CN110650112A - Universal authentication method and device and cloud service network system - Google Patents

Universal authentication method and device and cloud service network system Download PDF

Info

Publication number
CN110650112A
CN110650112A CN201810679837.1A CN201810679837A CN110650112A CN 110650112 A CN110650112 A CN 110650112A CN 201810679837 A CN201810679837 A CN 201810679837A CN 110650112 A CN110650112 A CN 110650112A
Authority
CN
China
Prior art keywords
authentication
access request
authentication result
source station
universal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810679837.1A
Other languages
Chinese (zh)
Other versions
CN110650112B (en
Inventor
刘竞超
曾东方
苗辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guizhou Baishan Cloud Polytron Technologies Inc
Original Assignee
Guizhou Baishan Cloud Polytron Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guizhou Baishan Cloud Polytron Technologies Inc filed Critical Guizhou Baishan Cloud Polytron Technologies Inc
Priority to CN202010061961.9A priority Critical patent/CN111277592B/en
Priority to CN201810679837.1A priority patent/CN110650112B/en
Publication of CN110650112A publication Critical patent/CN110650112A/en
Application granted granted Critical
Publication of CN110650112B publication Critical patent/CN110650112B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources

Abstract

The invention discloses a universal authentication method, a universal authentication device and a cloud service network system. The disclosed universal authentication method comprises the following steps: receiving access requests for resources of different source stations and/or different types of services of the same source station; authenticating the access request by using authentication algorithms corresponding to different types of services of different source stations and/or the same source station to obtain an original authentication result; and converting the original authentication result and outputting a general authentication result, wherein the general authentication result comprises access request identifiers which are in one-to-one correspondence with the access requests and authentication flag bits used for indicating whether the authentication is passed or not. The technical scheme disclosed can carry out general authentication on access requests of different formats, unifies the operation that the server side of the cloud service network determines that the client side has the right to access resources and provide the resources, and saves the cost of subsequent upgrading and development.

Description

Universal authentication method and device and cloud service network system
Technical Field
The invention relates to the technical field of internet, in particular to a universal authentication method, a universal authentication device and a cloud service network system.
Background
With the development of multimedia technology and the rapid increase of short video, music and picture flow, some illegal third-party websites or mobile terminal apps illegally obtain access rights of some unauthorized resources in a stealing link mode, and huge economic loss is caused to source station customers.
Therefore, most source station clients and service providers require authentication of client requests to avoid illegal access to resources. The prior art generally adopts the following three schemes:
1) and performing anti-theft link verification on the client request at the cloud service network node, and verifying information such as refer, token and the like in the request to judge whether the link is stolen. The authentication mode is easy to be cracked, and the actual effect is not good.
2) The client requests authentication of the site directly back to the source station client (i.e., the client source station). This approach tends to put some access pressure on the source station and even cause the source station to crash.
3) And (3) erecting an authentication service (device) at a cloud service network node, and reducing the pressure of a source station by forwarding a client request and caching a source authentication result. The method is adopted by most cloud service network manufacturers at present, and the method can help the source station to relieve authentication pressure.
However, when the third method is used, since the format requirements and algorithms for the authentication requests of each source station client may be different, cache service software (i.e., devices or modules) (e.g., service software (i.e., devices or modules) for web page caching, service software (i.e., devices or modules) for streaming media caching, etc.) of the cloud service network node needs to interface different authentication algorithm implementations with different source station clients, for example, if the cache service software (i.e., devices or modules) of the cloud service network node needs to process and interface the authentication request formats of multiple source station clients, parameter construction logic for simultaneously implementing authentication requests of different formats for different source station clients is needed, which causes a certain redundancy to resources. In addition, each time a different format authentication request is added for a source station client, a code modification and service upgrade is required for the cache service software (i.e., device or module).
More specifically, when the third method is used, most cloud service providers use an authentication method that builds an authentication server, and if the content of the authentication request is in a plain requirement, only the URL of the resource requested by the client needs to be transmitted, and a corresponding mapping relationship cache can be performed on the authentication server according to the URL requested by the client and the authentication result (possibly, a request unique ID, i.e., an access request identifier, generated by matching the client IP and the client is also needed). The same URL request can hit the authentication result cache and the result is directly returned by the authentication server. Otherwise, the authentication is returned to the client source station. If the source station client has a requirement on the format of the authentication request, cache service software (i.e., a device or a module) is required to extract parameters and construct a request according to a certain rule according to the requirement of the source station client, and then the request is sent back to the client source station for authentication (the client may request to query a string by requesting a URL or in a JSON format, etc.). Under the scene, different clients need to be continuously added with code logic without reusability in the cache service when being docked, and meanwhile, the online service needs to be upgraded. When the cache service software (i.e., the device or the module) of the cloud service network node needs to perform the authentication service with the authentication software (i.e., the device or the module) of the plurality of source station clients, the cache service software (i.e., the device or the module) of the cloud service network node also needs to be additionally developed and upgraded correspondingly, which causes a lot of waste in time and cost and risks caused by upgrading the service.
In order to solve the above problems, a new technical solution needs to be proposed.
Disclosure of Invention
The general authentication method according to the present invention comprises:
receiving access requests for resources of different source stations and/or different types of services of the same source station;
authenticating the access request by using authentication algorithms corresponding to different types of services of different source stations and/or the same source station to obtain an original authentication result;
converting the original authentication result, outputting a general authentication result,
the general authentication result comprises access request identifiers corresponding to the access requests one by one and authentication flag bits used for indicating whether the authentication is passed or not.
According to the universal authentication method of the present invention, the converting the original authentication result comprises:
and matching the original authentication result with a preset general authentication result template, extracting a non-general authentication result part in the original authentication result, and converting the non-general authentication result into a uniform authentication mark bit.
The general authentication method according to the present invention further comprises:
storing the general authentication result;
based on the stored general authentication result, the access request identification is used as a key word, the authentication flag bit aiming at the access request is obtained by searching,
the access request identification corresponds to the authentication zone bit one by one.
The general authentication method according to the present invention further comprises:
when the authentication is determined to pass based on the authentication zone bit, determining that the access request is legal, releasing the access request, and when the authentication is determined not to pass based on the authentication zone bit, determining that the access request is illegal, and rejecting the access request; and/or
The access request is released before the access request is authenticated, when the authentication is determined to pass based on the authentication zone bit, the access request is determined to be legal, the access request is not interrupted, when the authentication is determined not to pass based on the authentication zone bit, the access request is determined to be illegal, and the response to the access request is stopped.
The general authentication method according to the present invention further comprises:
receiving a new format access request for a new source station and/or a new different type of service for the same source station;
the authentication algorithm is extended to support authentication for new formats of access requests.
The universal authentication method according to the present invention, wherein the extended authentication algorithm comprises:
analyzing the authentication rules of new different types of services of a new source station and/or the same source station, confirming the parameter part of the authentication logic to be changed, performing modular programming on the parameter part, updating the universal internal interactive interface of the new different types of services of the new source station and/or the same source station, and loading the changed authentication logic in a hot updating mode, thereby realizing a new authentication algorithm for the authentication services.
The general authentication device according to the present invention comprises:
the extensible access request receiving module is used for receiving access requests aiming at different source stations and/or resources of different types of services of the same source station;
the extensible authentication result calculation module is used for authenticating the access request by using authentication algorithms corresponding to different types of services of different source stations and/or the same source station to obtain an original authentication result;
a general authentication result conversion module for converting the original authentication result and outputting a general authentication result,
the general authentication result comprises access request identifiers corresponding to the access requests one by one and authentication flag bits used for indicating whether the authentication is passed or not.
According to the universal authentication device of the present invention, the universal authentication result conversion module is further configured to:
and matching the original authentication result with a preset general authentication result template, extracting a non-general authentication result part in the original authentication result, and converting the non-general authentication result into a uniform authentication mark bit.
The general authentication device according to the present invention further comprises:
the authentication result storage module is used for storing a general authentication result;
an authentication result searching module for obtaining the authentication flag bit aiming at the access request by searching based on the stored general authentication result and taking the access request mark as a key word,
the access request identification corresponds to the authentication zone bit one by one.
The general authentication device according to the present invention further comprises:
the synchronous authentication control module is used for determining that the access request is legal when the authentication is passed based on the authentication zone bit, releasing the access request, determining that the access request is illegal when the authentication is not passed based on the authentication zone bit, and rejecting the access request; and/or
And the asynchronous authentication control module is used for releasing the access request before authenticating the access request, determining that the access request is legal when the authentication is determined to pass based on the authentication zone bit, not interrupting the access request, determining that the access request is illegal when the authentication is determined not to pass based on the authentication zone bit, and stopping responding to the access request.
According to the universal authentication device of the present invention, the extendable access request receiving module is further configured to: receiving a new format access request for a new source station and/or a new different type of service for the same source station; the extensible authentication result calculation module is further configured to: the authentication algorithm is extended to support authentication for new formats of access requests.
According to the universal authentication device of the present invention, the extensible authentication result calculating module is further configured to:
analyzing the authentication rules of new different types of services of a new source station and/or the same source station, confirming the parameter part of the authentication logic to be changed, performing modular programming on the parameter part, updating the universal internal interactive interface of the new different types of services of the new source station and/or the same source station, and loading the changed authentication logic in a hot updating mode, thereby realizing a new authentication algorithm for the authentication services.
The cloud service network system according to the present invention includes:
a source station;
a cloud service network node comprising a generic authentication device as described above;
the user's client side is connected to the client side,
wherein the universal authentication means is distributed or centralized.
According to the technical scheme of the invention, the access requests with different formats can be subjected to universal authentication, the operation that the server side of the cloud service network determines that the client side has the right to access the resources and provide the resources is unified, and the cost for subsequent upgrading and development is saved.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of the specification, illustrate embodiments of the invention and together with the description, serve to explain the principles of the invention. In the drawings, like reference numerals are used to indicate like elements. The drawings in the following description are directed to some, but not all embodiments of the invention. For a person skilled in the art, other figures can be derived from these figures without inventive effort.
Fig. 1 shows schematically a flow chart of a generic authentication method according to the present invention.
Fig. 2 shows schematically a block diagram of a generic authentication device according to the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention. It should be noted that the embodiments and features of the embodiments of the present invention may be arbitrarily combined with each other without conflict.
Fig. 1 shows schematically a flow chart of a generic authentication method according to the present invention.
As shown in the solid line box of fig. 1, the general authentication method according to the present invention includes:
step S102: receiving access requests for resources of different source stations and/or different types of services of the same source station;
step S104: authenticating the access request by using authentication algorithms corresponding to different types of services of different source stations and/or the same source station to obtain an original authentication result;
step S106: converting the original authentication result, outputting a general authentication result,
the general authentication result comprises access request identifiers corresponding to the access requests one by one and authentication flag bits used for indicating whether the authentication is passed or not.
For example, consider that the authentication algorithms (and interfaces) of the same source station client are generally consistent for different services or clients. Therefore, in a general case, the above-described general authentication method can be applied to different (client) source stations a and B, each of which can provide a web browsing service and a streaming service.
However, it is contemplated that the same source client may also employ different authentication algorithms (and/or interfaces) for its different services. Thus, and/or in special cases, the above-described generic authentication method may also be applied to different types of services 1 (e.g. web browsing services) and 2 (e.g. streaming media caching services) of the same (customer) source station a (or source station B).
In addition, since individual services may require relatively independent authentication algorithms, it is contemplated by those skilled in the art that each source client may employ different authentication methods for the web browsing service and the streaming media service (including the case of using more additional input parameters, for example, in addition to the original access request address (URL), the live broadcast service in the streaming media service may also use the external link URL in the swf as an additional input parameter for authentication).
For example, the authentication flag bit is an integer or boolean variable, and 1 indicates that the authentication is passed, and 0 indicates that the authentication is not passed. The output format of the authentication result is unified, and the storage space of the authentication result is saved.
By the above scheme, the implementation of the authentication algorithm can be separated (for example, the authentication algorithm can be implemented by the extensible authentication result calculation module 203 in the general authentication apparatus described below, and the interaction between the general authentication result conversion module 205 and the access address providing module is performed through a simple interface).
Optionally, "converting the original authentication result" in step S106 includes:
and matching the original authentication result with a preset general authentication result template, extracting a non-general authentication result part in the original authentication result, and converting the non-general authentication result into a uniform authentication mark bit.
Optionally, as shown in the dashed box of fig. 1, the general authentication method according to the present invention further includes:
step 108: storing the general authentication result;
step 110: based on the stored general authentication result, the access request identification is used as a key word, the authentication flag bit aiming at the access request is obtained by searching,
the access request identification corresponds to the authentication zone bit one by one.
For example, the corresponding cache can be made according to the request URL and the authentication flag bit. That is, the access request identification may be a request URL.
For example, the user may configure a storage time for storing (e.g., caching) the generic authentication results. When the storage time is exceeded, the generic authentication result that has been stored (e.g., cached) is deleted.
Optionally, as shown in the dashed box of fig. 1, the general authentication method according to the present invention further includes:
step 112: when the authentication is determined to pass based on the authentication zone bit, determining that the access request is legal, releasing the access request, and when the authentication is determined not to pass based on the authentication zone bit, determining that the access request is illegal, and rejecting the access request; and/or
Step 114: the access request is released before the access request is authenticated, when the authentication is determined to pass based on the authentication zone bit, the access request is determined to be legal, the access request is not interrupted, when the authentication is determined not to pass based on the authentication zone bit, the access request is determined to be illegal, and the response to the access request is stopped.
For example, to provide accelerated services, access addresses of resources in cloud services network nodes may be preferentially provided (in the case of cached source site resources).
For example, providing acceleration service based on the above-described access address may be cache service software (i.e., a device or module), streaming media service software (i.e., a device or module), or proxy service software (i.e., a device or module).
For example, the various service software (i.e., devices or modules) may use an http api interface to obtain the access address, and the relevant request parameters may be carried by the request query or the request body.
For example, corresponding to the step 112, if the synchronization authentication is performed, the authentication is preferentially performed, and after the authentication is determined to pass, the various service software (i.e., the device or the module) provides the resource address of the client source station (corresponding to the case that the source station resource is not cached by the cloud service network node) to the client and caches the content of the response of the client source station, or directly provides the resource address of the cloud service network node (corresponding to the case that the source station resource is cached by the cloud service network node) to the client to respond to the access request of the client. Otherwise, the access request of the client is refused. Corresponding to the step 114, if the authentication is asynchronous, the resource content is responded to first, and then whether to interrupt the response is determined according to the authentication result.
That is, the above technical solution including step 112 and/or step 114 can simply determine whether the access request from the client is authenticated by reading the authentication flag bit (i.e., no specific authentication algorithm needs to be included in the above various service software (i.e., devices or modules)), thereby simplifying the interface parameters.
Optionally, as shown in the dashed box of fig. 1, the general authentication method according to the present invention further includes:
step 116: receiving a new format access request for a new source station and/or a new different type of service for the same source station;
step 118: the authentication algorithm is extended to support authentication for new formats of access requests.
Optionally, the "extended authentication algorithm" in step 118 includes:
analyzing the authentication rules of new different types of services of a new source station and/or the same source station, confirming the parameter part of the authentication logic to be changed, performing modular programming on the parameter part, updating the universal internal interactive interface of the new different types of services of the new source station and/or the same source station, and loading the changed authentication logic in a hot updating mode, thereby realizing a new authentication algorithm for the authentication services.
For example, more specifically, the extended authentication algorithm includes:
1. analyzing new source station or authentication rules of different types of services of the source station, connecting an interface of the source station, and determining a parameter part needing to change authentication logic;
2. compiling the authentication logic through modular programming to complete the updating of a universal internal interactive interface;
3. and the new authentication logic is loaded into the authentication service through a dynamic library and other hot updating modes to form a new authentication service, the upgrading is completed while the online authentication service is not influenced, and the authentication requirements of new customers are supported.
For example, when a 3 rd source client C (i.e., a new source client) is added and the authentication method or input parameters used by the source client C are different from those used by the source client a and the source client B, the above-described technical solution needs to be expanded through steps 116 and 118.
By the above-described technical solution including steps 116 and 118, the requirement for authentication of the newly added source station client can be quickly developed and brought online without changing the service software (i.e., device or module) on the line (e.g., the service software (i.e., device or module) corresponding to or including the access address providing module described below).
That is, when a new source site client joins the cloud service network, it needs to be expanded through steps 116 and 118. The various service software (i.e., devices or modules) described above need only configure the authentication switch for the domain name of the corresponding source site customer. The main authentication logic (i.e. reception of access requests in new format, authentication algorithms) is added to the authentication service (i.e. corresponding to the extensible access request reception module 201 and the extensible authentication result calculation module 203 described below). The authentication service supports hot upgrade and loads the authentication logic (module) corresponding to the source station client. The authentication requirements of new source station clients can be supported without affecting the online source station users.
Optionally, the access request includes at least one of: the URL requesting access, the IP address of the client originating the access request.
For example, for resource access requests of some source station clients, the specific authentication algorithm employed requires that the client IP be included in the input parameters (i.e., the client IP needs to be authenticated).
Fig. 2 schematically shows a block schematic of a generic authentication device 200 according to the present invention.
As shown in the solid line box of fig. 2, the general authentication apparatus 200 according to the present invention includes:
an extensible access request receiving module 201, configured to receive access requests for resources of different source stations and/or different types of services of the same source station;
the extensible authentication result calculation module 203 is used for authenticating the access request by using authentication algorithms corresponding to different types of services of different source stations and/or the same source station to obtain an original authentication result;
a general authentication result converting module 205, for converting the original authentication result, outputting a general authentication result,
the general authentication result comprises access request identifiers corresponding to the access requests one by one and authentication flag bits used for indicating whether the authentication is passed or not.
Optionally, the general authentication result conversion module 205 is further configured to:
and matching the original authentication result with a preset general authentication result template, extracting a non-general authentication result part in the original authentication result, and converting the non-general authentication result into a uniform authentication mark bit.
Optionally, as shown in the dashed box of fig. 2, the universal authentication apparatus 200 according to the present invention may further include:
an authentication result storage module 207 for storing a general authentication result;
an authentication result searching module 209, configured to obtain an authentication flag bit for the access request by searching based on the stored general authentication result and using the access request identifier as a key word,
the access request identification corresponds to the authentication zone bit one by one.
Optionally, as shown in the dashed box of fig. 2, the universal authentication apparatus 200 according to the present invention may further include:
the synchronous authentication control module 211 is configured to determine that the access request is legal and the access request is released when the authentication is determined to pass based on the authentication flag bit, and determine that the access request is illegal and deny the access request when the authentication is determined not to pass based on the authentication flag bit; and/or
The asynchronous authentication control module 213 is configured to release the access request before authenticating the access request, determine that the access request is legitimate when the authentication is determined to pass based on the authentication flag bit, not interrupt the access request, and determine that the access request is illegal when the authentication is determined to not pass based on the authentication flag bit, and stop responding to the access request.
Optionally, the extensible access request receiving module 201 is further configured to: receiving a new format access request for a new source station and/or a new different type of service for the same source station; the extensible authentication result calculation module 203 is further configured to: the authentication algorithm is extended to support authentication for new formats of access requests.
Optionally, the extensible authentication result calculating module 203 is further configured to:
analyzing the authentication rules of new different types of services of a new source station and/or the same source station, confirming the parameter part of the authentication logic to be changed, performing modular programming on the parameter part, updating the universal internal interactive interface of the new different types of services of the new source station and/or the same source station, and loading the changed authentication logic in a hot updating mode, thereby realizing a new authentication algorithm for the authentication services.
Alternatively, the universal authentication device 200 according to the present invention may be distributed or centralized.
That is, the above-described universal authentication device 200 may be one device among a plurality of devices distributed (i.e., distributed) in a part of the cloud service network node(s). The universal authentication device 200 may also be a device located in a cloud service network node or elsewhere in the network (i.e., centralized).
Based on the general authentication method and device, the invention also provides a cloud service network system, which comprises:
a source station;
a cloud service network node comprising the universal authentication apparatus 200 as described above;
the user's client side is connected to the client side,
wherein the universal authentication device 200 is distributed or centralized.
In order to make the technical solution according to the present invention more clearly understood by those skilled in the art, the following describes relevant operation steps in conjunction with an example cloud service network system.
An example cloud services network system includes: a site used by a source client a (i.e., client source a) and a site used by a source client B (i.e., client source B); a cloud service network node comprising the universal authentication device 200 as described above; and (4) a user client.
Operations related to an example cloud services network system include the steps of:
s1: and the user client app or the browser initiates a resource request to the cloud service network node through the dns resolution.
S2: different service software (i.e., devices or modules) of the cloud service network node (service software (i.e., device or module) a of source station client a, service software (i.e., device or module) B of source station client B) receives the request from S1, such as a picture request or a streaming media live request.
S3: service software (i.e., a device or a module) a or service software (i.e., a device or a module) B of the cloud service network node initiates an authentication request (see whether to bring the client IP information or not as needed) to an authentication server (i.e., the universal authentication device 200) (corresponding to the access request in step S102 in the above-mentioned universal authentication method, it is assumed in the present invention that each access request needs to be authenticated), the authentication service here may be distributed or centralized, the distributed cache result is valid corresponding to a certain cloud service network node server, and the centralized cache result is valid for requests of all servers of the cloud service network.
For example, the authentication service may be deployed in a distributed or centralized manner according to application scenarios such as the number of requests and the deployment cost. If the number of requests of each network node is large, a centralized deployment mode can effectively control the number of requests of back source authentication, the hit rate of authentication requests of the whole network is improved, but great pressure is necessarily caused to the central authentication service at the same time, and at this time, the centralized deployment mode can be adopted for deployment (for example, deployment according to the nodes or even deployment according to a single machine), the pressure of the authentication service is reduced, and thus, the application range of the authentication response cache is limited to a small cluster. The authentication request back to the client source station will increase considerably. The actual deployment mode is determined according to the application scene.
S4: the authentication service checks whether the local has an authentication result cache corresponding to the URL, if so, the step S5 is performed if not (corresponding to the step 110 in the general authentication method, implicitly including the step 108 in the general authentication method).
S5: the authentication service encapsulates the request content according to the authentication request format required by the client and initiates an authentication request to the client source station a/B (optionally corresponding to prior art steps).
S6: the authentication service takes the authentication response of the client source station and determines whether to cache the authentication result and sets the corresponding cache expiration time according to the configuration.
S7: the authentication service responds the authentication result to the service software (i.e., device or module) a/B, where the response contents may respond to 0 or 1 according to whether the authentication is passed or not, since the inside is interacted through a simplified interface (corresponding to step S104 in the above-described general authentication method).
S8: the service software (i.e., device or module) a/B checks whether asynchronous authentication or synchronous authentication is configured, preferentially responds to the resource content if asynchronous authentication is performed, and then determines whether to interrupt the response according to the authentication result (corresponding to the step 114), and waits for the authentication result of the authentication service response to respond to the resource if synchronous authentication is performed (corresponding to the step 112).
S9: the cloud service network node responds the content to the client app or browser.
According to the technical scheme of the invention, the method has the following advantages:
1. the technical scheme of performing general authentication on access requests of different formats is provided, the operation of determining that a client has the right to access resources and providing resource access addresses by a server (namely, the general authentication device 200 in a cloud service network node) of a cloud service network is unified, and the cost of performing subsequent upgrading and development is saved.
2. For cloud service network nodes, the authentication service logic can be unified, the new requirement docking speed is improved, and the problem of low efficiency caused by repeated development of the authentication logic by multiple components is solved. And the risk caused by online upgrading operation of multiple components for meeting new authentication requirements is reduced.
3. For the source station client website, the load pressure caused by the source returning authentication can be effectively reduced, because part of the authentication requests can directly hit the authentication cache through the authentication service of the cloud service network (i.e., the extensible access request receiving module 201 and the extensible authentication result calculating module 203 described above).
4. For an end user (namely, a client), since the authentication can be performed at the cloud service network node, the authentication speed of the end user can be improved to a certain extent, the authentication is basically unaware, and the client of the end user can be compatible with the scheme of the invention without any change.
5. When a plurality of services (such as streaming media acceleration and HTTP acceleration) are provided on a cloud service network node, authentication services (i.e., corresponding to the extensible access request receiving module 201 and the extensible authentication result calculating module 203 described above) under the plurality of services are extracted and unified.
6. When new authentication requirements are caused by adding new source station clients, only new authentication logic needs to be added to the unified authentication service, and the authentication service is not required to be reconstructed for all service components.
7. The distributed and centralized authentication service can be adopted, namely, multiple nodes all deploy the authentication service or a single node or a few nodes deploy the authentication service, and the service scenes when the access requests are different can be dealt with.
8. The authentication result can be cached in the cloud service network node without source return authentication.
The above-described aspects may be implemented individually or in various combinations, and such variations are within the scope of the present invention.
It will be understood by those of ordinary skill in the art that all or some of the steps of the methods, systems, functional modules/units in the devices disclosed above may be implemented as software, firmware, hardware, and suitable combinations thereof. In a hardware implementation, the division between functional modules/units referred to in the above description does not necessarily correspond to the division of physical components. For example, one physical component may have multiple functions, or one function or step may be performed by several physical components in cooperation. Some or all of the components may be implemented as software executed by a processor, such as a digital signal processor or microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit. Such software may be distributed on computer readable media, which may include computer storage media (or non-transitory media) and communication media (or transitory media). The term computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data, as is well known to those of ordinary skill in the art. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, Digital Versatile Disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can accessed by a computer. In addition, communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media as known to those skilled in the art.
Finally, it should be noted that: the above examples are only for illustrating the technical solutions of the present invention, and are not limited thereto. Although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: modifications of the technical solutions described in the embodiments or equivalent replacements of some technical features may still be made. And such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (13)

1. A universal authentication method, comprising:
receiving access requests for resources of different source stations and/or different types of services of the same source station;
authenticating the access request by using an authentication algorithm corresponding to different types of services of different source stations and/or the same source station to obtain an original authentication result;
converting the original authentication result, outputting a general authentication result,
the general authentication result comprises access request identifications corresponding to the access requests one by one and authentication flag bits used for indicating whether authentication is passed or not.
2. The universal authentication method as claimed in claim 1, wherein said converting the original authentication result comprises:
and matching the original authentication result with a preset general authentication result template, extracting a non-general authentication result part in the original authentication result, and converting the non-general authentication result into a uniform authentication mark bit.
3. The universal authentication method as claimed in claim 1 or 2, further comprising:
storing the general authentication result;
based on the stored general authentication result, the access request identification is used as a key word, the authentication zone bit aiming at the access request is obtained by searching,
and the access request identification corresponds to the authentication zone bit one by one.
4. The universal authentication method as claimed in claim 1 or 2, further comprising:
when the authentication is determined to pass based on the authentication zone bit, the access request is determined to be legal, the access request is released, when the authentication is determined not to pass based on the authentication zone bit, the access request is determined to be illegal, and the access request is rejected; and/or
And before the access request is authenticated, the access request is released, when the authentication is determined to pass based on the authentication zone bit, the access request is determined to be legal, the access request is not interrupted, when the authentication is determined not to pass based on the authentication zone bit, the access request is determined to be illegal, and the response to the access request is stopped.
5. The universal authentication method as claimed in claim 1 or 2, further comprising:
receiving a new format access request for a new source station and/or a new different type of service for the same source station;
extending an authentication algorithm to support authentication for the new format access request.
6. The universal authentication method as claimed in claim 5, wherein said extended authentication algorithm comprises:
analyzing the authentication rules of the new source station and/or the new different types of services of the same source station, confirming the parameter part of the authentication logic to be changed, performing modular programming on the parameter part, updating the universal internal interactive interface of the new source station and/or the new different types of services of the same source station, and loading the changed authentication logic in a hot updating mode, thereby realizing a new authentication algorithm for the authentication services.
7. A universal authentication apparatus, comprising:
the extensible access request receiving module is used for receiving access requests aiming at different source stations and/or resources of different types of services of the same source station;
the extensible authentication result calculation module is used for authenticating the access request by using an authentication algorithm corresponding to different types of services of different source stations and/or the same source station to obtain an original authentication result;
a general authentication result conversion module for converting the original authentication result and outputting a general authentication result,
the general authentication result comprises access request identifications corresponding to the access requests one by one and authentication flag bits used for indicating whether authentication is passed or not.
8. The universal authentication device as claimed in claim 6, wherein said universal authentication result conversion module is further configured to:
and matching the original authentication result with a preset general authentication result template, extracting a non-general authentication result part in the original authentication result, and converting the non-general authentication result into a uniform authentication mark bit.
9. The universal authentication device as claimed in claim 7 or 8, further comprising:
the authentication result storage module is used for storing the general authentication result;
an authentication result searching module, configured to obtain an authentication flag bit for the access request through searching based on the stored general authentication result and using the access request identifier as a keyword,
and the access request identification corresponds to the authentication zone bit one by one.
10. The universal authentication device as claimed in claim 7 or 8, further comprising:
the synchronous authentication control module is used for determining that the access request is legal when the authentication is determined to pass based on the authentication zone bit, releasing the access request, determining that the access request is illegal when the authentication is determined not to pass based on the authentication zone bit, and rejecting the access request; and/or
And the asynchronous authentication control module is used for releasing the access request before authenticating the access request, determining that the access request is legal when the authentication is determined to pass based on the authentication zone bit, not interrupting the access request, determining that the access request is illegal when the authentication is determined not to pass based on the authentication zone bit, and stopping responding to the access request.
11. The universal authentication device as claimed in claim 6 or 7, wherein said extensible access request receiving module is further configured to: receiving a new format access request for a new source station and/or a new different type of service for the same source station; the extensible authentication result calculation module is further configured to: extending an authentication algorithm to support authentication for the new format access request.
12. The universal authentication device of claim 11, wherein the extensible authentication result calculation module is further configured to:
analyzing the authentication rules of the new source station and/or the new different types of services of the same source station, confirming the parameter part of the authentication logic to be changed, performing modular programming on the parameter part, updating the universal internal interactive interface of the new source station and/or the new different types of services of the same source station, and loading the changed authentication logic in a hot updating mode, thereby realizing a new authentication algorithm for the authentication services.
13. A cloud service network system, comprising:
a source station;
a cloud services network node comprising the universal authentication apparatus of claims 7-12;
the user's client side is connected to the client side,
wherein the universal authentication means is distributed or centralized.
CN201810679837.1A 2018-06-27 2018-06-27 Universal authentication method and device and cloud service network system Active CN110650112B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202010061961.9A CN111277592B (en) 2018-06-27 2018-06-27 Authentication method, authentication device, storage medium and computer equipment
CN201810679837.1A CN110650112B (en) 2018-06-27 2018-06-27 Universal authentication method and device and cloud service network system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810679837.1A CN110650112B (en) 2018-06-27 2018-06-27 Universal authentication method and device and cloud service network system

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN202010061961.9A Division CN111277592B (en) 2018-06-27 2018-06-27 Authentication method, authentication device, storage medium and computer equipment

Publications (2)

Publication Number Publication Date
CN110650112A true CN110650112A (en) 2020-01-03
CN110650112B CN110650112B (en) 2022-05-20

Family

ID=68988768

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202010061961.9A Active CN111277592B (en) 2018-06-27 2018-06-27 Authentication method, authentication device, storage medium and computer equipment
CN201810679837.1A Active CN110650112B (en) 2018-06-27 2018-06-27 Universal authentication method and device and cloud service network system

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN202010061961.9A Active CN111277592B (en) 2018-06-27 2018-06-27 Authentication method, authentication device, storage medium and computer equipment

Country Status (1)

Country Link
CN (2) CN111277592B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112995165A (en) * 2021-02-10 2021-06-18 北京金山云网络技术有限公司 Resource access authentication method and device, storage medium and electronic equipment
CN110650112B (en) * 2018-06-27 2022-05-20 贵州白山云科技股份有限公司 Universal authentication method and device and cloud service network system
CN114760127A (en) * 2022-04-08 2022-07-15 多点生活(成都)科技有限公司 Multi-interface authentication access method based on zero code

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112866221B (en) * 2021-01-11 2023-04-07 中国邮政储蓄银行股份有限公司 Authentication method, authentication system, computer-readable storage medium, and processor
CN114500067A (en) * 2022-02-09 2022-05-13 厦门元屿安科技有限公司 Asynchronous attack anti-theft chain method and system based on CDN edge computing network

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100235856A1 (en) * 2007-12-13 2010-09-16 Hui Huang Method, system, and device for realizing internet protocol television service
CN101873213A (en) * 2009-04-27 2010-10-27 中国网通集团宽带业务应用国家工程实验室有限公司 End-to-end authentication method and system as well as business end intelligent card
CN105872956A (en) * 2016-05-03 2016-08-17 深圳市云际通科技有限公司 System and method for remote authentication application based on bluetooth subscriber identification module (SIM)
CN106657034A (en) * 2016-12-02 2017-05-10 中国联合网络通信集团有限公司 Service authentication method and authentication capability opening server

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2524536A1 (en) * 2005-10-26 2007-04-26 Bce Inc Method, system and apparatus for controlling the establishment of a data connection from an originating data device
CN103905192B (en) * 2012-12-26 2018-10-12 锐迪科(重庆)微电子科技有限公司 A kind of encrypted authentication method, apparatus and system
CN104580136A (en) * 2014-09-10 2015-04-29 中电科技(北京)有限公司 UEFI-based long-distance identity authentication system and method
CN105357190B (en) * 2015-10-26 2018-12-07 网宿科技股份有限公司 The method and system of access request authentication
JP6682254B2 (en) * 2015-12-08 2020-04-15 キヤノン株式会社 Authentication cooperation system, authentication cooperation method, authorization server and program
CN106815099B (en) * 2017-01-19 2020-09-18 腾讯科技(深圳)有限公司 Authentication system and method
CN111277592B (en) * 2018-06-27 2022-06-10 贵州白山云科技股份有限公司 Authentication method, authentication device, storage medium and computer equipment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100235856A1 (en) * 2007-12-13 2010-09-16 Hui Huang Method, system, and device for realizing internet protocol television service
CN101873213A (en) * 2009-04-27 2010-10-27 中国网通集团宽带业务应用国家工程实验室有限公司 End-to-end authentication method and system as well as business end intelligent card
CN105872956A (en) * 2016-05-03 2016-08-17 深圳市云际通科技有限公司 System and method for remote authentication application based on bluetooth subscriber identification module (SIM)
CN106657034A (en) * 2016-12-02 2017-05-10 中国联合网络通信集团有限公司 Service authentication method and authentication capability opening server

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110650112B (en) * 2018-06-27 2022-05-20 贵州白山云科技股份有限公司 Universal authentication method and device and cloud service network system
CN112995165A (en) * 2021-02-10 2021-06-18 北京金山云网络技术有限公司 Resource access authentication method and device, storage medium and electronic equipment
CN112995165B (en) * 2021-02-10 2023-04-14 北京金山云网络技术有限公司 Resource access authentication method and device, storage medium and electronic equipment
CN114760127A (en) * 2022-04-08 2022-07-15 多点生活(成都)科技有限公司 Multi-interface authentication access method based on zero code
CN114760127B (en) * 2022-04-08 2023-10-03 多点生活(成都)科技有限公司 Multi-interface authentication access method based on zero codes

Also Published As

Publication number Publication date
CN111277592A (en) 2020-06-12
CN110650112B (en) 2022-05-20
CN111277592B (en) 2022-06-10

Similar Documents

Publication Publication Date Title
CN110650112B (en) Universal authentication method and device and cloud service network system
US10033818B2 (en) Using listen ranges to deliver content to electronic devices from local caching servers
CN107690800B (en) Managing dynamic IP address allocation
KR101962156B1 (en) Authorization processing method and apparatus
CN106375270B (en) Token generation and authentication method and authentication server
CN112131021B (en) Access request processing method and device
CN114025021B (en) Communication method, system, medium and electronic equipment crossing Kubernetes cluster
US20180026940A1 (en) Updating address mapping for local and network resources
US20210097476A1 (en) Container Management Method, Apparatus, and Device
CN111400777B (en) Network storage system, user authentication method, device and equipment
AU2020333658B2 (en) Identity data object creation and management
CN113037761B (en) Login request verification method and device, storage medium and electronic equipment
CN112667601A (en) Block chain identifier management method, terminal device and computer-readable storage medium
CN108055299B (en) Portal page pushing method, network access server and Portal authentication system
KR20230043919A (en) service request processing
US8996607B1 (en) Identity-based casting of network addresses
US11281804B1 (en) Protecting data integrity in a content distribution network
WO2017096886A1 (en) Content pushing method, apparatus and system
WO2023273693A1 (en) Dynamic loading method and apparatus for signature algorithm, and device and storage medium
CN110839077A (en) File request processing method, request feedback information processing method and related components
CN113784354B (en) Request conversion method and device based on gateway
CN113285920B (en) Service access method, device, equipment and storage medium
US9823944B2 (en) Deployment control device and deployment control method for deploying virtual machine for allowing access
CN115801686A (en) Service request processing method, device, equipment and storage medium
WO2018188073A1 (en) Content deployment method and distribution controller

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant