CN112491834B - Information authentication method and authentication server - Google Patents

Information authentication method and authentication server Download PDF

Info

Publication number
CN112491834B
CN112491834B CN202011279181.8A CN202011279181A CN112491834B CN 112491834 B CN112491834 B CN 112491834B CN 202011279181 A CN202011279181 A CN 202011279181A CN 112491834 B CN112491834 B CN 112491834B
Authority
CN
China
Prior art keywords
address
terminal equipment
authentication
fixed network
network account
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011279181.8A
Other languages
Chinese (zh)
Other versions
CN112491834A (en
Inventor
姜琳
赵鑫
鲁笛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN202011279181.8A priority Critical patent/CN112491834B/en
Publication of CN112491834A publication Critical patent/CN112491834A/en
Application granted granted Critical
Publication of CN112491834B publication Critical patent/CN112491834B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/09Mapping addresses
    • H04L61/25Mapping addresses of the same type
    • H04L61/2503Translation of Internet protocol [IP] addresses

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The present disclosure provides an information authentication method and an authentication server, wherein the information authentication method comprises: receiving an authentication request sent by terminal equipment, and acquiring the address of the terminal equipment; responding to a fixed network account corresponding to the address of the terminal equipment inquired locally, and acquiring identity information corresponding to the fixed network account from a service ordering server; desensitizing the identity information to obtain desensitization data, and sending the desensitization data to the terminal equipment so that a user of the terminal equipment can confirm the correctness of the desensitization data. The method only depends on the network environment and does not depend on equipment and services, the technical scheme is simple, and the development cost is low. The service access party does not need to be in butt joint development or carry out secondary transformation on a service system; meanwhile, the scheme is realized based on the existing broadband access server of the operator, and the operator is not required to carry out additional equipment investment. The leakage of personal information can be effectively avoided. The technical scheme is convenient to use and good in user experience.

Description

Information authentication method and authentication server
Technical Field
The disclosure belongs to the technical field of communication, and particularly relates to an information authentication method and an authentication server.
Background
With the implementation and popularization of internet real-name system policies, more and more services need to authenticate users. The existing information authentication process usually needs a user to input a name and an identification number and even carries out face recognition, the process is complicated, and the risk of leakage of personal information of the user in the input and transmission processes exists. Meanwhile, in the prior art, a user needs to complete information authentication according to product specifications, and a specific service system needs to be subjected to butt joint development or system transformation according to different authentication processes.
In summary, the main disadvantages of the information authentication process for the existing devices are: the operation is complex, the privacy leakage risk exists, the technical threshold is high, and the development cost is high.
Disclosure of Invention
In view of the above-mentioned shortcomings in the prior art, the present disclosure provides an information authentication method and an authentication server.
As a first aspect of the present disclosure, there is provided an information authentication method including:
receiving an authentication request sent by terminal equipment, and acquiring the address of the terminal equipment;
responding to a fixed network account corresponding to the address of the terminal equipment inquired locally, and acquiring identity information corresponding to the fixed network account from a service ordering server;
desensitizing the identity information to obtain desensitization data, and sending the desensitization data to the terminal equipment so that a user of the terminal equipment can confirm the correctness of the desensitization data.
Preferably, after desensitizing the identity information to obtain desensitization data, the method further includes:
and randomly generating an identifier of desensitization data, and locally storing the mapping relation between the desensitization data and the identifier.
Preferably, before receiving the authentication request sent by the terminal device, the method further includes:
and receiving the address of the terminal equipment and the fixed network account corresponding to the address of the terminal equipment, which are sent by the broadband access server, and locally storing the address of the terminal equipment and the fixed network account corresponding to the address of the terminal equipment.
Preferably, the address of the terminal device is a public network IP address.
Preferably, after receiving the authentication request sent by the terminal device and before acquiring the address of the terminal device in the authentication request, the method further includes:
receiving the dialing time and the disconnection time sent by a broadband access server;
the local inquiry of the fixed network account corresponding to the address of the terminal equipment comprises the following steps:
and in the time period between the dialing time and the disconnection time, locally inquiring a fixed network account corresponding to the address of the terminal equipment.
As a second aspect of the present disclosure, there is provided an authentication server comprising:
the receiving module is used for receiving an authentication request sent by the terminal equipment;
the first acquisition module is used for acquiring the address of the terminal equipment in the authentication request;
the second acquisition module is used for responding to a fixed network account corresponding to the address of the terminal equipment inquired locally and acquiring identity information corresponding to the fixed network account from a service ordering server;
the processing module is used for carrying out desensitization processing on the identity information to obtain desensitization data;
and the sending module is used for sending the desensitization data to the terminal equipment so that a user of the terminal equipment can confirm the correctness of the desensitization data.
Preferably, the method further comprises the following steps:
the generation module is used for randomly generating an identification of desensitization data;
and the first storage module is used for locally storing the mapping relation between the desensitization data and the identification.
Preferably, the receiving module is further configured to receive an address of the terminal device and a fixed network account corresponding to the address of the terminal device, where the address is sent by the broadband access server;
the authentication server further comprises:
and the second storage module is used for locally storing the address of the terminal equipment and the fixed network account corresponding to the address of the terminal equipment.
Preferably, the address of the terminal device is a public network IP address.
Preferably, the receiving module is further configured to receive a dialing time and a disconnection time sent by the broadband access server;
the second obtaining module locally queries a fixed network account corresponding to the address of the terminal device, and the method includes:
and in the time period between the dialing time and the disconnection time, locally inquiring a fixed network account corresponding to the address of the terminal equipment.
In the embodiment of the disclosure, only the network environment is relied on, and the device and the service are not relied on, so that the technical scheme is simple and the development cost is low. Because the terminal equipment needs to allocate a fixed network account to the terminal equipment when dialing to access the network, the association relationship between the public network IP address and the fixed network account can be obtained after the dialing is successful and the public network IP address is allocated. Further, only the terminal device needs to send an authentication request to the authentication server, and the identity information of the user of the terminal device is inquired through the service ordering server. Therefore, the technical scheme provides the information authentication service for the user in the home network without changing any equipment or service. The service access party does not need to be in butt joint development or carry out secondary transformation on a service system; meanwhile, the scheme is realized based on the existing broadband access server of the operator, and the operator is not required to carry out additional equipment investment.
In addition, the technical scheme is convenient to use and good in user experience. The authentication process is not sensitive to the user, is transparent to equipment and services, and can complete information authentication without any operation by the user as long as the user is based on the home network environment. The information authentication result can be obtained without inputting or sending any personal information in the authentication process, so that the leakage of the personal information can be effectively avoided.
Drawings
Fig. 1 is a flowchart of an information authentication method according to an embodiment of the present disclosure;
fig. 2 is another flowchart of an information authentication method according to an embodiment of the present disclosure;
fig. 3 is a schematic structural diagram of an authentication server according to an embodiment of the present disclosure.
Detailed Description
For a better understanding of the technical aspects of the present disclosure, reference is made to the following detailed description taken in conjunction with the accompanying drawings.
The method aims to solve the problems that operation is complex, privacy leakage risks exist, technical threshold is high, and development cost is high in an information authentication process of existing equipment. The disclosure provides an information authentication method and an authentication server. The following detailed description is respectively made in connection with the accompanying drawings of the embodiments provided by the present disclosure.
Fig. 1 shows a flowchart of an information authentication method provided by an embodiment of the present disclosure. The information authentication method can be applied to an authentication server. As shown in fig. 1, the information authentication method provided by the present embodiment includes the following steps.
Step 101, receiving an authentication request sent by a terminal device.
In this step, the authentication server receives an authentication request transmitted by the terminal device. The authentication request is an http request (a request message from the client to the server), and the http request carries the address of the terminal device.
And 102, acquiring the address of the terminal equipment in the authentication request.
The address of the terminal device is a public network IP address of a home network where the terminal device is located, and is a public network IP address allocated to the terminal device when the terminal device dials to access the network, such as 123.123.123.123.
And 103, responding to the fixed network account corresponding to the address of the terminal equipment queried locally, and acquiring identity information corresponding to the fixed network account from the service ordering server.
In this step, the authentication Server prestores a fixed network account synchronized with a Broadband Access Server (BRAS) and an address of a terminal device corresponding to the fixed network account. The address of the terminal device is a public network IP address. When the authentication server locally queries the fixed network account allocated to the address of the terminal device in the authentication request, if the fixed network account is beijing123456, the authentication server interactively queries identity information corresponding to the fixed network account from the service subscription server. And when the authentication server does not inquire the fixed network account number allocated to the address of the terminal equipment in the authentication request locally, the authentication server returns a correlation failure message to the terminal equipment.
When the terminal equipment is dialed and accessed to the network, the broadband access server receives a dialing request of the user equipment, records dialing process information, and synchronizes a fixed network account in the dialing process information and an address of the terminal equipment corresponding to the fixed network account to the automatic association server. The service ordering server records the registered information (identity card number, number and the like) when the user transacts the operator product package, generates a fixed network account when the user equipment dials to access the network, verifies whether the fixed network account and the password of the user are correct, and returns broadband information and the distributed fixed network account to the broadband access server when the fixed network account and the password are correct.
It should be noted that, the public network IP address has uniqueness, so there is no problem of query error, that is, the allocation record is queried or not queried. For improving readability, the public network IP address is preferably a public network address in IPv4 (fourth edition of internet communication protocol) format, but the information authentication method provided by the embodiment of the present disclosure is also applicable to a public network address in IPv6 (sixth edition of internet communication protocol) format.
And 104, desensitizing the identity information to obtain desensitized data.
In this step, the identity information includes a name and an identification number, for example, "name: zhang Sanfeng; the ID number is 123456789012345678". Desensitization processing is performed on the identity information to obtain desensitization data, for example, desensitization data is obtained as "name: * Feng, identification No. 12345 × × 678".
And 105, sending the desensitization data to the terminal equipment so that a user of the terminal equipment can confirm the correctness of the desensitization data.
In this step, the authentication server sends the desensitization data to the terminal device, and the terminal device may display the desensitization data at the front end, so that the user of the terminal device can confirm the correctness of the desensitization data. And when the user determines that the desensitization data is correct, namely the user clicks the corresponding control at the front end or inputs corresponding confirmation information, the authentication of the identity information of the terminal equipment is completed. Desensitization data is sent in the transmission process, and identity information cannot be completely displayed, so that personal information of a user is effectively prevented from being leaked, and the safety is improved.
In the embodiment of the disclosure, only the network environment is relied on, and the device and the service are not relied on, so that the technical scheme is simple and the development cost is low. Because the terminal equipment needs to allocate a fixed network account to the terminal equipment when dialing to access the network, the association relationship between the public network IP address and the fixed network account can be obtained after the dialing is successful and the public network IP address is allocated. Further, only the terminal device needs to send an authentication request to the authentication server, and the identity information of the user of the terminal device is inquired through the service ordering server. Therefore, the technical scheme provides information authentication service for the user in the home network without changing any equipment or service. The service access party does not need to be in butt joint development or carry out secondary transformation on a service system; meanwhile, the scheme is realized based on the existing broadband access server of the operator, and the operator is not required to carry out additional equipment investment.
In addition, the technical scheme is convenient to use and good in user experience. The authentication process is not sensitive to the user, is transparent to equipment and services, and can complete information authentication without any operation by the user as long as the user is based on the home network environment. The information authentication result can be obtained without inputting or sending any personal information in the authentication process, so that the leakage of the personal information can be effectively avoided.
Further, after desensitizing the identity information to obtain desensitization data (i.e. step 104), the method further includes: and randomly generating an identifier of desensitization data, and locally storing the mapping relation between the desensitization data and the identifier.
In the embodiment of the present disclosure, when the authentication server performs desensitization processing on the identity information to obtain desensitization data, an identifier, that is, an id, of the desensitization data is also randomly generated, for example, the id is VS25341fdf. The mapping of desensitization data to identities is stored locally for future use as proof data for real-name authentication.
In a preferred embodiment, the authentication server, when sending desensitization data to the terminal device, also sends the identification to the terminal device.
Fig. 2 shows another flowchart of an information authentication method provided by an embodiment of the present disclosure. Further, as shown in fig. 2, before the receiving the authentication request sent by the terminal device (i.e. step 101), the method further includes:
step 201, receiving an address of a terminal device and a fixed network account corresponding to the address of the terminal device, which are sent by a broadband access server.
And 202, locally storing the address of the terminal equipment and the fixed network account corresponding to the address of the terminal equipment.
In the embodiment of the disclosure, the fixed network account is generated by the service subscription server, and the public network IP address is generated by the broadband access server. When the user equipment dials to access the network, the broadband access server receives a dialing request of the user equipment, and receives the fixed network account and the bandwidth information returned by the service subscription server after interactively verifying that the fixed network account and the password of the user are correct. The broadband access server distributes a public network IP address corresponding to the fixed network account and a network with corresponding bandwidth for the user equipment, and synchronizes the fixed network account and the public network IP address (the address of the terminal equipment) corresponding to the fixed network account to the authentication server. The authentication server locally stores the address of the terminal equipment and the fixed network account corresponding to the address of the terminal equipment.
Further, after receiving the authentication request sent by the terminal device (i.e. step 101), and before acquiring the address of the terminal device in the authentication request (i.e. step 102), the method further includes: and receiving the dialing time and the disconnection time sent by the broadband access server. Locally inquiring a fixed network account corresponding to the address of the terminal device (in step 103), including: and in a time period between the dialing time and the disconnection time, locally inquiring a fixed network account corresponding to the address of the terminal equipment.
In the embodiment of the disclosure, when the broadband access server synchronizes the fixed network account and the address of the terminal device to the authentication server, the broadband access server also synchronizes the dialing time and the disconnection time to the authentication server. The public network IP address has timeliness, namely the public network IP address is effective between the dialing time and the disconnection time. In step 103, in the time period between the dialing time and the disconnection time, the address of the terminal device is valid, and the fixed network account corresponding to the address of the terminal device is queried locally.
According to the embodiment of the disclosure, the mapping relation among the address of the terminal equipment at the current time, the fixed network account and the identity information can be established. Through the mapping relation, the safe, credible and convenient authentication process of the identity information of the terminal equipment is realized without manual operation of a user.
Fig. 3 shows a schematic structural diagram of an authentication server provided in an embodiment of the present disclosure. Based on the same technical concept as the embodiment corresponding to fig. 1, as shown in fig. 3, the authentication server provided by the embodiment of the present disclosure includes the following modules.
The receiving module 11 is configured to receive an authentication request sent by a terminal device.
A first obtaining module 12, configured to obtain an address of the terminal device in the authentication request.
The second obtaining module 13 is configured to, in response to locally querying the fixed network account corresponding to the address of the terminal device, obtain, from the service subscription server, identity information corresponding to the fixed network account.
And the processing module 14 is configured to perform desensitization processing on the identity information to obtain desensitization data.
A sending module 15, configured to send the desensitization data to the terminal device, so that a user of the terminal device confirms correctness of the desensitization data.
Preferably, the method further comprises the following steps:
and the generation module is used for randomly generating the identification of the desensitization data.
And the first storage module is used for locally storing the mapping relation between the desensitization data and the identification.
Preferably, the receiving module is further configured to receive an address of the terminal device and a fixed network account corresponding to the address of the terminal device, where the address is sent by the broadband access server.
The authentication server further comprises:
and the second storage module is used for locally storing the address of the terminal equipment and the fixed network account corresponding to the address of the terminal equipment.
Preferably, the address of the terminal device is a public network IP address.
Preferably, the receiving module 11 is further configured to receive the dialing time and the disconnection time sent by the broadband access server.
The locally querying, by the second obtaining module 13, the fixed network account corresponding to the address of the terminal device includes:
and in the time period between the dialing time and the disconnection time, locally inquiring a fixed network account corresponding to the address of the terminal equipment.
It is to be understood that the above embodiments are merely exemplary embodiments that are employed to illustrate the principles of the present disclosure, and that the present disclosure is not limited thereto. It will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the disclosure, and these are to be considered as the scope of the disclosure.

Claims (10)

1. An information authentication method, comprising:
receiving an authentication request sent by terminal equipment, and acquiring an address of the terminal equipment, wherein the authentication request is used for requesting authentication of the identity of a user of the terminal equipment;
responding to a fixed network account corresponding to the address of the terminal equipment which is inquired locally, and acquiring identity information corresponding to the fixed network account from a service ordering server;
desensitizing the identity information to obtain desensitization data, and sending the desensitization data to the terminal equipment so that a user of the terminal equipment can confirm the correctness of the desensitization data.
2. The information authentication method according to claim 1, further comprising, after desensitizing the identity information to obtain desensitization data:
and randomly generating an identifier of desensitization data, and locally storing the mapping relation between the desensitization data and the identifier.
3. The information authentication method according to claim 1, wherein before the receiving the authentication request sent by the terminal device, the method further comprises:
and receiving the address of the terminal equipment and the fixed network account corresponding to the address of the terminal equipment sent by the broadband access server, and locally storing the address of the terminal equipment and the fixed network account corresponding to the address of the terminal equipment.
4. The information authentication method according to claim 1 or 3, wherein the address of the terminal device is a public network IP address.
5. The information authentication method according to claim 3, wherein after receiving the authentication request sent by the terminal device and before acquiring the address of the terminal device in the authentication request, the method further comprises:
receiving the dialing time and the disconnection time sent by a broadband access server;
the local inquiry of the fixed network account corresponding to the address of the terminal equipment comprises the following steps:
and in the time period between the dialing time and the disconnection time, locally inquiring a fixed network account corresponding to the address of the terminal equipment.
6. An authentication server, comprising:
the terminal equipment comprises a receiving module, a sending module and a receiving module, wherein the receiving module is used for receiving an authentication request sent by terminal equipment, and the authentication request is used for requesting the identity of a user of the terminal equipment to be authenticated;
the first acquisition module is used for acquiring the address of the terminal equipment in the authentication request;
the second acquisition module is used for responding to a fixed network account corresponding to the address of the terminal equipment inquired locally and acquiring identity information corresponding to the fixed network account from a service ordering server;
the processing module is used for carrying out desensitization processing on the identity information to obtain desensitization data;
and the sending module is used for sending the desensitization data to the terminal equipment so that a user of the terminal equipment can confirm the correctness of the desensitization data.
7. The authentication server of claim 6, further comprising:
the generation module is used for randomly generating an identification of desensitization data;
and the first storage module is used for locally storing the mapping relation between the desensitization data and the identification.
8. The authentication server according to claim 6,
the receiving module is also used for receiving the address of the terminal equipment and the fixed network account corresponding to the address of the terminal equipment, which are sent by the broadband access server;
the authentication server further comprises:
and the second storage module is used for locally storing the address of the terminal equipment and the fixed network account corresponding to the address of the terminal equipment.
9. An authentication server according to claim 6 or 8, wherein the address of the terminal device is a public network IP address.
10. The authentication server of claim 8, wherein the receiving module is further configured to receive a dialing time and a disconnection time sent by a broadband access server;
the second obtaining module locally queries a fixed network account corresponding to the address of the terminal device, and the method includes:
and in the time period between the dialing time and the disconnection time, locally inquiring a fixed network account corresponding to the address of the terminal equipment.
CN202011279181.8A 2020-11-16 2020-11-16 Information authentication method and authentication server Active CN112491834B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011279181.8A CN112491834B (en) 2020-11-16 2020-11-16 Information authentication method and authentication server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011279181.8A CN112491834B (en) 2020-11-16 2020-11-16 Information authentication method and authentication server

Publications (2)

Publication Number Publication Date
CN112491834A CN112491834A (en) 2021-03-12
CN112491834B true CN112491834B (en) 2023-03-24

Family

ID=74930909

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011279181.8A Active CN112491834B (en) 2020-11-16 2020-11-16 Information authentication method and authentication server

Country Status (1)

Country Link
CN (1) CN112491834B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113570741A (en) * 2021-07-26 2021-10-29 深圳市即构科技有限公司 Interview check-in device and interview system

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1780206A (en) * 2004-11-23 2006-05-31 华为技术有限公司 Internet identity authentication and system
CN102036209A (en) * 2010-11-18 2011-04-27 南京安讯科技有限责任公司 Method and device for identity authentication and charging of mobile interconnection network user
CN102857485A (en) * 2012-03-22 2013-01-02 孙银海 System and method capable of showing authentication success of website
CN103037415A (en) * 2012-12-12 2013-04-10 深信服网络科技(深圳)有限公司 Network analytical method and system
CN103812836A (en) * 2012-11-12 2014-05-21 孙银海 System and method for website to send user reserved information
CN104754287A (en) * 2013-12-25 2015-07-01 中国电信股份有限公司 Video monitoring equipment configuration parameter issuing method and system
CN105335848A (en) * 2014-08-15 2016-02-17 中国电信股份有限公司 Broadband account number payment method and system, broadband payment platform and security certification platform
WO2017041716A1 (en) * 2015-09-07 2017-03-16 天地融科技股份有限公司 Remote account opening method and system, and identity authentication method and system thereof

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1780206A (en) * 2004-11-23 2006-05-31 华为技术有限公司 Internet identity authentication and system
CN102036209A (en) * 2010-11-18 2011-04-27 南京安讯科技有限责任公司 Method and device for identity authentication and charging of mobile interconnection network user
CN102857485A (en) * 2012-03-22 2013-01-02 孙银海 System and method capable of showing authentication success of website
CN103812836A (en) * 2012-11-12 2014-05-21 孙银海 System and method for website to send user reserved information
CN103037415A (en) * 2012-12-12 2013-04-10 深信服网络科技(深圳)有限公司 Network analytical method and system
CN104754287A (en) * 2013-12-25 2015-07-01 中国电信股份有限公司 Video monitoring equipment configuration parameter issuing method and system
CN105335848A (en) * 2014-08-15 2016-02-17 中国电信股份有限公司 Broadband account number payment method and system, broadband payment platform and security certification platform
WO2017041716A1 (en) * 2015-09-07 2017-03-16 天地融科技股份有限公司 Remote account opening method and system, and identity authentication method and system thereof

Also Published As

Publication number Publication date
CN112491834A (en) 2021-03-12

Similar Documents

Publication Publication Date Title
EP1314078B1 (en) Automatic network user identification
US8806596B2 (en) Authentication to an identity provider
CN108496380B (en) Server and storage medium
US20030046580A1 (en) Communication method and communication system
US9107072B2 (en) Seamless mobile subscriber identification
WO2004105333A1 (en) Safe virtual private network
US7496949B2 (en) Network system, proxy server, session management method, and program
US20140137223A1 (en) Method and apparatus for authenticating users of a hybrid terminal
US11165768B2 (en) Technique for connecting to a service
EP2017999A1 (en) The method, device and system for network service authenticating
CN102421097A (en) User authorization method, device and system
CN104247485A (en) Network application function authorisation in a generic bootstrapping architecture
EP4346256A1 (en) Implementation of one-key login service
CN104702562A (en) Terminal fusion service access method, terminal fusion service access system, and terminal
CN112491834B (en) Information authentication method and authentication server
US20080279116A1 (en) Method For Obtaining Configuration Data For a Terminal By Using the Dhcp Protocol
US7389418B2 (en) Method of and system for controlling access to contents provided by a contents supplier
US20130183934A1 (en) Methods for initializing and/or activating at least one user account for carrying out a transaction, as well as terminal device
CN101567879A (en) Method, server, equipment and system for treating terminal request
CN114158046B (en) Method and device for realizing one-key login service
AU2011214416A1 (en) Method and device for authenticating users of a hybrid terminal
WO2011131002A1 (en) Method and system for identity management
CN101478554A (en) 802.1X authentication method, apparatus, system, customer terminal, and network equipment
CN111464963B (en) Registration method of card-free terminal and identity registration server
CN106549918B (en) A kind of method and device of the transmission service abnormal cause page

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant