CN111148102B - Network authentication method, device, computer equipment and storage medium - Google Patents

Network authentication method, device, computer equipment and storage medium Download PDF

Info

Publication number
CN111148102B
CN111148102B CN201911407693.5A CN201911407693A CN111148102B CN 111148102 B CN111148102 B CN 111148102B CN 201911407693 A CN201911407693 A CN 201911407693A CN 111148102 B CN111148102 B CN 111148102B
Authority
CN
China
Prior art keywords
authentication
priority
authentication parameter
server
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911407693.5A
Other languages
Chinese (zh)
Other versions
CN111148102A (en
Inventor
林振铝
黄金伙
黄文昌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Comba Network Systems Co Ltd
Original Assignee
Comba Network Systems Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Comba Network Systems Co Ltd filed Critical Comba Network Systems Co Ltd
Priority to CN201911407693.5A priority Critical patent/CN111148102B/en
Publication of CN111148102A publication Critical patent/CN111148102A/en
Application granted granted Critical
Publication of CN111148102B publication Critical patent/CN111148102B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to a network authentication method, a network authentication device, computer equipment and a storage medium. The method comprises the following steps: monitoring a communication state of a communication link between a base station and a server; if the communication state is abnormal, executing authentication operation, wherein the authentication operation comprises the following steps: selecting an authentication parameter with highest preset priority from the authentication parameter set, and carrying out network authentication on a communication link between the base station and the server; if the authentication is unsuccessful, updating the priority of each authentication parameter in the authentication parameter set, and continuing to execute the authentication operation based on the priority of each authentication parameter in the updated authentication parameter set until the authentication is successful. Compared with the existing network authentication method which needs manual intervention and manual operation, the network authentication method provided by the application greatly shortens the time of recovering a link when a network between a base station and a server is interrupted, thereby ensuring the stability of network operation.

