CN111148102A - Network authentication method, device, computer equipment and storage medium - Google Patents
Network authentication method, device, computer equipment and storage medium Download PDFInfo
- Publication number
- CN111148102A CN111148102A CN201911407693.5A CN201911407693A CN111148102A CN 111148102 A CN111148102 A CN 111148102A CN 201911407693 A CN201911407693 A CN 201911407693A CN 111148102 A CN111148102 A CN 111148102A
- Authority
- CN
- China
- Prior art keywords
- authentication
- priority
- authentication parameter
- network
- base station
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 70
- 238000004891 communication Methods 0.000 claims abstract description 96
- 230000002159 abnormal effect Effects 0.000 claims abstract description 21
- 238000012544 monitoring process Methods 0.000 claims abstract description 15
- 238000004590 computer program Methods 0.000 claims description 14
- 238000010295 mobile communication Methods 0.000 description 10
- 238000010586 diagram Methods 0.000 description 8
- 230000008569 process Effects 0.000 description 5
- 230000000694 effects Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000004904 shortening Methods 0.000 description 2
- 230000001360 synchronised effect Effects 0.000 description 2
- 238000011161 development Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention relates to a network authentication method, a network authentication device, computer equipment and a storage medium. The method comprises the following steps: monitoring the communication state of a communication link between a base station and a server; if the communication state is abnormal, executing authentication operation, wherein the authentication operation comprises the following steps: selecting an authentication parameter with the highest preset priority from the authentication parameter set, and performing network authentication on a communication link between the base station and the server; if the authentication is unsuccessful, updating the priority of each authentication parameter in the authentication parameter set, and continuing to execute the authentication operation based on the updated priority of each authentication parameter in the authentication parameter set until the authentication is successful. Compared with the existing network authentication method which needs manual intervention and manual operation, the network authentication method provided by the application greatly shortens the time for recovering the link when the network is interrupted between the base station and the server, thereby ensuring the stability of network operation.
Description
Technical Field
The present application relates to the field of mobile communications technologies, and in particular, to a network authentication method, apparatus, computer device, and storage medium.
Background
With the development of mobile communication network technology and the increasing number of users of mobile communication network, the coverage area of the communication network is wider and wider, the requirements on network security and stability are higher and higher, and how to simultaneously ensure the security and stability of the mobile communication network becomes a key problem of the existing network architecture.
The mobile communication network usually adopts a network authentication method to ensure the security of the network, and the network authentication method refers to which encryption mode is selected by the base station when the base station establishes a network communication link with the service end, for example, the existing authentication method includes authentication modes such as pre-sharing a key, digital signature, public key encryption and the like. The existing network authentication method is that a base station only selects one authentication method to ensure the safe use of the mobile communication network when accessing the mobile communication network, or manually selects different authentication methods to ensure the safe use of the mobile communication network.
However, the above authentication method has difficulty in ensuring the stability and reliability of the mobile communication network.
Disclosure of Invention
In view of the above, it is necessary to provide a network authentication method, apparatus, computer device and storage medium capable of effectively ensuring the stability and reliability of a mobile communication network.
In a first aspect, a method for network authentication, the method comprising:
monitoring the communication state of a communication link between a base station and a server;
if the communication state is abnormal, executing authentication operation, wherein the authentication operation comprises the following steps: selecting an authentication parameter with the highest preset priority from the authentication parameter set, and performing network authentication on a communication link between the base station and the server;
if the authentication is unsuccessful, updating the priority of each authentication parameter in the authentication parameter set, and continuing to execute the authentication operation based on the updated priority of each authentication parameter in the authentication parameter set until the authentication is successful.
In one embodiment, updating the priority of each authentication parameter in the authentication parameter set includes:
and adjusting the priority of the authentication parameters which are not successfully authenticated in the authentication parameter set to be the lowest priority.
In one embodiment, updating the priority of each authentication parameter in the authentication parameter set includes:
acquiring authentication information related to a server;
determining authentication parameters matched with the authentication information related to the server from the authentication parameter set;
and adjusting the priority of the authentication parameters matched with the authentication information to be the highest priority.
In one embodiment, before selecting the authentication parameter with the highest preset priority from the authentication parameter set and performing network authentication on the communication link between the base station and the server, the method further includes:
acquiring an authentication parameter set from a database;
and adjusting the priority of each authentication parameter according to the use frequency of each authentication parameter in the authentication parameter set.
In one embodiment, after the authentication is unsuccessful, the method further comprises:
acquiring a preset state of a change-over switch, wherein the state of the change-over switch is used for indicating whether to execute authentication operation or not;
and if the state of the change-over switch is open, continuing to execute the authentication operation.
In one embodiment, if the state of the switch is closed, the communication link between the base station and the server is authenticated by using the authentication parameter with the highest initial priority in the authentication parameter set.
In one embodiment, if the authentication is successful, a communication link between the base station and the server is established, and the priority of each authentication parameter in the authentication parameter set is updated.
In a second aspect, a network authentication apparatus, the apparatus comprising:
the monitoring module is used for monitoring the communication state of a communication link between the base station and the server;
an execution module, configured to execute an authentication operation if the communication status is abnormal, where the authentication operation includes: selecting an authentication parameter with the highest preset priority from the authentication parameter set, and performing network authentication on a communication link between the base station and the server;
and the switching module is used for updating the priority of each authentication parameter in the authentication parameter set if the authentication is unsuccessful, and continuously executing the authentication operation based on the updated priority of each authentication parameter in the authentication parameter set until the authentication is successful.
In a third aspect, a computer device includes a memory and a processor, where the memory stores a computer program, and the processor implements the network authentication method according to any embodiment of the first aspect when executing the computer program.
In a fourth aspect, a computer-readable storage medium has stored thereon a computer program which, when executed by a processor, implements the network authentication method of any of the embodiments of the first aspect.
The application provides a network authentication method, a device, a computer device and a storage medium, comprising: monitoring the communication state of a communication link between a base station and a server; if the communication state is abnormal, executing authentication operation, wherein the authentication operation comprises the following steps: selecting an authentication parameter with the highest preset priority from the authentication parameter set, and performing network authentication on a communication link between the base station and the server; if the authentication is unsuccessful, updating the priority of each authentication parameter in the authentication parameter set, and continuing to execute the authentication operation based on the updated priority of each authentication parameter in the authentication parameter set until the authentication is successful. In the above network authentication method, when the communication link between the base station and the server is abnormal, the base station may automatically select the corresponding authentication parameter to re-perform the network authentication on the communication link, and re-select the new authentication parameter to perform the network authentication under the condition that the authentication is unsuccessful until the authentication is successful. Compared with the existing network authentication method which needs manual intervention and manual operation, the network authentication method provided by the application greatly shortens the time for recovering the link when the network is interrupted between the base station and the server, thereby ensuring the network operation safety and improving the stability of the network operation. In addition, when the authentication is unsuccessful, the priority of each authentication parameter in the authentication parameter set is updated, so that the priority of each authentication parameter is more in line with the practical application situation, and when new authentication parameters are selected again for network authentication, the selected authentication parameters are all the authentication parameters with the highest priority, which is equivalent to the authentication parameters used in network authentication each time more in line with the practical application requirements, therefore, the authentication parameters with the highest priority are used for authentication each time, the success rate of authentication performed later is improved, and the operation efficiency of the base station accessing the network is improved.
Drawings
FIG. 1 is a schematic diagram of an application environment, provided by an embodiment;
fig. 2 is a flowchart of a network authentication method according to an embodiment;
fig. 3 is a flowchart of a network authentication method according to an embodiment;
fig. 4 is a flowchart of a network authentication method according to an embodiment;
fig. 5 is a flowchart of a network authentication method according to an embodiment;
fig. 6 is a flowchart of a network authentication method according to an embodiment;
fig. 7 is a schematic structural diagram of a network authentication device according to an embodiment;
fig. 8 is a schematic structural diagram of a network authentication device according to an embodiment;
fig. 9 is a schematic structural diagram of a network authentication device according to an embodiment;
fig. 10 is a schematic structural diagram of a network authentication device according to an embodiment;
fig. 11 is a schematic internal structural diagram of a computer device according to an embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The network authentication method provided by the present application can be applied to the application environment shown in fig. 1, in which a base station and a server are connected through a network. The server may be implemented by an independent server or a server cluster composed of a plurality of servers, and the base station may be various types of base stations, for example, a macro base station, a micro base station, a femtocell base station, and the like.
The following describes in detail the technical solutions of the present application and how the technical solutions of the present application solve the above technical problems by embodiments and with reference to the drawings. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments.
Fig. 2 is a flowchart of a network authentication method according to an embodiment, where an execution subject of the method is the base station in fig. 1, and the method relates to a specific process of the base station performing network authentication before establishing a communication link with a server. As shown in fig. 2, the method specifically includes the following steps:
s101, monitoring the communication state of a communication link between the base station and the server.
The communication state is used for indicating whether a communication link between the base station and the server is normal or not, and mainly comprises two communication states, namely abnormal communication link between the base station and the server and normal communication link between the base station and the server. In this embodiment, the base station may monitor, in real time, a communication state of the communication link between the base station and the server through a monitoring software system of the base station, so as to check whether the network link between the base station and the server is abnormal, and optionally, the base station may also monitor, periodically, the communication state of the communication link between the base station and the server, so as to check whether the network link between the base station and the server is abnormal. It should be noted that, in practical application, the server may include different types of servers for managing related services of the base station and providing network services of the base station, such as a gateway server, a core network server, and a security management server, or may be a server cluster, which is not limited in this embodiment.
S102, if the communication state is abnormal, executing authentication operation, wherein the authentication operation comprises the following steps: and selecting the authentication parameter with the highest preset priority from the authentication parameter set, and performing network authentication on the communication link between the base station and the server.
