CN111064699A - Client management method, device and storage medium - Google Patents

Client management method, device and storage medium Download PDF

Info

Publication number
CN111064699A
CN111064699A CN201911022498.0A CN201911022498A CN111064699A CN 111064699 A CN111064699 A CN 111064699A CN 201911022498 A CN201911022498 A CN 201911022498A CN 111064699 A CN111064699 A CN 111064699A
Authority
CN
China
Prior art keywords
client
authentication
preset message
management method
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911022498.0A
Other languages
Chinese (zh)
Inventor
沈忠立
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Inspur Intelligent Technology Co Ltd
Original Assignee
Suzhou Inspur Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Inspur Intelligent Technology Co Ltd filed Critical Suzhou Inspur Intelligent Technology Co Ltd
Priority to CN201911022498.0A priority Critical patent/CN111064699A/en
Publication of CN111064699A publication Critical patent/CN111064699A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations
    • H04L12/18Arrangements for providing special services to substations for broadcast or conference, e.g. multicast

Abstract

The invention discloses a management method of a client, which comprises the following steps that: receiving a network broadcast which is sent by a client and contains a preset message; determining the authentication level of the client according to the preset message; authenticating the client by adopting an authentication method corresponding to the authentication level; and sending the authentication and authorization information to the client. The invention also discloses a computer device and a readable storage medium. The method disclosed by the invention identifies and authenticates the message in the network broadcast sent by the client, thereby granting different authorities or functions to the client, avoiding the realization of authentication by installing a plurality of configuration files and reducing the error probability in the process of inputting or modifying the configuration files.

Description

Client management method, device and storage medium
Technical Field
The present invention relates to the field of client management, and in particular, to a method, device, and storage medium for managing a client.
Background
General security software has a single machine version and a centralized control version, wherein the centralized control version means that a plurality of clients can register with the same centralized control end, but the existing clients configure the IP basically through input or configuration files when being installed and deployed, so that a plurality of problems can occur when the clients use the software: such as an IP mistake or forgetting to modify the configuration file, resulting in an unknown error.
Therefore, a new management method for the client is urgently needed.
Disclosure of Invention
In view of the above, in order to overcome at least one aspect of the above problem, an embodiment of the present invention provides a method for managing a client, including performing, at a management end, the following steps:
receiving a network broadcast which is sent by a client and contains a preset message;
determining the authentication level of the client according to the preset message;
authenticating the client by adopting an authentication method corresponding to the authentication level;
and sending the authentication and authorization information to the client.
In some embodiments, receiving a network broadcast containing a preset packet sent by a client further includes:
and receiving the network broadcast of the message which is sent by the client and comprises the authority and/or function application information.
In some embodiments, determining the authentication level of the client according to the preset packet includes:
judging whether the preset message comprises first authentication information or not;
responding to the preset message including the first authentication information, and determining that the client is at a first authentication level;
authenticating the client using an authentication method corresponding to the authentication level includes: authentication of the client directly by a first authentication level.
In some embodiments, further comprising:
judging whether the preset message comprises second authentication information or not;
and responding to the second authentication information included in the preset message, determining that the client is at a second authentication level, and marking the client as the authentication to be confirmed.
In some embodiments, marking the client as a to-be-confirmed authentication further comprises:
and responding to the received manual confirmation instruction, and passing the authentication of the client.
In some embodiments, further comprising:
judging whether the preset message comprises third authentication information or not;
and responding to the preset message including the third authentication information, determining that the client is in a third authentication level, and passing the authentication of the client after the third authentication information is successfully checked.
In some embodiments, further comprising:
and receiving heartbeat information returned by the client to determine that the client authentication and authorization are successful.
In some embodiments, further comprising:
and storing the received network broadcast sent by the client.
Based on the same inventive concept, according to another aspect of the present invention, an embodiment of the present invention further provides a computer apparatus, including:
at least one processor; and
a memory storing a computer program operable on the processor, wherein the processor executes the program to perform the steps of any of the above-described client management methods.
Based on the same inventive concept, according to another aspect of the present invention, an embodiment of the present invention further provides a computer-readable storage medium storing a computer program which, when executed by a processor, performs the steps of any one of the above-described management methods of the client.
The invention has one of the following beneficial technical effects: the method disclosed by the invention identifies and authenticates the message in the network broadcast sent by the client, thereby granting different authorities or functions to the client, avoiding the realization of authentication by installing a plurality of configuration files and reducing the error probability in the process of inputting or modifying the configuration files.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other embodiments can be obtained by using the drawings without creative efforts.
Fig. 1 is a schematic flowchart of a management method of a client according to an embodiment of the present invention;
FIG. 2 is a schematic structural diagram of a computer device provided in an embodiment of the present invention;
fig. 3 is a schematic structural diagram of a computer-readable storage medium according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the following embodiments of the present invention are described in further detail with reference to the accompanying drawings.
It should be noted that all expressions using "first" and "second" in the embodiments of the present invention are used for distinguishing two entities with the same name but different names or different parameters, and it should be noted that "first" and "second" are merely for convenience of description and should not be construed as limitations of the embodiments of the present invention, and they are not described in any more detail in the following embodiments.
According to an aspect of the present invention, an embodiment of the present invention provides a management method for a client, as shown in fig. 1, which may include performing the following steps at a management end: s1, receiving a network broadcast containing a preset message sent by a client; s2, determining the authentication level of the client according to the preset message; s3, authenticating the client by adopting an authentication method corresponding to the authentication level; and S4, sending the authentication and authorization information to the client.
The method disclosed by the invention identifies and authenticates the message in the network broadcast sent by the client, thereby granting different authorities or functions to the client, avoiding the realization of authentication by installing a plurality of configuration files and reducing the error probability in the process of inputting or modifying the configuration files.
In some embodiments, receiving a network broadcast containing a preset packet sent by a client further includes:
and receiving the network broadcast of the message which is sent by the client and comprises the authority and/or function application information.
Specifically, the client may send the network broadcast to the outside within a certain time during the installation process, the network broadcast may include a preset message, the preset message may be generated according to the authority or function required by the actual situation, and the preset message is further used to determine whether the management end receives and processes the broadcast, and if other applications or management ends want to receive the broadcast, the other applications or management ends need to know the preset message of the client.
In some embodiments, in step S2, the authentication level may be divided into three levels, each level corresponds to a corresponding authentication method, and the determination of the authentication level may be determined by information included in the preset message, for example, if the preset message includes specific content, the client may be considered as the first authentication level.
In some embodiments, determining the authentication level of the client according to the preset packet includes:
judging whether the preset message comprises first authentication information or not;
responding to the preset message including the first authentication information, and determining that the client is at a first authentication level;
authenticating the client using an authentication method corresponding to the authentication level includes: authentication of the client directly by a first authentication level.
Specifically, if it is determined that the network message sent by the client includes specific content corresponding to the first authentication information, the client may be determined to belong to the first authentication level, and the authentication may be passed directly at this time. For example, the first authentication information may be a hash value or a character string, or the like.
In some embodiments, further comprising:
judging whether the preset message comprises second authentication information or not;
and responding to the second authentication information included in the preset message, determining that the client is at a second authentication level, and marking the client as the authentication to be confirmed.
Specifically, if it is determined that the network message sent by the client includes specific content corresponding to the second authentication information, the client may be determined to belong to the second authentication level, and at this time, the client is placed in the to-be-confirmed list and passes authentication after receiving the manual confirmation instruction.
For example, after placing a client into a list to be confirmed, an administrator may view the corresponding client in the list, and if the client belongs to the administrator, the administrator may input a confirmation instruction and then pass authentication of the client.
It should be noted that the second authentication information may also be a hash value or a character string, and the difference from the first authentication information is that the second authentication information includes an identification bit to be confirmed, or the first authentication information also has an identification bit to be confirmed, but the identification bit indicates invalidity.
In some embodiments, further comprising:
judging whether the preset message comprises third authentication information or not;
and responding to the preset message including the third authentication information, determining that the client is in a third authentication level, and passing the authentication of the client after the third authentication information is successfully checked.
Specifically, if it is determined that the network message sent by the client includes specific content corresponding to the third authentication information, the client may be determined to belong to the third authentication level, for example, the client broadcast content includes a certificate signature of the management end, and the authentication may be completed after the management end completes the signature verification.
In some embodiments, the method provided in the embodiments of the present invention further includes:
and receiving heartbeat information returned by the client to determine that the client authentication and authorization are successful.
Specifically, after the client passes the authentication, the client can realize basic communication with the management terminal, then the management terminal issues the authorization information to the client, the client receives the authorization information or stops broadcasting when reaching the specified time, and simultaneously sends a heartbeat message to the management terminal, and the management terminal displays that the client successfully authenticates the authorization after receiving the heartbeat information.
In some embodiments, the method provided in the embodiments of the present invention further includes:
and storing the received network broadcast sent by the client.
Specifically, the management end stores the received broadcast record or registration log, so that the management end can check the authentication registration history or safety alarm.
The self-defined authentication method based on the broadcast, provided by the invention, sends the broadcast to the outside within a certain time when the client is installed, the management end realizes the authentication of the client by monitoring the broadcast, and then the management end respectively grants different authorities or functions to the client according to the authentication authorization information, thereby realizing dynamic management and reducing the error probability in the process of inputting or modifying the configuration file.
Based on the same inventive concept, according to another aspect of the present invention, as shown in fig. 2, an embodiment of the present invention further provides a computer apparatus 501, comprising:
at least one processor 520; and
a memory 510, the memory 510 storing a computer program 511 executable on the processor, the processor 520 executing the program to perform the steps of any of the above methods for managing a client.
Based on the same inventive concept, according to another aspect of the present invention, as shown in fig. 3, an embodiment of the present invention further provides a computer-readable storage medium 601, where the computer-readable storage medium 601 stores computer program instructions 610, and the computer program instructions 610, when executed by a processor, perform the steps of the management method of any one of the clients as above.
Finally, it should be noted that, as will be understood by those skilled in the art, all or part of the processes of the methods of the above embodiments may be implemented by a computer program to instruct related hardware to implement the methods. The storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM), a Random Access Memory (RAM), or the like. The embodiments of the computer program may achieve the same or similar effects as any of the above-described method embodiments.
In addition, the apparatuses, devices, and the like disclosed in the embodiments of the present invention may be various electronic terminal devices, such as a mobile phone, a Personal Digital Assistant (PDA), a tablet computer (PAD), a smart television, and the like, or may be a large terminal device, such as a server, and the like, and therefore the scope of protection disclosed in the embodiments of the present invention should not be limited to a specific type of apparatus, device. The client disclosed by the embodiment of the invention can be applied to any one of the electronic terminal devices in the form of electronic hardware, computer software or a combination of the electronic hardware and the computer software.
Furthermore, the method disclosed according to an embodiment of the present invention may also be implemented as a computer program executed by a CPU, and the computer program may be stored in a computer-readable storage medium. The computer program, when executed by the CPU, performs the above-described functions defined in the method disclosed in the embodiments of the present invention.
Further, the above method steps and system elements may also be implemented using a controller and a computer readable storage medium for storing a computer program for causing the controller to implement the functions of the above steps or elements.
Further, it should be appreciated that the computer-readable storage media (e.g., memory) herein can be either volatile memory or nonvolatile memory, or can include both volatile and nonvolatile memory. By way of example, and not limitation, nonvolatile memory can include Read Only Memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM), which can act as external cache memory. By way of example and not limitation, RAM is available in a variety of forms such as synchronous RAM (DRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), and Direct Rambus RAM (DRRAM). The storage devices of the disclosed aspects are intended to comprise, without being limited to, these and other suitable types of memory.
Those of skill would further appreciate that the various illustrative logical blocks, modules, circuits, and algorithm steps described in connection with the disclosure herein may be implemented as electronic hardware, computer software, or combinations of both. To clearly illustrate this interchangeability of hardware and software, various illustrative components, blocks, modules, circuits, and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as software or hardware depends upon the particular application and design constraints imposed on the overall system. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the disclosed embodiments of the present invention.
The various illustrative logical blocks, modules, and circuits described in connection with the disclosure herein may be implemented or performed with the following components designed to perform the functions herein: a general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination of these components. A general purpose processor may be a microprocessor, but in the alternative, the processor may be any conventional processor, controller, microcontroller, or state machine. A processor may also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP, and/or any other such configuration.
The steps of a method or algorithm described in connection with the disclosure herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art. An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium may be integral to the processor. The processor and the storage medium may reside in an ASIC. The ASIC may reside in a user terminal. In the alternative, the processor and the storage medium may reside as discrete components in a user terminal.
In one or more exemplary designs, the functions may be implemented in hardware, software, firmware, or any combination thereof. If implemented in software, the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a general purpose or special purpose computer. By way of example, and not limitation, such computer-readable media can comprise RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a general-purpose or special-purpose computer, or a general-purpose or special-purpose processor. Also, any connection is properly termed a computer-readable medium. For example, if the software is transmitted from a website, server, or other remote source using a coaxial cable, fiber optic cable, twisted pair, Digital Subscriber Line (DSL), or wireless technologies such as infrared, radio, and microwave, then the coaxial cable, fiber optic cable, twisted pair, DSL, or wireless technologies such as infrared, radio, and microwave are included in the definition of medium. Disk and disc, as used herein, includes Compact Disc (CD), laser disc, optical disc, Digital Versatile Disc (DVD), floppy disk, blu-ray disc where disks usually reproduce data magnetically, while discs reproduce data optically with lasers. Combinations of the above should also be included within the scope of computer-readable media.
The foregoing is an exemplary embodiment of the present disclosure, but it should be noted that various changes and modifications could be made herein without departing from the scope of the present disclosure as defined by the appended claims. The functions, steps and/or actions of the method claims in accordance with the disclosed embodiments described herein need not be performed in any particular order. Furthermore, although elements of the disclosed embodiments of the invention may be described or claimed in the singular, the plural is contemplated unless limitation to the singular is explicitly stated.
It should be understood that, as used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context clearly supports the exception. It should also be understood that "and/or" as used herein is meant to include any and all possible combinations of one or more of the associated listed items.
The numbers of the embodiments disclosed in the embodiments of the present invention are merely for description, and do not represent the merits of the embodiments.
It will be understood by those skilled in the art that all or part of the steps of implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, and the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
Those of ordinary skill in the art will understand that: the discussion of any embodiment above is meant to be exemplary only, and is not intended to intimate that the scope of the disclosure, including the claims, of embodiments of the invention is limited to these examples; within the idea of an embodiment of the invention, also technical features in the above embodiment or in different embodiments may be combined and there are many other variations of the different aspects of the embodiments of the invention as described above, which are not provided in detail for the sake of brevity. Therefore, any omissions, modifications, substitutions, improvements, and the like that may be made without departing from the spirit and principles of the embodiments of the present invention are intended to be included within the scope of the embodiments of the present invention.

Claims (10)

1. A management method of a client comprises the following steps executed on a management side:
receiving a network broadcast which is sent by a client and contains a preset message;
determining the authentication level of the client according to the preset message;
authenticating the client by adopting an authentication method corresponding to the authentication level;
and sending the authentication and authorization information to the client.
2. The management method according to claim 1, wherein receiving a network broadcast containing a predetermined message from a client further comprises:
and receiving the network broadcast of the message which is sent by the client and comprises the authority and/or function application information.
3. The management method according to claim 1, wherein determining the authentication level of the client according to the preset packet comprises:
judging whether the preset message comprises first authentication information or not;
responding to the preset message including the first authentication information, and determining that the client is at a first authentication level;
authenticating the client using an authentication method corresponding to the authentication level includes: authentication of the client directly by the first authentication level.
4. The management method of claim 3, further comprising:
judging whether the preset message comprises second authentication information or not;
and responding to the second authentication information included in the preset message, determining that the client is at a second authentication level, and marking the client as the authentication to be confirmed.
5. The method of managing of claim 4, wherein marking the client as authenticated to be confirmed further comprises:
and responding to the received manual confirmation instruction, and passing the authentication of the client.
6. The management method of claim 3, further comprising:
judging whether the preset message comprises third authentication information or not;
and responding to the preset message including the third authentication information, determining that the client is in a third authentication level, and passing the authentication of the client after the third authentication information is successfully checked.
7. The management method of claim 1, further comprising:
and receiving heartbeat information returned by the client to determine that the client authentication and authorization are successful.
8. The management method of claim 1, further comprising:
and storing the received network broadcast sent by the client.
9. A computer device, comprising:
at least one processor; and
memory storing a computer program operable on the processor, wherein the processor executes the program to perform the steps of the method according to any of claims 1-8.
10. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, is adapted to carry out the steps of the method of any one of claims 1 to 8.
CN201911022498.0A 2019-10-25 2019-10-25 Client management method, device and storage medium Pending CN111064699A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911022498.0A CN111064699A (en) 2019-10-25 2019-10-25 Client management method, device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911022498.0A CN111064699A (en) 2019-10-25 2019-10-25 Client management method, device and storage medium

Publications (1)

Publication Number Publication Date
CN111064699A true CN111064699A (en) 2020-04-24

Family

ID=70298436

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911022498.0A Pending CN111064699A (en) 2019-10-25 2019-10-25 Client management method, device and storage medium

Country Status (1)

Country Link
CN (1) CN111064699A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101296081A (en) * 2007-04-29 2008-10-29 华为技术有限公司 Authentication, method, system, access body and device for distributing IP address after authentication
CN101350809A (en) * 2007-07-19 2009-01-21 华为技术有限公司 Method and system for implementing authentication
CN102404230A (en) * 2011-12-15 2012-04-04 杭州华三通信技术有限公司 Flow control method and device
CN109302388A (en) * 2018-09-19 2019-02-01 平安科技(深圳)有限公司 Access authority filter method, system, computer equipment and storage medium
CN109977644A (en) * 2019-04-03 2019-07-05 山东超越数控电子股份有限公司 Right management method is classified under a kind of Android platform

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101296081A (en) * 2007-04-29 2008-10-29 华为技术有限公司 Authentication, method, system, access body and device for distributing IP address after authentication
CN101350809A (en) * 2007-07-19 2009-01-21 华为技术有限公司 Method and system for implementing authentication
CN102404230A (en) * 2011-12-15 2012-04-04 杭州华三通信技术有限公司 Flow control method and device
CN109302388A (en) * 2018-09-19 2019-02-01 平安科技(深圳)有限公司 Access authority filter method, system, computer equipment and storage medium
CN109977644A (en) * 2019-04-03 2019-07-05 山东超越数控电子股份有限公司 Right management method is classified under a kind of Android platform

Similar Documents

Publication Publication Date Title
US9867051B2 (en) System and method of verifying integrity of software
US8590052B2 (en) Enabling granular discretionary access control for data stored in a cloud computing environment
US9674174B2 (en) Configuration profile validation on IOS using SSL and redirect
US10341325B2 (en) System and method for transferring device identifying information
US10944738B2 (en) Single sign-on for managed mobile devices using kerberos
US10084788B2 (en) Peer to peer enterprise file sharing
US9077725B2 (en) Configuration profile validation on iOS based on root certificate validation
US9037849B2 (en) System and method for managing network access based on a history of a certificate
WO2017003945A1 (en) Distributing an authentication key to an application installation
US20180285172A1 (en) Data exchange between applications
US20150089632A1 (en) Application authentication checking system
CN107396364B (en) Method and equipment for carrying out wireless connection pre-authorization on user equipment
US11695747B2 (en) Multi-device single sign-on
US11290270B2 (en) Systems and methods for enhanced internet of things digital certificate security
CN110765449A (en) Identity authentication method, equipment and medium based on security chip
EP3704622B1 (en) Remote locking a multi-user device to a set of users
CN107396362B (en) Method and equipment for carrying out wireless connection pre-authorization on user equipment
CN114117551B (en) Access verification method and device
CN116325654B (en) Tenant aware mutual TLS authentication
CN110912865A (en) Security access control method, server and electronic equipment
CN111182527A (en) OTA firmware upgrading method, device, terminal equipment and storage medium thereof
CN111064699A (en) Client management method, device and storage medium
CN117882337A (en) Certificate revocation as a service at a data center
KR101518994B1 (en) Method, module, server, and system for authorizing permissions to use pc
US11962594B2 (en) Blockchain for access control

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200424