Description

Network authentication method, device, computer equipment and storage medium
Technical Field
The present invention relates to the field of mobile communications technologies, and in particular, to a network authentication method, a device, a computer device, and a storage medium.
Background
With the development of mobile communication network technology and the increasing number of users of the mobile communication network, the coverage area of the communication network is wider and wider, the requirements on network security and stability are higher and higher, and how to ensure the security and stability of the mobile communication network at the same time becomes a key problem of the existing network architecture.
The mobile communication network generally adopts a network authentication method to ensure the security of the network, and the network authentication method refers to an encryption mode selected by a base station when the base station establishes a network communication link with a server, for example, the existing authentication method includes authentication and authentication modes such as pre-sharing a key, digital signature, public key encryption and the like. The existing network authentication method is that a base station only selects one authentication method to ensure the safe use of the mobile communication network when accessing the mobile communication network, or manually selects different authentication methods to ensure the safe use of the mobile communication network.
However, the above authentication method has difficulty in ensuring the stability and reliability of the mobile communication network.
Disclosure of Invention
In view of the foregoing, it is desirable to provide a network authentication method, apparatus, computer device, and storage medium that can effectively ensure the stability and reliability of a mobile communication network.
In a first aspect, a network authentication method, the method comprising:
monitoring a communication state of a communication link between a base station and a server;
if the communication state is abnormal, executing authentication operation, wherein the authentication operation comprises the following steps: selecting an authentication parameter with highest preset priority from the authentication parameter set, and carrying out network authentication on a communication link between the base station and the server;
if the authentication is unsuccessful, updating the priority of each authentication parameter in the authentication parameter set, and continuing to execute the authentication operation based on the priority of each authentication parameter in the updated authentication parameter set until the authentication is successful.
In one embodiment, updating the priority of each authentication parameter in the set of authentication parameters includes:
and adjusting the priority of the authentication parameters with unsuccessful authentication in the authentication parameter set to be the lowest priority.
In one embodiment, updating the priority of each authentication parameter in the set of authentication parameters includes:
acquiring authentication information related to a server;
determining authentication parameters matched with authentication information related to the server from the authentication parameter set;
the priority of the authentication parameter matched with the authentication information is adjusted to the highest priority.
In one embodiment, before selecting the authentication parameter with the highest preset priority from the authentication parameter set and performing network authentication on the communication link between the base station and the server, the method further includes:
acquiring an authentication parameter set from a database;
and adjusting the priority of each authentication parameter according to the use frequency of each authentication parameter in the authentication parameter set.
In one embodiment, after the authentication is unsuccessful, the method further comprises:
acquiring a state of a preset change-over switch, wherein the state of the change-over switch is used for indicating whether authentication operation is executed or not;
if the state of the change-over switch is on, the authentication operation is continuously executed.
In one embodiment, if the state of the switch is closed, the network authentication is performed on the communication link between the base station and the server using the authentication parameter with the highest initial priority in the authentication parameter set.
In one embodiment, if the authentication is successful, a communication link between the base station and the server is established, and the priority of each authentication parameter in the set of authentication parameters is updated.
In a second aspect, a network authentication apparatus, the apparatus comprising:
the monitoring module is used for monitoring the communication state of the communication link between the base station and the server;
the execution module is used for executing authentication operation if the communication state is abnormal, wherein the authentication operation comprises the following steps: selecting an authentication parameter with highest preset priority from the authentication parameter set, and carrying out network authentication on a communication link between the base station and the server;
and the switching module is used for updating the priority of each authentication parameter in the authentication parameter set if the authentication is unsuccessful, and continuously executing the authentication operation based on the priority of each authentication parameter in the updated authentication parameter set until the authentication is successful.
In a third aspect, a computer device includes a memory storing a computer program and a processor implementing the network authentication method according to any embodiment of the first aspect when the computer program is executed by the processor.
In a fourth aspect, a computer readable storage medium has stored thereon a computer program which, when executed by a processor, implements a network authentication method according to any embodiment of the first aspect.
The application provides a network authentication method, a device, a computer device and a storage medium, comprising: monitoring a communication state of a communication link between a base station and a server; if the communication state is abnormal, executing authentication operation, wherein the authentication operation comprises the following steps: selecting an authentication parameter with highest preset priority from the authentication parameter set, and carrying out network authentication on a communication link between the base station and the server; if the authentication is unsuccessful, updating the priority of each authentication parameter in the authentication parameter set, and continuing to execute the authentication operation based on the priority of each authentication parameter in the updated authentication parameter set until the authentication is successful. In the above network authentication method, when the communication link between the base station and the server is abnormal, the base station may automatically select the corresponding authentication parameter to re-perform network authentication on the communication link, and in case of unsuccessful authentication, re-select the new authentication parameter to perform network authentication until the authentication is successful. Compared with the existing network authentication method requiring manual intervention to perform manual operation, the network authentication method provided by the application greatly shortens the time of recovering a link when a network between a base station and a server is interrupted, thereby ensuring the security of network operation and improving the stability of network operation. In addition, when the authentication is unsuccessful, the priority of each authentication parameter in the authentication parameter set is updated, so that the priority of each authentication parameter is more in accordance with the actual application condition, when new authentication parameters are selected again for network authentication, and the selected authentication parameters are the authentication parameters with the highest priority, which is equivalent to the authentication parameters used when the network authentication is performed each time, more in accordance with the actual application requirement, therefore, the authentication parameters with the highest priority are used each time for authentication, the authentication success rate of the authentication is improved, and the operation efficiency of the base station access network is improved.
Drawings
FIG. 1 is a schematic illustration of an application environment provided by one embodiment;
FIG. 2 is a flow chart of a network authentication method according to one embodiment;
FIG. 3 is a flow chart of a network authentication method according to one embodiment;
FIG. 4 is a flow chart of a network authentication method according to one embodiment;
FIG. 5 is a flow chart of a network authentication method according to one embodiment;
FIG. 6 is a flow chart of a network authentication method according to one embodiment;
fig. 7 is a schematic structural diagram of a network authentication device according to an embodiment;
fig. 8 is a schematic structural diagram of a network authentication device according to an embodiment;
fig. 9 is a schematic structural diagram of a network authentication device according to an embodiment;
fig. 10 is a schematic structural diagram of a network authentication device according to an embodiment;
fig. 11 is a schematic diagram of an internal structure of a computer device according to an embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be further described in detail with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the present application.
The network authentication method provided by the application can be applied to an application environment shown in fig. 1, wherein a base station and a server are connected through a network. The server may be implemented by a stand-alone server or a server cluster formed by a plurality of servers, and the base station may be various types of base stations, for example, macro base stations, micro base stations, home micro base stations, and the like.
The following will specifically describe the technical solutions of the present application and how the technical solutions of the present application solve the above technical problems by means of examples and with reference to the accompanying drawings. The following embodiments may be combined with each other, and the same or similar concepts or processes may not be described in detail in some embodiments.
Fig. 2 is a flowchart of a network authentication method provided in an embodiment, where the method is performed by the base station in fig. 1, and the method involves a specific process of performing network authentication by the base station before a communication link is established with a server. As shown in fig. 2, the method specifically includes the following steps:
s101, monitoring the communication state of a communication link between a base station and a server.
The communication state is used for indicating whether the communication link between the base station and the server is normal or not, and mainly comprises two communication states of abnormal communication link between the base station and the server and normal communication link between the base station and the server. In this embodiment, the base station may monitor, in real time, the communication state of the communication link between the base station and the server through its own monitoring software system to see whether an abnormality occurs in the network link between the base station and the server, or alternatively, the base station may periodically monitor the communication state of the communication link between the base station and the server to see whether an abnormality occurs in the network link between the base station and the server. It should be noted that, in practical application, the servers may include different types of servers for managing related services of the base station and providing network services of the base station, such as a gateway server, a core network server, a security management server, and the like, or may be a server cluster, which is not limited to this embodiment.
S102, if the communication state is abnormal, executing authentication operation, wherein the authentication operation comprises the following steps: and selecting an authentication parameter with the highest preset priority from the authentication parameter set, and carrying out network authentication on a communication link between the base station and the server.
The authentication parameter set includes authentication parameters corresponding to various types of authentication algorithms, and the priority of each authentication parameter in the authentication parameter set can be determined in advance by the base station according to actual application requirements. The embodiment relates to a scenario that the communication state of a communication link between a base station and a server is abnormal, when the base station monitors that the communication state of the communication link between the base station and the server is abnormal, network authentication can be performed again, and authentication operation is executed specifically to ensure the security of the base station re-accessing the network. The authentication operation includes: the base station selects the authentication parameter with the highest preset priority from the preset authentication parameter set, and then uses the authentication parameter with the highest priority to perform network authentication on the communication link between the base station and the server. The authentication parameter with the highest priority may be the authentication parameter with the highest frequency used in the actual application, or may be the authentication parameter matched with the server. The network authentication is performed by using the authentication parameter with the highest priority, so that the authentication success rate of the network authentication with the server can be improved, and the efficiency of the base station accessing the network is improved.
And S103, if the authentication is unsuccessful, updating the priority of each authentication parameter in the authentication parameter set, and continuing to execute the authentication operation based on the priority of each authentication parameter in the updated authentication parameter set until the authentication is successful.
When the base station executes the authentication operation to perform network authentication, the authentication may be successful or may not be successful; if the authentication is unsuccessful, the base station may further update the priority of each authentication parameter in the authentication parameter set, and based on the priority of each authentication parameter in the updated authentication parameter set, continue to perform the authentication operation, that is, reselect the authentication parameter with the highest priority from the updated authentication parameter set to perform network authentication, if the authentication is unsuccessful, continue to update the priority of each authentication parameter in the authentication parameter set, and then continue to perform the authentication operation until the authentication is successful.
For example, performing a first authentication operation based on the first authentication parameter; if the first authentication is unsuccessful, performing a second authentication operation based on the second authentication parameter; if the second authentication is unsuccessful, the third authentication operation is performed based on the third authentication parameter, and the authentication is performed until the authentication is successful. The first authentication parameter is the highest priority authentication parameter in the authentication parameter set, when the first authentication is unsuccessful, the priority of each authentication parameter in the authentication parameter set is updated, the priority of the first authentication parameter is adjusted to be the lowest priority, the priority of the second authentication parameter with the initial priority being arranged at the second is adjusted to be the highest priority, the second authentication operation is performed based on the second authentication parameter, when the second authentication is unsuccessful, the priority of each authentication parameter in the authentication parameter set is updated again, the priority of the second authentication parameter is adjusted to be the lowest priority, the priority of the third authentication parameter with the initial priority being arranged at the third is adjusted to be the highest priority, the third authentication operation is performed based on the third authentication parameter, and the same is performed until the authentication is successful.
The network authentication method provided by the embodiment comprises the following steps: monitoring a communication state of a communication link between a base station and a server; if the communication state is abnormal, executing authentication operation, wherein the authentication operation comprises the following steps: selecting an authentication parameter with highest preset priority from the authentication parameter set, and carrying out network authentication on a communication link between the base station and the server; if the authentication is unsuccessful, updating the priority of each authentication parameter in the authentication parameter set, and continuing to execute the authentication operation based on the priority of each authentication parameter in the updated authentication parameter set until the authentication is successful. In the above network authentication method, when the communication link between the base station and the server is abnormal, the base station may automatically select the corresponding authentication parameter to re-perform network authentication on the communication link, and in case of unsuccessful authentication, re-select the new authentication parameter to perform network authentication until the authentication is successful. Compared with the existing network authentication method requiring manual intervention to perform manual operation, the network authentication method provided by the application greatly shortens the time of recovering a link when a network between a base station and a server is interrupted, thereby ensuring the security of network operation and improving the stability of network operation. In addition, when the authentication is unsuccessful, the priority of each authentication parameter in the authentication parameter set is updated, so that the priority of each authentication parameter is more in accordance with the actual application condition, when new authentication parameters are selected again for network authentication, and the selected authentication parameters are the authentication parameters with the highest priority, which is equivalent to the authentication parameters used when the network authentication is performed each time, more in accordance with the actual application requirement, therefore, the authentication parameters with the highest priority are used each time for authentication, the authentication success rate of the authentication is improved, and the operation efficiency of the base station access network is improved.
The present application provides a specific embodiment of "updating the priority of each authentication parameter in the authentication parameter set" in S103, which may specifically include the steps of: and adjusting the priority of the authentication parameters with unsuccessful authentication in the authentication parameter set to be the lowest priority.
The embodiment relates to a specific implementation manner of updating priorities of authentication parameters in an authentication parameter set by a base station, which specifically comprises the following steps: after the base station uses the authentication parameter with the highest priority in the authentication parameter set to carry out authentication and authentication is unsuccessful, the current used authentication parameter is not matched with the server to be connected by the communication link, the priority of the current used authentication parameter needs to be redefined, and the priority of the authentication parameter with unsuccessful authentication is specifically adjusted to the lowest priority in the authentication parameter set, so that the base station can use other authentication parameters with high priority to try re-authentication later, and communication connection later is facilitated.
The present application also provides another specific embodiment of "updating the priority of each authentication parameter in the authentication parameter set" in S103, as shown in fig. 3, which may specifically include the steps of:
s201, acquiring authentication information related to a server.
Wherein the authentication information represents any information related to an authentication algorithm, and the authentication information related to the server represents any information related to an authentication algorithm suitable for hardware or software configuration of the server. When the base station needs to update the priority of each authentication parameter in the authentication parameter set, the base station can obtain the authentication information related to the server by analyzing the hardware or software configuration parameters of the server which is ready to establish connection with the base station, so that the priority of each authentication parameter in the authentication parameter set is updated according to the authentication information.
S202, determining authentication parameters matched with authentication information related to the server from the authentication parameter set.
When the base station acquires the authentication information related to the server, the authentication information can be further analyzed, the authentication parameter matched with the authentication information is determined from the authentication parameter set, or the authentication parameter with the highest matching degree with the authentication information is determined for later use.
And S203, adjusting the priority of the authentication parameter matched with the authentication information to be the highest priority.
When the base station determines the authentication parameter matched with the authentication information related to the server from the authentication parameter set, or determines the authentication parameter with the highest matching degree with the authentication information from the authentication parameter set, the matched authentication parameter or the priority of the authentication parameter with the highest matching degree can be adjusted to be the highest priority in the authentication parameter set, so that the selected authentication parameter is the authentication parameter with the highest priority when the base station does not successfully need to reselect the authentication parameter for authentication after the authentication, and the authentication parameter used by the base station is the authentication parameter matched with the server when the base station tries authentication, thereby greatly improving the success rate of authentication, shortening the operation time of recovering a communication link between the base station and the server, and further improving the operation efficiency.
The above embodiment relates to another specific implementation manner of updating the priority of each authentication parameter in the authentication parameter set by the base station, which updates the priority of each authentication parameter according to the authentication information related to the server, so that the authentication parameter with the highest priority in the updated authentication parameter set better meets the actual application requirement, i.e. is more matched with the authentication information of the server, thereby improving the authentication success rate when the authentication is performed according to the authentication parameter matched with the authentication information, shortening the operation time for recovering the communication link between the base station and the server, and further improving the operation efficiency.
In an application scenario, before the base station performs network authentication, the present application further provides a method for determining the priority of each authentication parameter in the authentication parameter set, that is, "select the authentication parameter with the highest preset priority from the authentication parameter set" in S102, and before performing network authentication on the communication link between the base station and the server, "as shown in fig. 4, the implementation of the method in fig. 2 further includes:
s301, acquiring an authentication parameter set from a database.
The base station may obtain the authentication parameter set from a local database, or may obtain the authentication parameter set from another database. The authentication parameter set contains various types of authentication parameters, and the priority of each authentication parameter contained in the authentication parameter set can be dynamically adjusted.
S302, adjusting the priority of each authentication parameter according to the use frequency of each authentication parameter in the authentication parameter set.
When the base station acquires the authentication parameter set, the priority of each authentication parameter can be adjusted according to the use frequency of each authentication parameter in practical application, and the priority of the authentication parameter with the highest use frequency is specifically determined to be the highest priority, namely the priorities of the corresponding authentication parameters are arranged in the order from high to low according to the order from high to low of the use frequency. It should be noted that, the higher the use frequency is, the stronger the applicability of the authentication parameter represents, so that the adaptation requirements of hardware or software of various servers on authentication can be met, and the higher the use frequency is, the higher the success rate of authentication is performed by using the authentication parameter after representing, so that the base station performs authentication by selecting the authentication parameter with the highest authentication success rate when performing authentication by selecting the authentication parameter with the highest priority each time, and the operation efficiency of authentication can be improved.
In practical application products, when the base station performs network authentication, the authentication may or may not be successful, and in an application context of unsuccessful authentication, the present application provides a switch for indicating whether to perform authentication operation, and providing an interface for a user to perform authentication by manual operation, so when the base station performs the step S103, after "if authentication is unsuccessful", as shown in fig. 5, the step may further include:
s401, acquiring a state of a preset change-over switch; the state of the switch is used to indicate whether to execute the authentication operation, if the state of the switch is on, the step S402 is executed, and if the state of the switch is off, the step S403 is executed
The state of the switch includes on and off, if the state of the switch is on, it indicates that the base station may perform the authentication operation described in the embodiment of fig. 2, and if the state of the switch is off, it indicates that the base station does not perform the authentication operation described in the embodiment of fig. 2. In this embodiment, the step of determining, that is, when the authentication is performed before the base station, after the authentication is unsuccessful, whether to perform the authentication operation may be further selected by switching the state of the switch. The state of the change-over switch can be set by the base station in advance according to the requirement of a user, when the state is set to be in an open state, the base station is provided with the function of automatically switching other types of authentication parameters for authentication, and when the state is set to be in a closed state, the base station is not required to switch other types of authentication parameters for authentication. In practical application, a user can set the state of the change-over switch in a manual mode, so that the configuration of the authentication function of the base station is realized, and the flexibility of the network authentication method of the base station is improved.
S402, continuing to execute authentication operation.
The present embodiment relates to an application scenario when the state of the switch is on, in which the base station directly executes the authentication operation described in the embodiment of fig. 2, that is, re-switches new authentication parameters to re-perform network authentication on the communication link.
S403, carrying out network authentication on the communication link between the base station and the server by using the authentication parameter with the highest initial priority in the authentication parameter set.
The present embodiment relates to an application scenario when the state of the switch is closed, in which the base station directly uses the authentication parameter with the highest initial priority in the authentication parameter set to attempt to re-authenticate the network on the communication link between the base station and the server. The authentication parameter with the highest initial priority is the authentication parameter used in the previous authentication, and is not changed, so that the base station always uses one type of authentication parameter to perform network authentication on the communication link between the base station and the server in the application scene.
In one embodiment, when the base station performs the step S102, if the authentication is successful, the base station may directly establish a communication link between the base station and the server, and update the priority of each authentication parameter in the authentication parameter set.
The present embodiment relates to another application scenario, that is, the base station monitors the communication state of the communication link between the base station and the server, if the communication state is abnormal, the authentication operation is performed, and if the authentication is successful, the base station may directly establish the communication link between the base station and the server, for example, establish a backhaul channel, perform data interaction and network communication. Meanwhile, the base station needs to update the priority of each authentication parameter in the authentication parameter set, specifically adjusts the priority of the currently used authentication parameter to the highest priority in the authentication parameter set so as to cause communication link abnormality later, and when re-authentication is needed, the authentication parameter is preferentially considered for authentication so as to improve the authentication success rate and the authentication operation efficiency.
In summary, the present application provides a method for network authentication, as shown in fig. 6, where the method includes:
s501, monitoring the communication state of a communication link between a base station and a server.
S502, if the communication state is abnormal, executing authentication operation, wherein the authentication operation comprises the following steps: and selecting the authentication parameter with the highest priority in the preset authentication parameter set, and carrying out network authentication on a communication link between the base station and the server.
S503, judging whether the authentication is successful, if the authentication is successful, executing step S504, and if the authentication is not successful, executing step S505.
S504, establishing a communication link between the base station and the server, and updating the priority of each authentication parameter in the authentication parameter set.
S505, acquiring a state of a preset change-over switch.
S506, judging whether the state of the change-over switch is on, if the state of the change-over switch is on, executing step S507, and if the state of the change-over switch is off, executing step S508.
S507, updating the priority of each authentication parameter in the authentication parameter set, and repeatedly executing the authentication operation based on the priority of each authentication parameter in the updated authentication parameter set until the authentication is successful.
And S508, carrying out network authentication on the communication link between the base station and the server by using the authentication parameter with the highest initial priority in the authentication parameter set.
The explanation of each step is referred to the explanation of the foregoing embodiment, and the redundant explanation is not repeated here. The network authentication method provided by the application realizes that when the communication link between the base station and the server is abnormal or the communication link between the base station and the server needs to be established, the corresponding authentication parameters are automatically selected to carry out authentication, the authentication is not needed to be carried out by manual intervention, the labor cost is greatly saved, and the operation efficiency of accessing the base station into the network is improved.
It should be understood that, although the steps in the flowcharts of fig. 2-6 are shown in order as indicated by the arrows, these steps are not necessarily performed in order as indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in fig. 2-6 may include multiple sub-steps or stages that are not necessarily performed at the same time, but may be performed at different times, nor does the order in which the sub-steps or stages are performed necessarily occur in sequence.
In one embodiment, as shown in fig. 7, there is provided a network authentication apparatus, including: a monitoring module 11, an executing module 12 and a switching module 13, wherein:
a monitoring module 11, configured to monitor a communication state of a communication link between a base station and a server;
the execution module 12 is configured to execute an authentication operation if the communication status is abnormal, where the authentication operation includes: selecting an authentication parameter with highest preset priority from the authentication parameter set, and carrying out network authentication on a communication link between the base station and the server;
and the switching module 13 is configured to update the priority of each authentication parameter in the authentication parameter set if the authentication is unsuccessful, and continue to perform the authentication operation until the authentication is successful based on the priority of each authentication parameter in the updated authentication parameter set.
In one embodiment, the above-mentioned switching module 13 is specifically configured to adjust the priority of the authentication parameters with unsuccessful authentication in the authentication parameter set to the lowest priority.
In one embodiment, as shown in fig. 8, the switching module 13 includes:
a first obtaining unit 131, configured to obtain authentication information related to a server;
a determining unit 132 for determining an authentication parameter matching authentication information related to the server from the authentication parameter set;
an adjusting unit 133, configured to adjust the priority of the authentication parameter matched with the authentication information to the highest priority.
In one embodiment, as shown in fig. 9, the network authentication apparatus further includes: an acquisition module 14 and a determination module 15, wherein:
an acquisition module 14 for acquiring an authentication parameter set from a database;
the determining module 15 is configured to adjust the priority of each authentication parameter according to the usage frequency of each authentication parameter in the authentication parameter set.
In one embodiment, as shown in fig. 10, the above-mentioned switching module 13 further includes:
a second obtaining unit 134, configured to obtain a state of a preset switch, where the state of the switch is used to indicate whether to perform an authentication operation;
the first execution unit 135 is configured to continue the authentication operation if the state of the switch is on.
The second execution unit 136 is configured to perform network authentication on the communication link between the base station and the server by using the authentication parameter with the highest initial priority in the authentication parameter set if the state of the switch is closed.
In one embodiment, the above-mentioned switching module 13 is specifically configured to establish a communication link between the base station and the server if the authentication is successful, and update the priority of each authentication parameter in the authentication parameter set.
For specific limitations of the network authentication device, reference may be made to the above limitation of a network authentication method, which is not described herein. The various modules in the network authentication device described above may be implemented in whole or in part by software, hardware, or a combination thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules.
In one embodiment, a computer device is provided, which may be a terminal, and the internal structure thereof may be as shown in fig. 11. The computer device includes a processor, a memory, a network interface, a display screen, and an input device connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a network authentication method. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, can also be keys, a track ball or a touch pad arranged on the shell of the computer equipment, and can also be an external keyboard, a touch pad or a mouse and the like.
It will be appreciated by those skilled in the art that the structure shown in fig. 11 is merely a block diagram of a portion of the structure associated with the present application and is not limiting of the computer device to which the present application applies, and that a particular computer device may include more or fewer components than shown, or may combine some of the components, or have a different arrangement of components.
In one embodiment, a computer device is provided comprising a memory and a processor, the memory having stored therein a computer program, the processor when executing the computer program performing the steps of:
monitoring a communication state of a communication link between a base station and a server;
if the communication state is abnormal, executing authentication operation, wherein the authentication operation comprises the following steps: selecting an authentication parameter with highest preset priority from the authentication parameter set, and carrying out network authentication on a communication link between the base station and the server;
if the authentication is unsuccessful, updating the priority of each authentication parameter in the authentication parameter set, and continuing to execute the authentication operation based on the priority of each authentication parameter in the updated authentication parameter set until the authentication is successful.
The computer device provided in the foregoing embodiments has similar implementation principles and technical effects to those of the foregoing method embodiments, and will not be described herein in detail.
In one embodiment, a computer readable storage medium is provided having a computer program stored thereon, which when executed by a processor further performs the steps of:
monitoring a communication state of a communication link between a base station and a server;
if the communication state is abnormal, executing authentication operation, wherein the authentication operation comprises the following steps: selecting an authentication parameter with highest preset priority from the authentication parameter set, and carrying out network authentication on a communication link between the base station and the server;
if the authentication is unsuccessful, updating the priority of each authentication parameter in the authentication parameter set, and continuing to execute the authentication operation based on the priority of each authentication parameter in the updated authentication parameter set until the authentication is successful.
The foregoing embodiment provides a computer readable storage medium, which has similar principles and technical effects to those of the foregoing method embodiment, and will not be described herein.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the various embodiments provided herein may include non-volatile and/or volatile memory. The nonvolatile memory can include Read Only Memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), memory bus direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), among others.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The above examples illustrate only a few embodiments of the invention, which are described in detail and are not to be construed as limiting the scope of the invention. It should be noted that it will be apparent to those skilled in the art that several variations and modifications can be made without departing from the spirit of the invention, which are all within the scope of the invention. Accordingly, the scope of protection of the present invention is to be determined by the appended claims.

Claims (10)

1. A method of network authentication, the method comprising:
monitoring a communication state of a communication link between a base station and a server;
and if the communication state is abnormal, executing authentication operation, wherein the authentication operation comprises the following steps: selecting an authentication parameter with highest preset priority from an authentication parameter set, and carrying out network authentication on a communication link between the base station and a server; the authentication parameter set comprises authentication parameters corresponding to various types of authentication algorithms;
if the authentication is unsuccessful, updating the priority of each authentication parameter in the authentication parameter set, and continuing to execute the authentication operation based on the updated priority of each authentication parameter until the authentication is successful;
wherein updating the priority of each authentication parameter in the authentication parameter set includes:
acquiring authentication information related to the server; wherein the authentication information associated with the server represents information associated with an authentication algorithm suitable for hardware or software configuration of the server;
determining an authentication parameter matched with the authentication information related to the server from the authentication parameter set;
and adjusting the priority of the authentication parameter matched with the authentication information to be the highest priority.
2. The network authentication method of claim 1, wherein updating the priority of each authentication parameter in the set of authentication parameters further comprises:
and adjusting the priority of the authentication parameters which are unsuccessful in authentication in the authentication parameter set to be the lowest priority.
3. The network authentication method according to claim 1, wherein before selecting an authentication parameter with a highest preset priority from the set of authentication parameters, the method further comprises:
acquiring the authentication parameter set from a database;
and adjusting the priority of each authentication parameter according to the use frequency of each authentication parameter in the authentication parameter set.
4. The network authentication method of claim 1, wherein after the authentication is unsuccessful, the method further comprises:
acquiring a state of a preset change-over switch, wherein the state of the change-over switch is used for indicating whether to execute the authentication operation or not;
and if the state of the change-over switch is on, continuing to execute the authentication operation.
5. The network authentication method of claim 4, wherein if the state of the switch is closed, network authentication is performed on the communication link between the base station and the server using an authentication parameter with a highest initial priority from the set of authentication parameters.
6. The network authentication method of claim 1, wherein if the authentication is successful, a communication link between the base station and the server is established and the priority of each authentication parameter in the set of authentication parameters is updated.
7. A network authentication apparatus, the apparatus comprising:
the monitoring module is used for monitoring the communication state of the communication link between the base station and the server;
the execution module is used for executing authentication operation if the communication state is disconnected, wherein the authentication operation comprises the following steps: selecting an authentication parameter with highest preset priority from an authentication parameter set, and carrying out network authentication on a communication link between the base station and a server; the authentication parameter set comprises authentication parameters corresponding to various types of authentication algorithms;
the switching module is used for updating the priority of each authentication parameter in the authentication parameter set if the authentication is unsuccessful, and continuously executing the authentication operation until the authentication is successful based on the priority of each authentication parameter in the updated authentication parameter set;
the switching module comprises a first acquisition unit, a determination unit and an adjustment unit;
the first acquisition unit is used for acquiring authentication information related to the server; wherein the authentication information associated with the server represents information associated with an authentication algorithm suitable for hardware or software configuration of the server;
the determining unit is used for determining an authentication parameter matched with the authentication information related to the server from the authentication parameter set;
and the adjusting unit is used for adjusting the priority of the authentication parameter matched with the authentication information to be the highest priority.
8. The apparatus of claim 7, wherein the apparatus further comprises:
the acquisition module is used for acquiring the authentication parameter set from a database;
and the determining module is used for adjusting the priority of each authentication parameter according to the use frequency of each authentication parameter in the authentication parameter set.
9. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor implements the steps of the method of any of claims 1 to 6 when the computer program is executed.
10. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 1 to 6.
CN201911407693.5A 2019-12-31 2019-12-31 Network authentication method, device, computer equipment and storage medium Active CN111148102B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911407693.5A CN111148102B (en) 2019-12-31 2019-12-31 Network authentication method, device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911407693.5A CN111148102B (en) 2019-12-31 2019-12-31 Network authentication method, device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN111148102A CN111148102A (en) 2020-05-12
CN111148102B true CN111148102B (en) 2024-01-30

Family

ID=70522416

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911407693.5A Active CN111148102B (en) 2019-12-31 2019-12-31 Network authentication method, device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111148102B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112203316B (en) * 2020-09-30 2023-07-14 Oppo(重庆)智能科技有限公司 Network anomaly recovery method and device, electronic equipment and storage medium

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101001145A (en) * 2006-01-11 2007-07-18 华为技术有限公司 Authentication method for support terminal roaming of non-IP multimedia service subsystem
WO2007131455A1 (en) * 2006-05-11 2007-11-22 Huawei Technologies Co., Ltd. Method, system and apparatus for realizing key synchronization between control plane and user plane
WO2008025280A1 (en) * 2006-08-24 2008-03-06 Huawei Technologies Co., Ltd. A method and system of authentication
CN101730155A (en) * 2009-04-30 2010-06-09 中兴通讯股份有限公司 System and method for performing resource control on user
CN104125567A (en) * 2014-07-30 2014-10-29 京信通信系统(中国)有限公司 Femto and authentication method and authentication device for access of femto to network side
CN104796965A (en) * 2015-03-19 2015-07-22 四川长虹电器股份有限公司 Method for controlling AP connection priority under WiFi environment
CN105391803A (en) * 2015-12-15 2016-03-09 腾讯科技(深圳)有限公司 Message pushing method and device
CN105764054A (en) * 2016-02-04 2016-07-13 中国联合网络通信集团有限公司 Method for network detection based on embedded intelligent card and terminal thereof
CN105792204A (en) * 2016-02-29 2016-07-20 宇龙计算机通信科技(深圳)有限公司 Network connection authentication method and device
CN106507405A (en) * 2016-12-13 2017-03-15 广东欧珀移动通信有限公司 The abnormal processing method and processing device of network communicating function
WO2018107895A1 (en) * 2016-12-13 2018-06-21 广东欧珀移动通信有限公司 Network-communication function exception processing method and processing apparatus, terminal device, and computer storage medium
WO2018107892A1 (en) * 2016-12-13 2018-06-21 广东欧珀移动通信有限公司 Network-communication function exception processing method and processing apparatus, terminal device, and computer storage medium
CN109412845A (en) * 2018-10-11 2019-03-01 平安科技(深圳)有限公司 Method, apparatus, computer equipment and the storage medium of equipment access network
CN110225045A (en) * 2019-06-18 2019-09-10 平安科技(深圳)有限公司 Full link data method for authenticating, device, equipment and storage medium
CN110351729A (en) * 2019-07-15 2019-10-18 西安中兴物联软件有限公司 Method, system, terminal and storage medium for automatically matching authentication parameters

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9065740B2 (en) * 2007-08-27 2015-06-23 Hewlett-Packard Development Company, L.P. Prioritising data processing operations
US8442429B2 (en) * 2010-04-06 2013-05-14 Andre F. Hawit System for providing audio messages on a mobile device

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101001145A (en) * 2006-01-11 2007-07-18 华为技术有限公司 Authentication method for support terminal roaming of non-IP multimedia service subsystem
WO2007131455A1 (en) * 2006-05-11 2007-11-22 Huawei Technologies Co., Ltd. Method, system and apparatus for realizing key synchronization between control plane and user plane
WO2008025280A1 (en) * 2006-08-24 2008-03-06 Huawei Technologies Co., Ltd. A method and system of authentication
CN101730155A (en) * 2009-04-30 2010-06-09 中兴通讯股份有限公司 System and method for performing resource control on user
CN104125567A (en) * 2014-07-30 2014-10-29 京信通信系统(中国)有限公司 Femto and authentication method and authentication device for access of femto to network side
CN104796965A (en) * 2015-03-19 2015-07-22 四川长虹电器股份有限公司 Method for controlling AP connection priority under WiFi environment
CN105391803A (en) * 2015-12-15 2016-03-09 腾讯科技(深圳)有限公司 Message pushing method and device
CN105764054A (en) * 2016-02-04 2016-07-13 中国联合网络通信集团有限公司 Method for network detection based on embedded intelligent card and terminal thereof
CN105792204A (en) * 2016-02-29 2016-07-20 宇龙计算机通信科技(深圳)有限公司 Network connection authentication method and device
CN106507405A (en) * 2016-12-13 2017-03-15 广东欧珀移动通信有限公司 The abnormal processing method and processing device of network communicating function
WO2018107895A1 (en) * 2016-12-13 2018-06-21 广东欧珀移动通信有限公司 Network-communication function exception processing method and processing apparatus, terminal device, and computer storage medium
WO2018107892A1 (en) * 2016-12-13 2018-06-21 广东欧珀移动通信有限公司 Network-communication function exception processing method and processing apparatus, terminal device, and computer storage medium
CN109412845A (en) * 2018-10-11 2019-03-01 平安科技(深圳)有限公司 Method, apparatus, computer equipment and the storage medium of equipment access network
CN110225045A (en) * 2019-06-18 2019-09-10 平安科技(深圳)有限公司 Full link data method for authenticating, device, equipment and storage medium
CN110351729A (en) * 2019-07-15 2019-10-18 西安中兴物联软件有限公司 Method, system, terminal and storage medium for automatically matching authentication parameters

Also Published As

Publication number Publication date
CN111148102A (en) 2020-05-12

Similar Documents

Publication Publication Date Title
CN112566051B (en) Method and apparatus for efficiently transferring multiple cellular ticket services
US11190985B1 (en) Internet of things (IoT) devices wireless communication service management platform
CN112822756A (en) Communication method, system, base station and terminal
EP3079392A1 (en) Method, apparatus and system for selecting authentication algorithm
CN111031542B (en) Base station opening method, device, communication equipment and storage medium
CN111148102B (en) Network authentication method, device, computer equipment and storage medium
CN112016122A (en) Webpage data processing method and device, computer equipment and storage medium
CN110636590B (en) Hotspot list generation method and device, computer equipment and storage medium
EP3306858B1 (en) Network management system deployment method and device, and network management system
CN111405016A (en) User information acquisition method and related equipment
CN109711140A (en) Website logging state control method, device, computer equipment and storage medium
CN111148170A (en) Multi-hot-spot network distribution method and device, network card, computer equipment and storage medium
WO2019236402A1 (en) Secure re-use of sim security parameters between different parties
CN113742681B (en) Account management method and device, computer equipment and storage medium
CN110519858B (en) Channel access method, device, computer equipment and storage medium
WO2014080780A1 (en) Method and system for authenticating at least one terminal requesting access to at least one resource
CN110381487B (en) Bluetooth connection method and device
CN111818526B (en) Data synchronization method and device
CN113840313A (en) Network mode control method and device of mobile terminal and computer equipment
CN115087075A (en) Method, device, terminal and network side equipment for using unlicensed frequency band
CN111917731B (en) IMS protocol stack construction method, device, computer equipment and storage medium
CN117676923B (en) Management method, device and storage medium for session establishment in communication system
CN117615396B (en) Data management method, terminal device and storage medium
CN116489731B (en) Slice information mapping method, apparatus, computer device and storage medium
US20230077664A1 (en) Establishing a connection between an access point and an unstable client device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 510663 Shenzhou Road 10, Guangzhou Science City, Guangzhou economic and Technological Development Zone, Guangzhou, Guangdong

Applicant after: Jingxin Network System Co.,Ltd.

Address before: 510663 Shenzhou Road 10, Guangzhou Science City, Guangzhou economic and Technological Development Zone, Guangzhou, Guangdong

Applicant before: COMBA TELECOM SYSTEMS (CHINA) Ltd.

GR01 Patent grant
GR01 Patent grant