CN111327457B - Block link interface configuration method based on communication security authentication - Google Patents

Block link interface configuration method based on communication security authentication Download PDF

Info

Publication number
CN111327457B
CN111327457B CN202010068903.9A CN202010068903A CN111327457B CN 111327457 B CN111327457 B CN 111327457B CN 202010068903 A CN202010068903 A CN 202010068903A CN 111327457 B CN111327457 B CN 111327457B
Authority
CN
China
Prior art keywords
communication
security authentication
interface
module
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010068903.9A
Other languages
Chinese (zh)
Other versions
CN111327457A (en
Inventor
李宝次
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ningbo Aoyou Intelligent Technology Co.,Ltd.
Original Assignee
Shandong Gongchain Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Gongchain Information Technology Co ltd filed Critical Shandong Gongchain Information Technology Co ltd
Priority to CN202010068903.9A priority Critical patent/CN111327457B/en
Publication of CN111327457A publication Critical patent/CN111327457A/en
Application granted granted Critical
Publication of CN111327457B publication Critical patent/CN111327457B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0866Checking the configuration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0893Assignment of logical groups to network elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Small-Scale Networks (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a block link interface configuration method based on communication security authentication, which comprises a user system, wherein the user system is connected with a security authentication device, the security authentication device is connected with a configuration module, the user system comprises a request user and a communication user, the security authentication device comprises a controller, a storage module, a signature module and a verification module, the system, the storage module, the signature module and the verification module are connected in parallel with the controller, the configuration module comprises a block chain and block chain link points, the block chain nodes are connected in parallel with the block chain, the user system is connected with the security authentication device to perform signature authentication on a communication request, and simultaneously, the block chain nodes are generated by the block chain to independently connect two users, thereby avoiding configuration confusion, ensuring the stability of communication and effectively improving the communication security, effectively improve communication efficiency and information security, do benefit to and use and promote.

Description

Block link interface configuration method based on communication security authentication
Technical Field
The invention relates to the technical field of communication authentication, in particular to a block link interface configuration method based on communication security authentication.
Background
Under the current technological development conditions, the importance of information is more and more prominent, and the requirements for information interaction are increasingly increased, so that the communication safety is emphasized, and the information confidentiality requirement is higher and higher.
Most of the existing communication methods are to directly perform configuration interaction between users, which not only cannot ensure efficient structural configuration and affect communication efficiency, but also easily causes a state of configuration disorder and affects communication security, and thus a new configuration method is yet to be proposed.
Disclosure of Invention
The invention aims to solve the defects in the prior art, and provides a block link interface configuration method based on communication security authentication.
In order to achieve the purpose, the invention adopts the following technical scheme:
a block link interface configuration method based on communication security authentication is applied to a user system, the user system is connected with a security authentication device, the security authentication device is connected with a configuration module, the user system comprises a request user and a communication user, the security authentication device comprises a controller, a storage module, a signature module and a verification module, the controller, the storage module, the signature module and the verification module are connected in parallel with the controller, the configuration module comprises a block link and block link points, and block link nodes are connected in parallel with the block link.
Preferably, the block link point configuration is generated with an interface, and the interface is connected to the verification module in parallel.
Preferably, the requesting user and the communicating user are connected to the security authentication apparatus in parallel, and the requesting user and the communicating user are connected to the controller in parallel.
Preferably, the controller is connected to the configuration module, and the controller is connected to the block chain.
Preferably, the configuration method comprises the following steps:
s1, requesting the user to send a communication request to the security authentication device, and receiving the request by the controller;
s2, the signature module carries out signature authentication on the request, and the storage module stores the request and the signature state;
s3, the controller sends the request and the signature state to the block chain to generate a block chain node;
s4, generating a configuration interface by the block link points according to the request content and returning the configuration interface to the security authentication device;
s5, the verification module verifies and matches the interface content, if not, the interface is abandoned, and if yes, the interface returns to the controller;
and S6, the controller connects the interface content conforming to the verification to the communication user, and the configuration of the communication interface can be completed.
Preferably, the step S1 numbers the communication requests according to the times and time sequence, and the numbering rule is a time-times-communication user code.
Preferably, the signature authentication in step S2 is signed by means of a digital key.
Preferably, the discarding interface of step S5 further includes clearing the associated blockchain node and the stored content.
According to the block link interface configuration method based on communication security authentication, a user system is connected to a security authentication device, signature authentication can be performed on a communication request, and meanwhile, two users are independently connected through block link generation block link nodes, so that configuration disorder is avoided, the stability of communication is guaranteed, the communication security is effectively improved, and furthermore, a plurality of block link nodes can be generated, so that the same requesting user can be simultaneously configured with a plurality of communication users, and the communication users are isolated from each other, the communication efficiency and the information security are effectively improved, and the block link interface configuration method is beneficial to use and popularization.
Drawings
Fig. 1 is a schematic block diagram of the present invention.
In the figure: 1 user system, 11 requesting user, 12 communication user, 2 security authentication device, 21 controller, 22 storage module, 23 signature module, 24 verification module, 3 configuration module, 31 block chain, 32 block chain node, 33 interface.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is further described in detail with reference to the following embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
A block link interface configuration method based on communication security authentication is applied to a user system 1, the user system 1 is connected with a security authentication device 2, the security authentication device 2 is connected with a configuration module 3, the user system 1 comprises a requesting user 11 and a communication user 12, the security authentication device 2 comprises a controller 21, a storage module 22, a signature module 23 and a verification module 24, the controller 21, the storage module 22, the signature module 23 and the verification module 24 are connected in parallel with the controller 21, the configuration module 3 comprises a block link 31 and block link points 32, and the block link nodes 32 are connected in parallel with the block link 31.
Preferably, the blockchain node 32 is configured to generate an interface 33, and the interface 33 is connected to the verification module 24 in parallel.
Preferably, the requesting user 11 and the communicating user 12 are connected to the security authentication apparatus 2 in parallel, and the requesting user 11 and the communicating user 12 are connected to the controller 21 in parallel.
Preferably, the controller 21 is connected to the configuration module 3, and the controller 21 is connected to the block chain 31.
Preferably, the configuration method comprises the following steps:
s1, requesting the user to send a communication request to the security authentication device, and receiving the request by the controller;
s2, the signature module carries out signature authentication on the request, and the storage module stores the request and the signature state;
s3, the controller sends the request and the signature state to the block chain to generate a block chain node;
s4, generating a configuration interface by the block link points according to the request content and returning the configuration interface to the security authentication device;
s5, the verification module verifies and matches the interface content, if not, the interface is abandoned, and if yes, the interface returns to the controller;
and S6, the controller connects the interface content conforming to the verification to the communication user, and the configuration of the communication interface can be completed.
Preferably, the step S1 numbers the communication requests according to the times and time sequence, and the numbering rule is time-times-communication user code.
Preferably, the signature authentication in step S2 is signed by using a digital key.
Preferably, the abandonment interface of step S5 further includes clearing the associated blockchain node and the memory contents.
According to the block link interface configuration method based on communication security authentication, a user system is connected to a security authentication device, signature authentication can be performed on a communication request, and meanwhile, two users are independently connected through block link generation block link nodes, so that configuration disorder is avoided, the stability of communication is guaranteed, the communication security is effectively improved, and furthermore, a plurality of block link nodes can be generated, so that the same requesting user can be simultaneously configured with a plurality of communication users, and the communication users are isolated from each other, the communication efficiency and the information security are effectively improved, and the block link interface configuration method is beneficial to use and popularization.

Claims (7)

1. A block link interface configuration method based on communication security authentication is applied to a user system (1), and is characterized in that: the user system (1) is connected with a security authentication device (2), the security authentication device (2) is connected with a configuration module (3), the user system (1) comprises a request user (11) and a communication user (12), the security authentication device (2) comprises a controller (21), a storage module (22), a signature module (23) and a verification module (24), the controller (21), the storage module (22), the signature module (23) and the verification module (24) are connected in parallel to the controller (21), the configuration module (3) comprises a block chain (31) and a block chain node (32), and the block chain node (32) is connected in parallel to the block chain (31);
the configuration method comprises the following steps:
s1, requesting the user to send a communication request to the security authentication device, and receiving the request by the controller;
s2, the signature module carries out signature authentication on the request, and the storage module stores the request and the signature state;
s3, the controller sends the request and the signature state to the block chain to generate a block chain node;
s4, generating a configuration interface by the block link points according to the request content and returning the configuration interface to the security authentication device;
s5, the verification module verifies and matches the interface content, if not, the interface is abandoned, and if yes, the interface returns to the controller;
and S6, the controller connects the interface content conforming to the verification to the communication user, and the configuration of the communication interface can be completed.
2. A block link interface configuration method based on communication security authentication according to claim 1, characterized in that: the blockchain node (32) is configured to generate an interface (33), the interface (33) being connected in parallel to the verification module (24).
3. A block link interface configuration method based on communication security certification according to claim 1, characterized in that: the requesting user (11) and the communication user (12) are connected to the security authentication device (2) in parallel, and the requesting user (11) and the communication user (12) are connected to the controller (21) in parallel.
4. A block link interface configuration method based on communication security authentication according to claim 1, characterized in that: the controller (21) is connected to a configuration module (3), and the controller (21) is connected to a block chain (31).
5. A block link interface configuration method based on communication security authentication according to claim 1, characterized in that: the step S1 is to send the communication request to be numbered according to the number and time sequence, and the numbering rule is time-number-communication user code.
6. A block link interface configuration method based on communication security authentication according to claim 1, characterized in that: the signature authentication of the step S2 is signed by means of a digital key.
7. A block link interface configuration method based on communication security authentication according to claim 1, characterized in that: the relinquishing interface of step S5 further includes clearing the associated blockchain node and the stored content.
CN202010068903.9A 2020-01-21 2020-01-21 Block link interface configuration method based on communication security authentication Active CN111327457B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010068903.9A CN111327457B (en) 2020-01-21 2020-01-21 Block link interface configuration method based on communication security authentication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010068903.9A CN111327457B (en) 2020-01-21 2020-01-21 Block link interface configuration method based on communication security authentication

Publications (2)

Publication Number Publication Date
CN111327457A CN111327457A (en) 2020-06-23
CN111327457B true CN111327457B (en) 2022-07-05

Family

ID=71171282

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010068903.9A Active CN111327457B (en) 2020-01-21 2020-01-21 Block link interface configuration method based on communication security authentication

Country Status (1)

Country Link
CN (1) CN111327457B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112835979A (en) * 2021-02-02 2021-05-25 山东寻声网络科技有限公司 Material evidence storage and data analysis system based on block chain technology

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130014033A1 (en) * 2011-07-08 2013-01-10 WoGo LLC Systems and methods for facilitating user interaction between multiple virtual environments
CN107315786B (en) * 2017-06-12 2020-12-11 腾讯科技(深圳)有限公司 Service data storage method and device
CN108769186B (en) * 2018-05-28 2021-11-23 中国联合网络通信集团有限公司 Service authority control method and device
CN109218082B (en) * 2018-08-24 2021-08-24 维沃移动通信有限公司 Network configuration parameter processing method, device and equipment
CN110380919B (en) * 2019-08-30 2021-11-05 望海康信(北京)科技股份公司 Processing method and device for block chain request, electronic equipment and readable storage medium

Also Published As

Publication number Publication date
CN111327457A (en) 2020-06-23

Similar Documents

Publication Publication Date Title
CN111010376B (en) Master-slave chain-based Internet of things authentication system and method
CN106453636A (en) Credible block generation method and system
US20170075941A1 (en) Consensus system and method for adding data to a blockchain
CN104202168A (en) Cloud data integrity verification method based on trusted third party
CN112583596B (en) Complete cross-domain identity authentication method based on block chain technology
CN108900309B (en) Authentication method and authentication system
CN105450623B (en) A kind of access authentication method of electric car
CN111683136B (en) Node safety monitoring method and device of power distribution Internet of things and power distribution Internet of things system
CN112839041B (en) Block chain-based power grid identity authentication method, device, medium and equipment
CN110365483A (en) Cloud platform authentication method, client, middleware and system
CN111786785B (en) Block chain-based power distribution Internet of things node switching method and device
CN116232762B (en) Encryption data transmission method based on quantum key
CN111010265A (en) Block chain organization key management method based on hierarchical key and BLS digital signature
CN103220673A (en) Wireless local area network (WLAN) user authentication method, authentication server and user equipment (UE)
CN111327457B (en) Block link interface configuration method based on communication security authentication
CN114900316B (en) Block chain-based quick identity authentication method and system for Internet of things equipment
CN110691358B (en) Access control system based on attribute cryptosystem in wireless sensor network
CN109472536A (en) Express delivery cabinet based on block chain collects part method
CN111797171A (en) Data synchronization system based on block chain cross-chain technology
CN112364387B (en) Identity authentication method and device based on blockchain network, medium and equipment
CN113364582B (en) Method for communication key configuration and update management in transformer substation
WO2003036867B1 (en) System and method for performing mutual authentication between mobile terminal and server
CN112836199A (en) Tool and method for realizing unified authentication
CN107276997B (en) A kind of intelligent cut-in method, the apparatus and system of electric power mobile application terminal
CN103384249A (en) Network access authentication method, device and system and authentication server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20231126

Address after: 315000, 347 # and 349 # Wanda Road, Haishu District, Ningbo City, Zhejiang Province

Patentee after: Ningbo Aoyou Intelligent Technology Co.,Ltd.

Address before: 250014 Room 301, No. 15, Yanzishan Road, Lixia District, Jinan City, Shandong Province

Patentee before: Shandong Gongchain Information Technology Co.,Ltd.

TR01 Transfer of patent right