first is recognized by this The corresponding certificate server of card mode authenticates the first user account information, no longer needs to according to pre-set each certification The priority orders of mode are authenticated, time-consuming so as to greatly reduce certification, promote user experience.
Specifically, searching module 31, for being searched and the first user in the corresponding relationship of identification information and authentication mode The matched first identifier information of account information, is specifically used for:
Obtain the corresponding relationship of identification information and authentication mode;
The identification information for being contained in the first user account information is searched in corresponding relationship;
If finding the identification information for being contained in the first user account information, obtain matching with the first user account information First identifier information.
Optionally, authentication module 33 are also used to:
If not finding first identifier information, detection obtains the first priority orders of each authentication mode;
The corresponding certificate server of each authentication mode is passed sequentially through to the first user account according to the first priority orders Information is authenticated, until by the corresponding certificate server of the second authentication mode in each authentication mode to first user's account The success of number authentification of message authenticates mistake to the first user account information by the corresponding certificate server of each authentication mode It loses.
Specifically, authentication module 33, obtains the first priority orders of each authentication mode for detecting, is specifically used for:
The probe requests message is sent to the corresponding certificate server of each authentication mode simultaneously;
To receive the chronological order for the detection response message that the corresponding certificate server of each authentication mode returns Determine the first priority orders of each authentication mode.
Optionally, device further includes update module, is used for:
If by the corresponding certificate server of the second authentication mode in each authentication mode to the first user account information It authenticates successfully, then the first user account information is added in the corresponding user account information set of the second authentication mode;
Determine whether the quantity of the user account information in user account information set reaches the first given threshold;
If it is determined that the quantity of the user account information in user account information set reaches the first given threshold, it is determined that use The highest common divisor substring of any two user account information in the account information set of family, wherein each highest common divisor substring Length is not less than setting length;
Count the number of each highest common divisor substring;
It is more than that the highest common divisor substring of the second given threshold and the second authentication mode are added in corresponding relationship by number.
Optionally, authentication module 33 are also used to:
If being detected by the corresponding certificate server of the first authentication mode to the first user account information authentification failure Second priority orders of the authentication mode into each authentication mode in addition to the first authentication mode, it is suitable according to the second priority Sequence passes sequentially through the corresponding certificate server of authentication mode in each authentication mode in addition to the first authentication mode and uses first Family account information is authenticated, the third in authentication mode in through each authentication mode in addition to the first authentication mode The corresponding certificate server of authentication mode to the first user account information authenticate successfully or by each authentication mode except the The corresponding certificate server of authentication mode except one authentication mode is to the equal authentification failure of the first user account information;And/or it will The corresponding authentification failure number of first identifier information adds 1, however, it is determined that the corresponding authentification failure number of first identifier information surpasses after adding 1 Third given threshold is crossed, then deletes first identifier information from corresponding relationship.
For device embodiment, since it corresponds essentially to embodiment of the method, so related place is referring to method reality Apply the part explanation of example.The apparatus embodiments described above are merely exemplary, wherein described be used as separation unit The unit of explanation may or may not be physically separated, and component shown as a unit can be or can also be with It is not physical unit, it can it is in one place, or may be distributed over multiple network units.It can be according to actual The purpose for needing to select some or all of the modules therein to realize application scheme.Those of ordinary skill in the art are not paying Out in the case where creative work, it can understand and implement.
The foregoing is merely the preferred embodiments of the application, not to limit the application, all essences in the application Within mind and principle, any modification, equivalent substitution, improvement and etc. done be should be included within the scope of the application protection.

Claims (12)

1. a kind of user authen method based on VPN is applied in vpn server, which is characterized in that the described method includes:
After receiving the first user account information, searched and first user in the corresponding relationship of identification information and authentication mode The matched first identifier information of account information;
If finding the first identifier information, corresponding with the first identifier information the is obtained from the corresponding relationship One authentication mode;
First user account information is authenticated by the corresponding certificate server of first authentication mode.
2. the method according to claim 1, wherein being searched in the corresponding relationship of identification information and authentication mode With the matched first identifier information of first user account information, specifically include:
Obtain the corresponding relationship of identification information and authentication mode;
The identification information for being contained in first user account information is searched in the corresponding relationship;
If finding the identification information for being contained in first user account information, obtain and first user account information Matched first identifier information.
3. the method according to claim 1, wherein the method also includes:
If not finding the first identifier information, detection obtains the first priority orders of each authentication mode;
The corresponding certificate server of each authentication mode is passed sequentially through to first user according to first priority orders Account information is authenticated, until by the corresponding certificate server of the second authentication mode in each authentication mode to described the One user account information authenticates successfully or by the corresponding certificate server of each authentication mode to first user account The equal authentification failure of information.
4. according to the method described in claim 3, it is characterized in that, detection obtain each authentication mode the first priority it is suitable Sequence specifically includes:
The probe requests message is sent to the corresponding certificate server of each authentication mode simultaneously;
It is determined with receiving the chronological order for the detection response message that the corresponding certificate server of each authentication mode returns First priority orders of each authentication mode.
5. according to the method described in claim 3, it is characterized in that, the method also includes:
If by the corresponding certificate server of the second authentication mode in each authentication mode to first user account information It authenticates successfully, then first user account information is added to the corresponding user account information set of second authentication mode In;
Determine whether the quantity of the user account information in the user account information set reaches the first given threshold;
If it is determined that the quantity of the user account information in the user account information set reaches first given threshold, then really The highest common divisor substring of any two user account information in the fixed user account information set, wherein each most grand duke About the length of substring is not less than setting length;
Count the number of each highest common divisor substring;
It is more than that the highest common divisor substring of the second given threshold and second authentication mode are added to the corresponding relationship by number In.
6. the method according to claim 1, wherein the method also includes:
If being visited by the corresponding certificate server of first authentication mode to the first user account information authentification failure The second priority orders for measuring the authentication mode in each authentication mode in addition to first authentication mode, according to described Second priority orders pass sequentially through that the authentication mode in each authentication mode in addition to first authentication mode is corresponding to be recognized Card server authenticates first user account information, until by removing first authenticating party in each authentication mode The corresponding certificate server of third authentication mode in authentication mode except formula to first user account information authenticate at Function or by the corresponding certificate server of authentication mode in each authentication mode in addition to first authentication mode to institute State the equal authentification failure of the first user account information;And/or the corresponding authentification failure number of the first identifier information is added 1, if Determine that after the corresponding authentification failure number of the first identifier information adds 1 be more than the third given threshold, then from the correspondence The first identifier information is deleted in relationship.
7. a kind of user authentication device based on VPN, it is applied in vpn server, which is characterized in that described device includes:
Searching module is searched in the corresponding relationship of identification information and authentication mode after receiving the first user account information With the matched first identifier information of first user account information;
Module is obtained, if obtaining from the corresponding relationship and first mark for finding the first identifier information Know corresponding first authentication mode of information;
Authentication module, for by the corresponding certificate server of first authentication mode to first user account information into Row certification.
8. device according to claim 7, which is characterized in that the searching module, in identification information and authenticating party Lookup and the matched first identifier information of first user account information in the corresponding relationship of formula, are specifically used for:
Obtain the corresponding relationship of identification information and authentication mode;
The identification information for being contained in first user account information is searched in the corresponding relationship;
If finding the identification information for being contained in first user account information, obtain and first user account information Matched first identifier information.
9. device according to claim 7, which is characterized in that the authentication module is also used to:
If not finding the first identifier information, detection obtains the first priority orders of each authentication mode;
The corresponding certificate server of each authentication mode is passed sequentially through to first user according to first priority orders Account information is authenticated, until by the corresponding certificate server of the second authentication mode in each authentication mode to described the One user account information authenticates successfully or by the corresponding certificate server of each authentication mode to first user account The equal authentification failure of information.
10. device according to claim 9, which is characterized in that the authentication module obtains each authenticating party for detecting First priority orders of formula, are specifically used for:
The probe requests message is sent to the corresponding certificate server of each authentication mode simultaneously;
It is determined with receiving the chronological order for the detection response message that the corresponding certificate server of each authentication mode returns First priority orders of each authentication mode.
11. device according to claim 9, which is characterized in that described device further includes update module, is used for:
If by the corresponding certificate server of the second authentication mode in each authentication mode to first user account information It authenticates successfully, then first user account information is added to the corresponding user account information set of second authentication mode In;
Determine whether the quantity of the user account information in the user account information set reaches the first given threshold;
If it is determined that the quantity of the user account information in the user account information set reaches first given threshold, then really The highest common divisor substring of any two user account information in the fixed user account information set, wherein each most grand duke About the length of substring is not less than setting length;
Count the number of each highest common divisor substring;
It is more than that the highest common divisor substring of the second given threshold and second authentication mode are added to the corresponding relationship by number In.
12. device according to claim 7, which is characterized in that the authentication module is also used to:
If being visited by the corresponding certificate server of first authentication mode to the first user account information authentification failure The second priority orders for measuring the authentication mode in each authentication mode in addition to first authentication mode, according to described Second priority orders pass sequentially through that the authentication mode in each authentication mode in addition to first authentication mode is corresponding to be recognized Card server authenticates first user account information, until by removing first authenticating party in each authentication mode The corresponding certificate server of third authentication mode in authentication mode except formula to first user account information authenticate at Function or by the corresponding certificate server of authentication mode in each authentication mode in addition to first authentication mode to institute State the equal authentification failure of the first user account information;And/or the corresponding authentification failure number of the first identifier information is added 1, if Determine that after the corresponding authentification failure number of the first identifier information adds 1 be more than the third given threshold, then from the correspondence The first identifier information is deleted in relationship.
CN201910295739.2A 2019-04-12 2019-04-12 User authen method and device based on VPN Pending CN110086785A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910295739.2A CN110086785A (en) 2019-04-12 2019-04-12 User authen method and device based on VPN

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910295739.2A CN110086785A (en) 2019-04-12 2019-04-12 User authen method and device based on VPN

Publications (1)

Publication Number Publication Date
CN110086785A true CN110086785A (en) 2019-08-02

Family

ID=67415004

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910295739.2A Pending CN110086785A (en) 2019-04-12 2019-04-12 User authen method and device based on VPN

Country Status (1)

Country Link
CN (1) CN110086785A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111314355A (en) * 2020-02-20 2020-06-19 深信服科技股份有限公司 Authentication method, device, equipment and medium of VPN (virtual private network) server
CN113542094A (en) * 2021-06-07 2021-10-22 新华三信息安全技术有限公司 Access right control method and device

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101714918A (en) * 2009-10-23 2010-05-26 浙江维尔生物识别技术股份有限公司 Safety system for logging in VPN and safety method for logging in VPN
CN103067407A (en) * 2013-01-17 2013-04-24 中兴通讯股份有限公司 Authentication method and authentication device of user terminal access network
CN104254073A (en) * 2014-09-03 2014-12-31 深信服网络科技(深圳)有限公司 Method and device for authentication of access terminal
CN104468520A (en) * 2014-11-07 2015-03-25 国家信息中心 Identity authentication method and device
CN105847239A (en) * 2016-03-17 2016-08-10 汉柏科技有限公司 User authentication manner determining method and device
CN109347864A (en) * 2018-11-22 2019-02-15 杭州迪普科技股份有限公司 Single-point logging method and device based on Virtual Private Network
WO2019102362A1 (en) * 2017-11-22 2019-05-31 International Business Machines Corporation Authentication of users at multiple terminals

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101714918A (en) * 2009-10-23 2010-05-26 浙江维尔生物识别技术股份有限公司 Safety system for logging in VPN and safety method for logging in VPN
CN103067407A (en) * 2013-01-17 2013-04-24 中兴通讯股份有限公司 Authentication method and authentication device of user terminal access network
CN104254073A (en) * 2014-09-03 2014-12-31 深信服网络科技(深圳)有限公司 Method and device for authentication of access terminal
CN104468520A (en) * 2014-11-07 2015-03-25 国家信息中心 Identity authentication method and device
CN105847239A (en) * 2016-03-17 2016-08-10 汉柏科技有限公司 User authentication manner determining method and device
WO2019102362A1 (en) * 2017-11-22 2019-05-31 International Business Machines Corporation Authentication of users at multiple terminals
CN109347864A (en) * 2018-11-22 2019-02-15 杭州迪普科技股份有限公司 Single-point logging method and device based on Virtual Private Network

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111314355A (en) * 2020-02-20 2020-06-19 深信服科技股份有限公司 Authentication method, device, equipment and medium of VPN (virtual private network) server
CN113542094A (en) * 2021-06-07 2021-10-22 新华三信息安全技术有限公司 Access right control method and device

Similar Documents

Publication Publication Date Title
CN106651363B (en) Hardware wallet and holder identity verification method thereof
CN105164689B (en) Customer certification system and method
JP5370373B2 (en) Entities' bidirectional identification method based on a practical and reliable third party
ES2888656T3 (en) Method, device and network system to identify a website
CN105516133B (en) User identity verification method, server and client
US20140089062A1 (en) Voting systems and voting methods based on smart mobile communication devices
CN101626369B (en) Method, device and system for single sign-on
CN106209775B (en) A kind of application type recognition methods of SSL encryption network flow and device
EP2639998A1 (en) Method and device for anonymous entity identification
CN107086979B (en) User terminal verification login method and device
RU2011142328A (en) SECURITY CARD PROTECTION SYSTEM
CN103139761B (en) The method and communication terminal of a kind of information real-time show
CN110086785A (en) User authen method and device based on VPN
CN106330812B (en) File security recognition methods and device
US20140173110A1 (en) Automatic logon support method and system
CN111010405A (en) SaaS-based website security monitoring system
CN103973652A (en) Login method and login system
US8862667B2 (en) Network based audience measurement
CN111918287A (en) Information processing method and device
CN110071937A (en) Login method, system and storage medium based on block chain
CN104683356B (en) Dynamic password authentication method and system based on software token
CN105790945A (en) Authentication method, device and system for authenticating user unique identity
US20140237091A1 (en) Method and System of Network Discovery
CN106330947A (en) Method and system for recognizing disguised WiFi and system working method
CN105099930B (en) Encrypting traffic flow control methods and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190802