The authentication parameter set comprises authentication parameters corresponding to various types of authentication algorithms, and the priority of each authentication parameter in the authentication parameter set can be determined in advance by the base station according to the actual application requirements. The embodiment relates to a scene that the communication state of a communication link between a base station and a server is abnormal, and when the base station monitors that the communication state of the communication link between the base station and the server is abnormal, network authentication can be performed again, and specifically, authentication operation is performed to ensure the security of the base station re-accessing the network. The process of the authentication operation includes: the base station selects the authentication parameter with the highest priority from the preset authentication parameter set, and then the communication link between the base station and the server is authenticated by using the authentication parameter with the highest priority. The authentication parameter with the highest priority may be the authentication parameter which is used most frequently in practical application, or the authentication parameter which is matched with the server. The authentication parameter with the highest priority is used for network authentication, so that the success rate of the network authentication with the server can be improved, and the network access efficiency of the base station is improved.
S103, if the authentication is unsuccessful, updating the priority of each authentication parameter in the authentication parameter set, and continuing to execute the authentication operation based on the updated priority of each authentication parameter in the authentication parameter set until the authentication is successful.
When the base station executes the authentication operation to perform network authentication, the authentication may be successful or unsuccessful; if the authentication is unsuccessful, the base station can further update the priority of each authentication parameter in the authentication parameter set, and continuously execute the authentication operation based on the priority of each authentication parameter in the updated authentication parameter set, namely, newly select the authentication parameter with the highest priority from the updated authentication parameter set for network authentication, if the authentication is unsuccessful, continuously update the priority of each authentication parameter in the authentication parameter set, and then continuously execute the authentication operation until the authentication is successful.
For example, a first authentication operation is performed based on a first authentication parameter; if the first authentication is unsuccessful, performing a second authentication operation based on a second authentication parameter; and if the second authentication is unsuccessful, performing third authentication operation based on the third authentication parameter, and executing until the authentication is successful. The first authentication parameter is originally the authentication parameter with the highest priority in the authentication parameter set, when the first authentication is unsuccessful, the priority of each authentication parameter in the authentication parameter set is updated, the priority of the first authentication parameter is adjusted to be the lowest priority, the priority of the second authentication parameter with the initial priority ranked on the second is adjusted to be the highest priority, then the second authentication operation is carried out based on the second authentication parameter, when the second authentication is unsuccessful, the priority of each authentication parameter in the authentication parameter set is updated, the priority of the second authentication parameter is adjusted to be the lowest priority, the priority of the third authentication parameter with the initial priority ranked on the third is adjusted to be the highest priority, then the third authentication operation is carried out based on the third authentication parameter, and the like, and the authentication is carried out until the authentication is successful.
The network authentication method provided by the embodiment comprises the following steps: monitoring the communication state of a communication link between a base station and a server; if the communication state is abnormal, executing authentication operation, wherein the authentication operation comprises the following steps: selecting an authentication parameter with the highest preset priority from the authentication parameter set, and performing network authentication on a communication link between the base station and the server; if the authentication is unsuccessful, updating the priority of each authentication parameter in the authentication parameter set, and continuing to execute the authentication operation based on the updated priority of each authentication parameter in the authentication parameter set until the authentication is successful. In the above network authentication method, when the communication link between the base station and the server is abnormal, the base station may automatically select the corresponding authentication parameter to re-perform the network authentication on the communication link, and re-select the new authentication parameter to perform the network authentication under the condition that the authentication is unsuccessful until the authentication is successful. Compared with the existing network authentication method which needs manual intervention and manual operation, the network authentication method provided by the application greatly shortens the time for recovering the link when the network is interrupted between the base station and the server, thereby ensuring the network operation safety and improving the stability of the network operation. In addition, when the authentication is unsuccessful, the priority of each authentication parameter in the authentication parameter set is updated, so that the priority of each authentication parameter is more in line with the practical application situation, and when new authentication parameters are selected again for network authentication, the selected authentication parameters are all the authentication parameters with the highest priority, which is equivalent to the authentication parameters used in network authentication each time more in line with the practical application requirements, therefore, the authentication parameters with the highest priority are used for authentication each time, the success rate of authentication performed later is improved, and the operation efficiency of the base station accessing the network is improved.
The present application provides a specific implementation manner of "updating the priority of each authentication parameter in the authentication parameter set" in the above S103, which may specifically include the following steps: and adjusting the priority of the authentication parameters which are not successfully authenticated in the authentication parameter set to be the lowest priority.
The embodiment relates to a specific implementation mode for updating the priority of each authentication parameter in an authentication parameter set by a base station, which specifically comprises the following steps: the base station authenticates by using the authentication parameter with the highest priority in the authentication parameter set, and after the authentication is unsuccessful, it indicates that the currently used authentication parameter is not matched with the server to be connected with the communication link, the priority of the currently used authentication parameter needs to be redefined, and specifically, the priority of the authentication parameter with the unsuccessful authentication is adjusted to the level with the lowest priority in the authentication parameter set, so that the base station can try to re-authenticate by using other authentication parameters with high priority, and the subsequent communication connection is facilitated.
The present application further provides another specific implementation manner of "updating the priority of each authentication parameter in the authentication parameter set" in the above S103, as shown in fig. 3, the method specifically includes the following steps:
s201, obtaining authentication information related to the server.
Wherein the authentication information represents any information related to an authentication algorithm, and the authentication information related to the server represents any information related to an authentication algorithm suitable for hardware or software configuration of the server. When the base station needs to update the priority of each authentication parameter in the authentication parameter set, the authentication information related to the server can be obtained by analyzing the hardware or software configuration parameters of the server which is ready to establish connection with the base station, so that the priority of each authentication parameter in the authentication parameter set can be updated according to the authentication information.
S202, determining authentication parameters matched with the authentication information related to the server from the authentication parameter set.
When the base station acquires the authentication information related to the server, the base station may further analyze the authentication information, determine an authentication parameter matching the authentication information from the authentication parameter set, or determine an authentication parameter with the highest matching degree with the authentication information for later use.
S203, the priority of the authentication parameters matched with the authentication information is adjusted to be the highest priority.
When the base station determines the authentication parameters matched with the authentication information related to the server from the authentication parameter set or determines the authentication parameters with the highest matching degree with the authentication information from the authentication parameter set, the matched authentication parameters or the priority of the authentication parameters with the highest matching degree can be adjusted to the highest priority in the authentication parameter set, so that the selected authentication parameters are the authentication parameters with the highest priority when the base station needs to reselect the authentication parameters for authentication after authentication is unsuccessful every time, and the used authentication parameters are the authentication parameters which are the most matched with the server when the base station tries authentication every time, thereby greatly improving the success rate of authentication, shortening the operation time of recovering a communication link between the base station and the server, and further improving the operation efficiency.
The embodiment relates to another specific implementation mode for updating the priority of each authentication parameter in the authentication parameter set by the base station, and the mode updates the priority of each authentication parameter according to the authentication information related to the server, so that the authentication parameter with the highest priority in the updated authentication parameter set better meets the actual application requirement, namely, is better matched with the authentication information of the server, thereby improving the authentication success rate when authentication is carried out according to the authentication parameter matched with the authentication information, shortening the operation time of recovering a communication link between the base station and the server, and further improving the operation efficiency.
In an application scenario, before the network authentication is performed by the base station, the present application further provides a method for determining priorities of the authentication parameters in the authentication parameter set, that is, before "selecting the authentication parameter with the highest preset priority from the authentication parameter set and performing the network authentication on the communication link between the base station and the server" in the above S102, as shown in fig. 4, the method implemented in fig. 2 further includes:
s301, acquiring an authentication parameter set from a database.
The base station may obtain the authentication parameter set from a local database, or may obtain the authentication parameter set from another database. The authentication parameter set comprises various types of authentication parameters, and the priority of each authentication parameter in the authentication parameter set can be dynamically adjusted.
S302, adjusting the priority of each authentication parameter according to the use frequency of each authentication parameter in the authentication parameter set.
After the base station obtains the authentication parameter set, the priority of each authentication parameter can be adjusted according to the use frequency of each authentication parameter in practical application, and specifically, the priority of the authentication parameter with the highest use frequency is determined as the highest priority, that is, the priorities of the corresponding authentication parameters are arranged according to the sequence from high to low of the use frequency. It should be noted that the higher the use frequency, the stronger the applicability of the authentication parameter representing the authentication parameter, and the higher the success rate of authentication using the authentication parameter representing the authentication parameter, which is higher, of various types of servers, can be better satisfied, and therefore, when the base station selects the authentication parameter with the highest priority for authentication, the selected authentication parameter is the authentication parameter with the highest success rate for authentication, and the operation efficiency of authentication can be improved.
In practical application products, when the base station performs network authentication, the authentication may be successful or may not be successful, and in the context of application that the authentication is unsuccessful, the present application provides a switch for indicating whether to perform an authentication operation, and provides an interface for a user to perform authentication manually, so that, when the base station performs the step S103, after "if the authentication is unsuccessful" in the step, as shown in fig. 5, the step may further include:
s401, acquiring a preset state of a change-over switch; the state of the switch is used to indicate whether to execute the authentication operation, if the state of the switch is on, step S402 is executed, and if the state of the switch is off, step S403 is executed
The state of the switch includes on and off, and if the state of the switch is on, it indicates that the base station may perform the authentication operation described in the embodiment of fig. 2, and if the state of the switch is off, it indicates that the base station does not perform the authentication operation described in the embodiment of fig. 2. The embodiment is a judgment step, that is, when the base station performs authentication before, and the authentication is unsuccessful, whether to execute the authentication operation can be further selected according to the state of the switch. The state of the switch can be set by the base station in advance according to the requirements of the user, when the switch is set to be in an on state, the base station has the function of automatically switching other types of authentication parameters for authentication, and when the switch is set to be in an off state, the base station does not need to switch other types of authentication parameters for authentication. In practical application, a user can set the state of the switch in a manual mode, so that the configuration of the authentication function of the base station is realized, and the flexibility of the network authentication method of the base station is improved.
S402, continuing to execute the authentication operation.
In this embodiment, the base station directly performs the authentication operation described in the embodiment of fig. 2 in an application scenario in which the state of the switch is on, that is, switches new authentication parameters again to perform network authentication on the communication link again.
And S403, performing network authentication on the communication link between the base station and the server by using the authentication parameter with the highest initial priority in the authentication parameter set.
The present embodiment relates to an application scenario when the state of the switch is off, in which a base station directly uses an authentication parameter with the highest initial priority in an authentication parameter set to attempt to re-perform network authentication on a communication link between the base station and a server. The authentication parameter with the highest initial priority is the authentication parameter used in the previous authentication and is not changed, so that the base station always uses one type of authentication parameter to perform network authentication on a communication link between the base station and the server in the application scene.
In an embodiment, when the base station completes the step of S102, if the authentication is successful, the base station may directly establish a communication link between the base station and the server, and update the priority of each authentication parameter in the authentication parameter set.
The embodiment relates to another application scenario, that is, a base station monitors a communication state of a communication link between the base station and a server, if the communication state is abnormal, an authentication operation is performed, and if the authentication is successful, the base station may directly establish the communication link between the base station and the server, for example, establish a backhaul channel, perform data interaction and network communication, and the like. Meanwhile, the base station needs to update the priority of each authentication parameter in the authentication parameter set, and particularly adjusts the priority of the currently used authentication parameter to the highest priority in the authentication parameter set, so that the communication link is abnormal later, and the authentication parameter is preferentially considered for authentication when re-authentication is needed, so that the authentication success rate and the authentication operation efficiency are improved.
In summary, the present application provides a method for network authentication, as shown in fig. 6, the method includes:
s501, monitoring the communication state of a communication link between the base station and the server.
S502, if the communication state is abnormal, executing authentication operation, wherein the authentication operation comprises the following steps: and selecting the authentication parameter with the highest priority in the preset authentication parameter set, and performing network authentication on the communication link between the base station and the server.
S503, judging whether the authentication is successful, if the authentication is successful, executing the step S504, and if the authentication is unsuccessful, executing the step S505.
S504, a communication link between the base station and the server is established, and the priority of each authentication parameter in the authentication parameter set is updated.
And S505, acquiring the state of a preset change-over switch.
S506, determining whether the state of the switch is on, if the state of the switch is on, executing step S507, and if the state of the switch is off, executing step S508.
S507, updating the priority of each authentication parameter in the authentication parameter set, and repeatedly executing the authentication operation based on the updated priority of each authentication parameter in the authentication parameter set until the authentication is successful.
And S508, performing network authentication on the communication link between the base station and the server by using the authentication parameter with the highest initial priority in the authentication parameter set.
For the explanation of the above steps, refer to the description of the previous embodiment, and the description will not be repeated here. The network authentication method provided by the application realizes the method for automatically selecting the corresponding authentication parameters for authentication when the communication link between the base station and the server is abnormal or needs to be established, does not need manual intervention for authentication, greatly saves the labor cost and simultaneously improves the operation efficiency of the base station accessing the network.
It should be understood that although the various steps in the flow charts of fig. 2-6 are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least some of the steps in fig. 2-6 may include multiple sub-steps or phases that are not necessarily performed at the same time, but may be performed at different times, and the order of performance of the sub-steps or phases is not necessarily sequential.
In one embodiment, as shown in fig. 7, there is provided a network authentication apparatus, including: monitoring module 11, execution module 12 and switching module 13, wherein:
a monitoring module 11, configured to monitor a communication state of a communication link between a base station and a server;
an executing module 12, configured to execute an authentication operation if the communication status is abnormal, where the authentication operation includes: selecting an authentication parameter with the highest preset priority from the authentication parameter set, and performing network authentication on a communication link between the base station and the server;
and the switching module 13 is configured to update the priority of each authentication parameter in the authentication parameter set if the authentication is unsuccessful, and continue to perform the authentication operation based on the updated priority of each authentication parameter in the authentication parameter set until the authentication is successful.
In an embodiment, the switching module 13 is specifically configured to adjust the priority of the authentication parameter with unsuccessful authentication in the authentication parameter set to be the lowest priority.
In one embodiment, as shown in fig. 8, the switching module 13 includes:
a first obtaining unit 131, configured to obtain authentication information related to a server;
a determining unit 132, configured to determine an authentication parameter matching the authentication information related to the server from the authentication parameter set;
an adjusting unit 133, configured to adjust the priority of the authentication parameter matching the authentication information to be the highest priority.
In one embodiment, as shown in fig. 9, the network authentication apparatus further includes: an acquisition module 14 and a determination module 15, wherein:
an obtaining module 14, configured to obtain an authentication parameter set from a database;
the determining module 15 is configured to adjust the priority of each authentication parameter according to the use frequency of each authentication parameter in the authentication parameter set.
In an embodiment, as shown in fig. 10, the switching module 13 further includes:
a second obtaining unit 134, configured to obtain a preset state of a switch, where the state of the switch is used to indicate whether to perform an authentication operation;
the first execution unit 135 is configured to continue to execute the authentication operation if the state of the switch is on.
A second executing unit 136, configured to perform network authentication on the communication link between the base station and the server by using the authentication parameter with the highest initial priority in the authentication parameter set if the state of the switch is closed.
In an embodiment, the switching module 13 is specifically configured to establish a communication link between the base station and the server if the authentication is successful, and update the priority of each authentication parameter in the authentication parameter set.
For the specific definition of the network authentication device, refer to the above definition of a network authentication method, which is not described herein again. The modules in the network authentication device can be wholly or partially implemented by software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a terminal, and its internal structure diagram may be as shown in fig. 11. The computer device includes a processor, a memory, a network interface, a display screen, and an input device connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a network authentication method. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, a key, a track ball or a touch pad arranged on the shell of the computer equipment, an external keyboard, a touch pad or a mouse and the like.
Those skilled in the art will appreciate that the architecture shown in fig. 11 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer device is provided, comprising a memory and a processor, the memory having a computer program stored therein, the processor implementing the following steps when executing the computer program:
monitoring the communication state of a communication link between a base station and a server;
if the communication state is abnormal, executing authentication operation, wherein the authentication operation comprises the following steps: selecting an authentication parameter with the highest preset priority from the authentication parameter set, and performing network authentication on a communication link between the base station and the server;
if the authentication is unsuccessful, updating the priority of each authentication parameter in the authentication parameter set, and continuing to execute the authentication operation based on the updated priority of each authentication parameter in the authentication parameter set until the authentication is successful.
The implementation principle and technical effect of the computer device provided by the above embodiment are similar to those of the above method embodiment, and are not described herein again.
In one embodiment, a computer-readable storage medium is provided, having a computer program stored thereon, the computer program, when executed by a processor, further implementing the steps of:
monitoring the communication state of a communication link between a base station and a server;
if the communication state is abnormal, executing authentication operation, wherein the authentication operation comprises the following steps: selecting an authentication parameter with the highest preset priority from the authentication parameter set, and performing network authentication on a communication link between the base station and the server;
if the authentication is unsuccessful, updating the priority of each authentication parameter in the authentication parameter set, and continuing to execute the authentication operation based on the updated priority of each authentication parameter in the authentication parameter set until the authentication is successful.
The implementation principle and technical effect of the computer-readable storage medium provided by the above embodiments are similar to those of the above method embodiments, and are not described herein again.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), synchronous Link (Synchlink) DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and bus dynamic RAM (RDRAM).
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present invention, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the inventive concept, which falls within the scope of the present invention. Therefore, the protection scope of the present patent shall be subject to the appended claims.
Claims (10)
1. A method of network authentication, the method comprising:
monitoring the communication state of a communication link between a base station and a server;
if the communication state is abnormal, executing authentication operation, wherein the authentication operation comprises the following steps: selecting an authentication parameter with the highest preset priority from the authentication parameter set, and performing network authentication on a communication link between the base station and the server;
if the authentication is unsuccessful, updating the priority of each authentication parameter in the authentication parameter set, and continuing to execute the authentication operation based on the updated priority of each authentication parameter until the authentication is successful.
2. The network authentication method of claim 1, wherein the updating the priority of each authentication parameter in the authentication parameter set comprises:
and adjusting the priority of the authentication parameters which are unsuccessfully authenticated in the authentication parameter set to be the lowest priority.
3. The network authentication method of claim 1, wherein the updating the priority of each authentication parameter in the authentication parameter set comprises:
acquiring authentication information related to the server;
determining authentication parameters matched with the authentication information related to the server from the authentication parameter set;
and adjusting the priority of the authentication parameters matched with the authentication information to be the highest priority.
4. The network authentication method as claimed in claim 1, wherein before the selecting the authentication parameter with the highest preset priority from the authentication parameter set and performing network authentication on the communication link between the base station and the server, the method further comprises:
acquiring the authentication parameter set from a database;
and adjusting the priority of each authentication parameter according to the use frequency of each authentication parameter in the authentication parameter set.
5. The network authentication method of claim 1, wherein after the authentication is unsuccessful, the method further comprises:
acquiring a preset state of a change-over switch, wherein the state of the change-over switch is used for indicating whether to execute the authentication operation;
and if the state of the change-over switch is open, continuing to execute the authentication operation.
6. The network authentication method of claim 5, wherein if the state of the switch is closed, the authentication parameter with the highest initial priority in the authentication parameter set is used to perform network authentication on the communication link between the base station and the server.
7. The method according to claim 1, wherein if the authentication is successful, establishing a communication link between the base station and the server, and updating the priority of each authentication parameter in the authentication parameter set.
8. A network authentication apparatus, the apparatus comprising:
the monitoring module is used for monitoring the communication state of a communication link between the base station and the server;
an executing module, configured to execute an authentication operation if the communication status is disconnected, where the authentication operation includes: selecting an authentication parameter with the highest preset priority from the authentication parameter set, and performing network authentication on a communication link between the base station and the server;
and the switching module is used for updating the priority of each authentication parameter in the authentication parameter set if the authentication is unsuccessful, and continuously executing the authentication operation based on the updated priority of each authentication parameter in the authentication parameter set until the authentication is successful.
9. A computer device comprising a memory and a processor, the memory storing a computer program, wherein the processor implements the steps of the method of any one of claims 1 to 7 when executing the computer program.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911407693.5A CN111148102B (en) | 2019-12-31 | 2019-12-31 | Network authentication method, device, computer equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911407693.5A CN111148102B (en) | 2019-12-31 | 2019-12-31 | Network authentication method, device, computer equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111148102A true CN111148102A (en) | 2020-05-12 |
CN111148102B CN111148102B (en) | 2024-01-30 |
Family
ID=70522416
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911407693.5A Active CN111148102B (en) | 2019-12-31 | 2019-12-31 | Network authentication method, device, computer equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111148102B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112203316A (en) * | 2020-09-30 | 2021-01-08 | Oppo(重庆)智能科技有限公司 | Method and device for recovering network abnormity, electronic equipment and storage medium |
Citations (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101001145A (en) * | 2006-01-11 | 2007-07-18 | 华为技术有限公司 | Authentication method for support terminal roaming of non-IP multimedia service subsystem |
WO2007131455A1 (en) * | 2006-05-11 | 2007-11-22 | Huawei Technologies Co., Ltd. | Method, system and apparatus for realizing key synchronization between control plane and user plane |
WO2008025280A1 (en) * | 2006-08-24 | 2008-03-06 | Huawei Technologies Co., Ltd. | A method and system of authentication |
US20090063716A1 (en) * | 2007-08-27 | 2009-03-05 | Hewlett-Packard Development Company, L.P. | Prioritising Data Processing Operations |
CN101730155A (en) * | 2009-04-30 | 2010-06-09 | 中兴通讯股份有限公司 | System and method for performing resource control on user |
US20110246201A1 (en) * | 2010-04-06 | 2011-10-06 | Hawit Andre F | System for providing audio messages on a mobile device |
CN104125567A (en) * | 2014-07-30 | 2014-10-29 | 京信通信系统(中国)有限公司 | Femto and authentication method and authentication device for access of femto to network side |
CN104796965A (en) * | 2015-03-19 | 2015-07-22 | 四川长虹电器股份有限公司 | Method for controlling AP connection priority under WiFi environment |
CN105391803A (en) * | 2015-12-15 | 2016-03-09 | 腾讯科技(深圳)有限公司 | Message pushing method and device |
CN105764054A (en) * | 2016-02-04 | 2016-07-13 | 中国联合网络通信集团有限公司 | Method for network detection based on embedded intelligent card and terminal thereof |
CN105792204A (en) * | 2016-02-29 | 2016-07-20 | 宇龙计算机通信科技(深圳)有限公司 | Network connection authentication method and device |
CN106507405A (en) * | 2016-12-13 | 2017-03-15 | 广东欧珀移动通信有限公司 | The abnormal processing method and processing device of network communicating function |
WO2018107892A1 (en) * | 2016-12-13 | 2018-06-21 | 广东欧珀移动通信有限公司 | Network-communication function exception processing method and processing apparatus, terminal device, and computer storage medium |
WO2018107895A1 (en) * | 2016-12-13 | 2018-06-21 | 广东欧珀移动通信有限公司 | Network-communication function exception processing method and processing apparatus, terminal device, and computer storage medium |
CN109412845A (en) * | 2018-10-11 | 2019-03-01 | 平安科技(深圳)有限公司 | Method, apparatus, computer equipment and the storage medium of equipment access network |
CN110225045A (en) * | 2019-06-18 | 2019-09-10 | 平安科技(深圳)有限公司 | Full link data method for authenticating, device, equipment and storage medium |
CN110351729A (en) * | 2019-07-15 | 2019-10-18 | 西安中兴物联软件有限公司 | Method, system, terminal and storage medium for automatically matching authentication parameters |
-
2019
- 2019-12-31 CN CN201911407693.5A patent/CN111148102B/en active Active
Patent Citations (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101001145A (en) * | 2006-01-11 | 2007-07-18 | 华为技术有限公司 | Authentication method for support terminal roaming of non-IP multimedia service subsystem |
WO2007131455A1 (en) * | 2006-05-11 | 2007-11-22 | Huawei Technologies Co., Ltd. | Method, system and apparatus for realizing key synchronization between control plane and user plane |
WO2008025280A1 (en) * | 2006-08-24 | 2008-03-06 | Huawei Technologies Co., Ltd. | A method and system of authentication |
US20090063716A1 (en) * | 2007-08-27 | 2009-03-05 | Hewlett-Packard Development Company, L.P. | Prioritising Data Processing Operations |
CN101730155A (en) * | 2009-04-30 | 2010-06-09 | 中兴通讯股份有限公司 | System and method for performing resource control on user |
US20110246201A1 (en) * | 2010-04-06 | 2011-10-06 | Hawit Andre F | System for providing audio messages on a mobile device |
CN104125567A (en) * | 2014-07-30 | 2014-10-29 | 京信通信系统(中国)有限公司 | Femto and authentication method and authentication device for access of femto to network side |
CN104796965A (en) * | 2015-03-19 | 2015-07-22 | 四川长虹电器股份有限公司 | Method for controlling AP connection priority under WiFi environment |
CN105391803A (en) * | 2015-12-15 | 2016-03-09 | 腾讯科技(深圳)有限公司 | Message pushing method and device |
CN105764054A (en) * | 2016-02-04 | 2016-07-13 | 中国联合网络通信集团有限公司 | Method for network detection based on embedded intelligent card and terminal thereof |
CN105792204A (en) * | 2016-02-29 | 2016-07-20 | 宇龙计算机通信科技(深圳)有限公司 | Network connection authentication method and device |
CN106507405A (en) * | 2016-12-13 | 2017-03-15 | 广东欧珀移动通信有限公司 | The abnormal processing method and processing device of network communicating function |
WO2018107892A1 (en) * | 2016-12-13 | 2018-06-21 | 广东欧珀移动通信有限公司 | Network-communication function exception processing method and processing apparatus, terminal device, and computer storage medium |
WO2018107895A1 (en) * | 2016-12-13 | 2018-06-21 | 广东欧珀移动通信有限公司 | Network-communication function exception processing method and processing apparatus, terminal device, and computer storage medium |
CN109412845A (en) * | 2018-10-11 | 2019-03-01 | 平安科技(深圳)有限公司 | Method, apparatus, computer equipment and the storage medium of equipment access network |
CN110225045A (en) * | 2019-06-18 | 2019-09-10 | 平安科技(深圳)有限公司 | Full link data method for authenticating, device, equipment and storage medium |
CN110351729A (en) * | 2019-07-15 | 2019-10-18 | 西安中兴物联软件有限公司 | Method, system, terminal and storage medium for automatically matching authentication parameters |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112203316A (en) * | 2020-09-30 | 2021-01-08 | Oppo(重庆)智能科技有限公司 | Method and device for recovering network abnormity, electronic equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN111148102B (en) | 2024-01-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111866162B (en) | Service distribution method and device | |
CN103746812B (en) | A kind of access authentication method and system | |
CN105027529B (en) | Method and apparatus for verifying user's access to Internet resources | |
CN110944330A (en) | MEC platform deployment method and device | |
CN112822756B (en) | Communication method, system, base station and terminal | |
CN107094127A (en) | Processing method and processing device, acquisition methods and the device of security information | |
US10069738B2 (en) | One cellular radio to support multiple phone lines and data at a location | |
CN111031542B (en) | Base station opening method, device, communication equipment and storage medium | |
EP3079392A1 (en) | Method, apparatus and system for selecting authentication algorithm | |
CN110381149B (en) | Data distribution method and device and data synchronization method and device | |
CN113260006B (en) | Private network and public network switching method based on cloud communication and cloud communication terminal | |
US20240187865A1 (en) | Electronic subscriber identity module transfer eligibility checking | |
EP3306858B1 (en) | Network management system deployment method and device, and network management system | |
CN111148102A (en) | Network authentication method, device, computer equipment and storage medium | |
CN110636590A (en) | Hotspot list generation method and device, computer equipment and storage medium | |
CN112202917A (en) | Method and equipment for terminating multi-access edge computing service | |
CN116390096A (en) | Mobile hotspot access method, device, equipment and storage medium | |
CN114071651B (en) | Bluetooth-based network distribution method and device, computer equipment and readable storage medium | |
CN105791036A (en) | AP access detection method and device | |
CN114423007A (en) | Terminal access point determining method, terminal access point determining device, electronic equipment and storage medium | |
CN110519858B (en) | Channel access method, device, computer equipment and storage medium | |
CN107896370B (en) | Method and device for accessing network under failure weakening mode | |
CN113840313A (en) | Network mode control method and device of mobile terminal and computer equipment | |
CN110536480B (en) | Spectrum management method and device, computer equipment and storage medium | |
CN111194060A (en) | Data processing method, data processing device, computer equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: 510663 Shenzhou Road 10, Guangzhou Science City, Guangzhou economic and Technological Development Zone, Guangzhou, Guangdong Applicant after: Jingxin Network System Co.,Ltd. Address before: 510663 Shenzhou Road 10, Guangzhou Science City, Guangzhou economic and Technological Development Zone, Guangzhou, Guangdong Applicant before: COMBA TELECOM SYSTEMS (CHINA) Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |