CN112616147B - Authentication method, device, equipment and storage medium - Google Patents

Authentication method, device, equipment and storage medium Download PDF

Info

Publication number
CN112616147B
CN112616147B CN202011446704.3A CN202011446704A CN112616147B CN 112616147 B CN112616147 B CN 112616147B CN 202011446704 A CN202011446704 A CN 202011446704A CN 112616147 B CN112616147 B CN 112616147B
Authority
CN
China
Prior art keywords
duration range
current authentication
target duration
authentication rejection
preset threshold
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011446704.3A
Other languages
Chinese (zh)
Other versions
CN112616147A (en
Inventor
刘康
张天瑜
张建国
许宁
舒敏
张东锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fibocom Wireless Inc
Original Assignee
Fibocom Wireless Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fibocom Wireless Inc filed Critical Fibocom Wireless Inc
Priority to CN202011446704.3A priority Critical patent/CN112616147B/en
Publication of CN112616147A publication Critical patent/CN112616147A/en
Application granted granted Critical
Publication of CN112616147B publication Critical patent/CN112616147B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/12Arrangements for detecting or preventing errors in the information received by using return channel
    • H04L1/16Arrangements for detecting or preventing errors in the information received by using return channel in which the return channel carries supervisory signals, e.g. repetition request signals
    • H04L1/18Automatic repetition systems, e.g. Van Duuren systems
    • H04L1/1867Arrangements specially adapted for the transmitter end
    • H04L1/188Time-out mechanisms

Abstract

The application relates to an authentication method, an authentication device, authentication equipment and a storage medium, wherein the authentication method comprises the following steps: when receiving an authentication rejection message sent by a network device, acquiring the current authentication rejection times; determining a target duration range corresponding to the current authentication rejection number according to the corresponding relation between the authentication rejection number and the timer duration range; the target duration range is the duration range of the timer; and determining the target duration within the target duration range, starting a timer, and starting a registration process when the target duration is reached. The technical scheme provided by the embodiment of the application can improve the registration efficiency of the terminal.

Description

Authentication method, device, equipment and storage medium
Technical Field
The present invention relates to the field of communications technologies, and in particular, to an authentication method, apparatus, device, and storage medium.
Background
Under the condition that the same power supply controls a plurality of terminals, after the terminals of a plurality of plug-in networking cards are electrified at the same time, the terminals can initiate requests for accessing the network, after the network side responds to the network requests of the terminals, authentication requests need to be sent to the terminals first, and whether the terminals requesting access are illegal users or arrearage users or not is judged.
When authenticating the terminal, if authentication is successful, sending authentication response to the network, and continuing the registration process until the registration is successful. But partial terminal authentication failure occurs, when authentication fails, according to the existing 3GPP communication protocol, the terminal starts a timer, the duration of the timer is a random number between 30 minutes and 60 minutes, and the request of accessing the network is initiated again after the timer is timed out until registration is successful.
However, this method has low registration efficiency of the terminal when authentication fails, resulting in waste of resources of the terminal.
Disclosure of Invention
Based on this, the embodiment of the application provides an authentication method, an authentication device and a storage medium, which can improve the registration efficiency of a terminal.
In a first aspect, there is provided an authentication method, the method comprising:
when receiving an authentication rejection message sent by a network device, acquiring the current authentication rejection times; determining a target duration range corresponding to the current authentication rejection number according to the corresponding relation between the authentication rejection number and the timer duration range; the target duration range is the duration range of the timer; and determining the target duration within the target duration range, starting a timer, and starting a registration process when the target duration is reached.
In one embodiment, determining the target duration range corresponding to the current authentication rejection number according to the correspondence between the authentication rejection number and the timer duration range includes:
comparing the current authentication rejection times with a preset time threshold to obtain a comparison result; and determining a target duration range corresponding to the current authentication rejection times according to the corresponding relation between the comparison result and the timer duration range.
In one embodiment, determining the target duration range corresponding to the current authentication rejection number according to the correspondence between the comparison result and the timer duration range includes:
if the comparison result shows that the current authentication rejection number is smaller than the first preset threshold value, the target duration range corresponding to the current authentication rejection number is the first duration range; if the comparison result shows that the current authentication rejection number is equal to the first preset threshold value, the target duration range corresponding to the current authentication rejection number is the second duration range; the minimum value of the second time length range is larger than the maximum value of the first time length range; if the comparison result shows that the current authentication rejection number is larger than the first preset threshold value, determining a target duration range corresponding to the current authentication rejection number according to the second preset threshold value; the second preset threshold is greater than the first preset threshold.
In one embodiment, determining the target duration range corresponding to the current authentication rejection number according to the second preset threshold includes:
if the comparison result is that the current authentication rejection number is larger than the first preset threshold value and smaller than the second preset threshold value, the target duration range corresponding to the current authentication rejection number is a first duration range; if the comparison result shows that the current authentication rejection number is greater than or equal to the second preset threshold value, the target duration range corresponding to the current authentication rejection number is a third duration range; the minimum value of the third time period range is greater than the maximum value of the second time period range.
In one embodiment, if the target duration range corresponding to the current authentication reject number is the third duration range, the method further includes:
after the timer is started, resetting the current authentication rejection number to 0, and starting the registration flow when the third duration range is reached.
In one embodiment, the first preset threshold is 10 times and the second preset threshold is 20 times.
In one embodiment, the first time period ranges from 5s to 20s, the second time period ranges from 1min to 2min, and the third time period ranges from 30min to 60min.
In one embodiment, determining the target duration within the target duration range includes:
Adding counting time length to the last stored random seed to obtain a current random seed; the counting time length is determined according to the value of a preset counter and the counting unit time length; and determining the random number as a target duration within the target duration range according to the current random seed.
In a second aspect, there is provided an authentication apparatus comprising:
the acquisition module is used for acquiring the current authentication rejection times when receiving the authentication rejection message sent by the network equipment;
the determining module is used for determining a target duration range corresponding to the current authentication rejection number according to the corresponding relation between the authentication rejection number and the timer duration range; the target duration range is the duration range of the timer;
the starting module is used for determining the target duration in the target duration range, starting the timer and starting the registration process when the target duration is reached.
In a third aspect, there is provided a computer device comprising a memory and a processor, the memory storing a computer program which, when executed by the processor, performs the method steps of any of the embodiments of the first aspect described above.
In a fourth aspect, a computer-readable storage medium is provided, on which a computer program is stored which, when executed by a processor, carries out the method steps in any of the embodiments of the first aspect described above.
The authentication method, the device, the equipment and the storage medium acquire the current authentication rejection times when receiving the authentication rejection message sent by the network equipment; determining a target duration range corresponding to the current authentication rejection number according to the corresponding relation between the authentication rejection number and the timer duration range; and determining the target duration within the target duration range, starting a timer, and starting a registration process when the target duration is reached. After the authentication of the terminal fails, the corresponding timer duration can be determined according to the authentication rejection times, so that the specific timer duration can be flexibly selected for the terminal according to actual conditions, the authentication efficiency of the terminal is improved, the network registration speed is accelerated, and the resources of the terminal are saved.
Drawings
FIG. 1 is a diagram of an application environment according to an embodiment of the present application;
fig. 2 is a flowchart of an authentication method provided in an embodiment of the present application;
fig. 3 is a flowchart of an authentication method according to an embodiment of the present application;
fig. 4 is a flowchart of an authentication method provided in an embodiment of the present application;
fig. 5 is a flowchart of an authentication method according to an embodiment of the present application;
fig. 6 is a block diagram of an authentication device according to an embodiment of the present application;
Fig. 7 is a block diagram of an authentication device according to an embodiment of the present application;
fig. 8 is a block diagram of an authentication device according to an embodiment of the present application;
fig. 9 is a block diagram of a terminal according to an embodiment of the present application.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the present application more apparent, the embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
The authentication method provided by the application can be applied to an application environment shown in fig. 1. Wherein the terminal 102 may communicate with the network device 104. The terminal 102 may be, but is not limited to, various personal computers, notebook computers, smart phones, tablet computers, and portable wearable devices.
The following will specifically describe the technical solutions of the present application and how the technical solutions of the present application solve the above technical problems by means of examples and with reference to the accompanying drawings. The following embodiments may be combined with each other, and the same or similar concepts or processes may not be described in detail in some embodiments. It should be noted that, in the authentication method provided in the present application, the execution body of fig. 2 to fig. 4 is a terminal, where the execution body may also be an authentication device, where the device may be implemented in a manner of software, hardware, or a combination of software and hardware to become part or all of the terminal.
In one embodiment, as shown in fig. 2, which shows a flowchart of an authentication method provided in an embodiment of the present application, the present embodiment relates to a process of starting a registration procedure according to a target duration, and the method may include the following steps:
step 201, when receiving an authentication rejection message sent by a network device, acquiring the current authentication rejection times.
After the terminal of the Internet of things card is powered on, the terminal can communicate with the network equipment only after network registration. In network registration, the terminal first selects a suitable cell to camp on, for example, by covering the geographical location of the terminal through a plurality of hexagonal networks, each of which is referred to as a cell, during the establishment of the network. When selecting a cell for camping, a suitable cell can be selected through information such as a location area where the terminal is located, cell signal strength and the like, for example, a cell camping with the strongest cell signal strength can be selected. When the terminal resides in a proper cell, a network attachment request is sent to the network equipment, after the network equipment receives the attachment request, authentication is needed to be carried out on the terminal, whether the terminal requesting access is an illegal user or an arrearage user or not is judged, at the moment, the network equipment sends an authentication request to the terminal, and the terminal carries out authentication operation.
In the process of authenticating the terminal, since the authentication request sent by the network device to the terminal carries an authentication parameter, the authentication parameter is a parameter required by the terminal in the process of performing authentication calculation, and the authentication parameter can include a user identification parameter, a resource identification parameter and the like, the user identification parameter is used for uniquely identifying the corresponding terminal, and the resource identification parameter is used for identifying the corresponding resource. The terminal can carry out operation processing on the authentication parameters according to the self security algorithm, judges whether the authentication is successful according to the operation processing result, if the authentication is successful, sends an authentication success message to the network equipment, and the network equipment continues the network registration flow after responding to the authentication success message.
However, after the terminals are powered on at the same time, the terminals can initiate attachment requests for accessing the network at the same time, and after the network equipment responds to the attachment requests of the terminals, an authentication request is sent to each terminal at the moment, and when the network signal is poor, partial terminal authentication failure may occur. In this case, the terminal sends an authentication failure message to the network device, where the authentication failure message may include a failure cause, and the failure cause may be a type of "MAC failure", where the type of failure cause is a type well known to those skilled in the art, and will not be described in detail herein. After the network equipment responds to the authentication failure message sent by the terminal, the terminal receives the authentication rejection message sent by the network equipment, and when receiving the authentication rejection message sent by the network equipment, the terminal acquires the current authentication rejection times. After receiving the authentication rejection message sent by the network device, the terminal starts the timer, so that when the timer time arrives, the network registration process is restarted, and the same as the previous network registration process is required to be subjected to the authentication process, therefore, the condition that the terminal fails in multiple authentications is also possible, the terminal adds one to the current authentication rejection number each time the authentication rejection message is received, and then repeatedly executes the process of restarting the network registration, wherein the acquired current authentication rejection number is the accumulated authentication failure number.
Step 202, determining a target duration range corresponding to the current authentication rejection number according to the corresponding relation between the authentication rejection number and the timer duration range; the target duration range is the duration range of the timer.
The corresponding relation between the authentication rejection times and the timer duration range can be a corresponding relation obtained by carrying out a large number of tests in advance according to actual conditions, the tests can be the duration spent on verifying that all terminals are successfully registered after powering up different numbers of terminals simultaneously, so that the test process of the corresponding relation is obtained, and the authentication rejection times can be a fixed threshold value or the authentication rejection times range.
For example, if the number of current authentication refusal is less than 10, the corresponding timer duration ranges from 5s to 20s; if the current authentication refusal times are equal to 10 times, the corresponding timer duration ranges from 1min to 2min; if the current authentication refusal times are more than 10 times and less than 20 times, the corresponding timer duration range is 5s to 20s; if the current authentication refusal times are more than or equal to 20 times, the corresponding timer duration ranges from 30min to 60min. And determining a target duration range corresponding to the current authentication rejection number according to the corresponding relation between the authentication rejection number and the timer duration range, for example, if the current authentication rejection number is 5 times, comparing the current authentication rejection number with a preset number threshold value to obtain a comparison result that the current authentication rejection number is less than 10 times, and the corresponding timer duration range is 5s to 20s.
Step 203, determining a target duration within the target duration range, starting a timer, and starting a registration process when the target duration is reached.
When the target duration is determined within the target duration range, a fixed duration value can be set within the target duration range as the target duration, the target duration can be determined by generating random numbers within the target duration range, and the generated random numbers are used as the target duration.
Optionally, when the target duration is determined in a manner of generating the random number, since the random number is generated by a random seed, the random seed is an initial value of the generated random number, a random seed can be set when the random number is generated for the first time, the random seed can be a fixed value, then the random seed can be continuously used for generating when the random number is generated, a new random seed can be replaced, and the replaced new random seed can also be the set fixed value or a value updated in real time. Thus, after the timer is started according to the determined target time length, the registration process is started when the target time length reaches, for example, the target time length is 6.5s, and when the target time length reaches 6.5s, the network registration process is restarted.
In this embodiment, when receiving an authentication rejection message sent by a network device, the current authentication rejection times are obtained; determining a target duration range corresponding to the current authentication rejection number according to the corresponding relation between the authentication rejection number and the timer duration range; and determining the target duration within the target duration range, starting a timer, and starting a registration process when the target duration is reached. After the authentication of the terminal fails, the corresponding timer duration can be determined according to the authentication rejection times, so that the specific timer duration can be flexibly selected for the terminal according to actual conditions, the authentication efficiency of the terminal is improved, the network registration speed is accelerated, and the resources of the terminal are saved.
In an embodiment, as shown in fig. 3, which shows a flowchart of an authentication method provided in the embodiment of the present application, the present embodiment refers to a possible process of determining a target duration range according to a correspondence between a comparison result and a timer duration range, and the method may include the following steps:
step 301, comparing the current authentication rejection times with a preset time threshold to obtain a comparison result.
The preset number of times threshold may include one threshold or may include multiple thresholds, for example, the preset number of times threshold may be "10 times" or may be two thresholds of "10 times" and "20 times". If the preset times threshold is 10 times, comparing the current authentication rejection times with the preset times threshold, wherein the obtained comparison result can be any one comparison result of less than 10 times, equal to 10 times and more than 10 times; if the preset times threshold is two thresholds of 10 times and 20 times, the comparison result obtained after comparing the current authentication rejection times with the preset times threshold can be any one of the comparison results of less than 10 times, equal to 10 times, more than 10 times and less than 20 times, more than or equal to 20 times.
Step 302, determining a target duration range corresponding to the current authentication rejection times according to the corresponding relation between the comparison result and the timer duration range.
Each comparison result corresponds to a timer duration range, each comparison result can correspond to a different timer duration range, and a plurality of comparison results can also correspond to the same timer duration range. And determining a target duration range corresponding to the current authentication rejection number according to the corresponding relation between the comparison result of the current authentication rejection number and the preset number threshold and the timer duration range.
In this embodiment, the comparison result is obtained by comparing the current authentication rejection number with the preset number threshold, and then the target duration range corresponding to the current authentication rejection number is determined according to the corresponding relationship between the comparison result and the timer duration range. Because the comparison rule is simple, the calculation amount can be saved, and the time for determining the target duration range is saved.
Optionally, in an embodiment, determining, according to a correspondence between the comparison result and the timer duration range, a target duration range corresponding to the current authentication rejection number includes: if the comparison result shows that the current authentication rejection number is smaller than the first preset threshold value, the target duration range corresponding to the current authentication rejection number is the first duration range; if the comparison result shows that the current authentication rejection number is equal to the first preset threshold value, the target duration range corresponding to the current authentication rejection number is the second duration range; the minimum value of the second time length range is larger than the maximum value of the first time length range; if the comparison result shows that the current authentication rejection number is larger than the first preset threshold value, determining a target duration range corresponding to the current authentication rejection number according to the second preset threshold value; the second preset threshold is greater than the first preset threshold.
The preset times threshold may include a first preset threshold, and the comparison result of the current authentication rejection times and the preset times threshold may be any one of less than the first preset threshold, equal to the first preset threshold, and greater than the first preset threshold. The target duration range may include a first duration range and a second duration range, and the comparison result smaller than the first preset threshold value may correspond to the first duration range, where the target duration range is the first duration range; the comparison result equal to the first preset threshold value can correspond to a second duration range, and the target duration range is the second duration range; and if the comparison result is larger than the first preset threshold, determining a target duration range corresponding to the current authentication rejection times according to the second preset threshold.
Alternatively, the first preset threshold may be 10 times, and the second preset threshold may be 20 times; the first time period may range from 5s to 20s and the second time period may range from 1min to 2min. The correspondence between the comparison result and the timer duration range may be: the comparison result is that the current authentication refusal times is less than 10 times, the corresponding timer duration ranges from 5s to 20s, and the target duration range corresponding to the current authentication refusal times is from 5s to 20s; the comparison result is that the current authentication refusal times are equal to 10 times, the corresponding timer duration ranges from 1min to 2min, and the target duration ranges from 1min to 2min corresponding to the current authentication refusal times; when the comparison result is that the current authentication rejection number is greater than 10 times and the target duration range corresponding to the current authentication rejection number is determined according to the second preset threshold, the comparison result can be any one of the current authentication rejection number which is greater than 10 times and less than 20 times, equal to 20 times and greater than 20 times, and each comparison result can correspond to a timer duration range, so that the target duration range corresponding to the current authentication rejection number is determined. For example, if the current authentication reject number is 5 times, comparing the current authentication reject number with the first preset threshold value to obtain a comparison result that the current authentication reject number is less than 10 times, and determining that the target duration range corresponding to the current authentication reject number is 5s to 20s according to the corresponding relation between the comparison result and the timer duration range.
In this embodiment, according to the corresponding relationship between the comparison result of the current authentication rejection number and the first preset threshold and the timer duration range, the target duration range corresponding to the current authentication rejection number is determined. The first preset threshold value is set through the actual test result, the current authentication rejection times are divided, the rationality of setting the timer duration ranges is guaranteed, different comparison results correspond to different timer duration ranges, different timer durations can be flexibly selected according to the actual situation, the authentication efficiency of the terminal is improved, and the network registration speed is accelerated.
In one embodiment, when the comparison result is that the current authentication reject number is greater than the first preset threshold, optionally, determining, according to the second preset threshold, a target duration range corresponding to the current authentication reject number includes: if the comparison result is that the current authentication rejection number is larger than the first preset threshold value and smaller than the second preset threshold value, the target duration range corresponding to the current authentication rejection number is a first duration range; if the comparison result shows that the current authentication rejection number is greater than or equal to the second preset threshold value, the target duration range corresponding to the current authentication rejection number is a third duration range; the minimum value of the third time period range is greater than the maximum value of the second time period range.
The comparison result may be any one of the current authentication reject number being greater than a first preset threshold and less than a second preset threshold and the current authentication reject number being greater than or equal to the second preset threshold. Alternatively, the first preset threshold may be 10 times, and the second preset threshold may be 20 times; the first time period may range from 5s to 20s, the second time period may range from 1min to 2min, and the third time period may range from 30min to 60min. Then, the comparison result can be that the current authentication rejection number is more than 10 times and less than 20 times, and the target duration range corresponding to the current authentication rejection number is 5s to 20s; the comparison result is that the current authentication refusal times are more than or equal to 20 times; the target duration range corresponding to the current authentication rejection times is 30min to 60min.
In this embodiment, if the comparison result is that the current authentication reject number is greater than the first preset threshold and less than the second preset threshold, the target duration range corresponding to the current authentication reject number is the first duration range; if the comparison result shows that the current authentication rejection number is greater than or equal to the second preset threshold value, the target duration range corresponding to the current authentication rejection number is the third duration range. The current authentication rejection times are further divided into ranges according to actual conditions by setting a second preset threshold, so that the rationality of setting the time length range of the timer is further ensured.
On the basis of the foregoing embodiment, if the target duration range corresponding to the current authentication reject number is the third duration range, the method further includes: after the timer is started, resetting the current authentication rejection number to 0, and starting the registration flow when the third duration range is reached.
Under the condition that the target duration range corresponding to the current authentication rejection number is the third duration range, the timer is required to be started according to the duration of the timer specified by the 3GPP communication protocol, and because the current authentication rejection number is the accumulated authentication failure number value, the target duration range corresponding to the current authentication rejection number is still determined according to the corresponding relation between the authentication rejection number and the timer duration range provided by the embodiment of the present application, and the timer cannot be started according to the duration of the timer specified by the 3GPP communication protocol, after the timer is started, the current authentication rejection number is required to be reset to be 0, and the registration process is started when the third duration range is reached.
In this embodiment, after the target timer is started, the current authentication reject number is reset to 0, and the registration procedure is started when the third duration range is reached. Under the condition that the target duration range corresponding to the current authentication rejection times is the third duration range, the terminal can still continue the registration process, and the situation that the terminal cannot be used thoroughly is avoided although the time is long, so that the resource waste of the terminal is also avoided.
In one embodiment, as shown in fig. 4, which shows a flowchart of an authentication method provided in the embodiment of the present application, the present embodiment relates to a possible process of updating random seeds in real time, and the method may include the following steps:
step 401, adding counting time length to the last stored random seed to obtain a current random seed; the counting time length is determined according to the value of the preset counter and the counting unit time length.
The counting time length is obtained according to a preset counter in the terminal, the preset counter can be a 32k counter, the 32k counter counts through vibration times generated by crystal oscillator in the terminal, and the counting time length can be obtained by multiplying the value of the preset counter by the counting unit time length of the preset counter. After the counting time length is obtained, the current random seed can be obtained by adding the counting time length to the random seed stored last time. For example, if the value of the preset counter is 20, the counting unit duration of the preset counter is 0.01s, the last stored random seed is 5.3s, at this time, the counting duration is 0.2s, and the current random seed is 5.5s.
Step 402, determining a random number as a target duration within a target duration range according to the current random seed.
After the current random seed is obtained, a random number can be generated in a target duration range according to a preset iterative algorithm for generating the random number, and the random number is used as the target duration. For example, when the current random seed is 5.5s and the random number generated according to the iterative algorithm is 6.5s, the target duration is 6.5s, and the network registration process can be restarted when the target duration reaches 6.5 s.
In this embodiment, the counting time length is added to the last stored random seed to obtain the current random seed, and the random number is determined as the target time length within the target time length range according to the current random seed. By adding a current counting time length to the last stored random seed and using the current counting time length as the current random seed to generate a random number, the randomness of the random seed can be ensured, the process that a plurality of terminals with authentication failures initiate network registration again and simultaneously is avoided, the success rate of authentication is improved, and the registration efficiency of the terminals is improved.
In one embodiment, please refer to fig. 5, which illustrates a flowchart of a page design method provided in an embodiment of the present application. As shown in fig. 5, the method comprises the steps of:
Step 501, when receiving an authentication rejection message sent by a network device, acquiring the current authentication rejection times.
Step 502, comparing the current authentication rejection times with a preset time threshold to obtain a comparison result.
Step 503, if the comparison result is that the current authentication reject number is less than 10, the target duration range corresponding to the current authentication reject number is 5s to 20s.
Step 504, if the comparison result is that the current authentication rejection number is equal to 10 times, the target duration range corresponding to the current authentication rejection number is 1min to 2min.
Step 505, if the comparison result is that the current authentication reject number is greater than 10 times and less than 20 times, the target duration range corresponding to the current authentication reject number is 5s to 20s.
Step 506, if the comparison result is that the current authentication reject number is greater than or equal to 20, the target duration range corresponding to the current authentication reject number is 30min to 60min.
Step 507, adding the counting time length to the last stored random seed to obtain the current random seed; the counting time length is determined according to the value of the preset counter and the counting unit time length.
Step 508, determining the random number as the target duration within the target duration range according to the current random seed.
Step 509, starting a timer, and starting a registration process when the target duration is reached.
The steps in the authentication method provided in this embodiment are similar to those in the foregoing embodiments of the authentication method in terms of implementation principle and technical effects, and are not described herein again. The implementation manner of each step in the embodiment of fig. 5 is merely an example, and the implementation manner is not limited, and the order of each step may be adjusted in practical application, so long as the purpose of each step can be achieved.
In the technical scheme provided by the embodiment of the application, after the authentication of the terminal fails, the corresponding timer duration can be determined according to the authentication rejection times, so that the specific timer duration can be flexibly selected for the terminal according to actual conditions, the authentication efficiency of the terminal is improved, the network registration speed is accelerated, and the resources of the terminal are saved.
It should be understood that, although the steps in the flowcharts of fig. 2-5 are shown in order as indicated by the arrows, these steps are not necessarily performed in order as indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in fig. 2-5 may include multiple steps or stages that are not necessarily performed at the same time, but may be performed at different times, nor does the order in which the steps or stages are performed necessarily performed in sequence, but may be performed alternately or alternately with at least a portion of the steps or stages in other steps or other steps.
In one embodiment, as shown in fig. 6, a block diagram of an authentication device 60 provided in an embodiment of the present application includes: an acquisition module 61, a determination module 62 and a starting module 63, wherein:
the obtaining module 61 is configured to obtain a current authentication rejection number when receiving an authentication rejection message sent by the network device.
A determining module 62, configured to determine a target duration range corresponding to the current authentication rejection number according to a correspondence between the authentication rejection number and the timer duration range; the target duration range is the duration range of the timer.
The starting module 63 is configured to determine a target duration within the target duration range, start a timer, and start a registration procedure when the target duration is reached.
In one embodiment, as shown in fig. 7, which shows a block diagram of an authentication device 70 provided in an embodiment of the present application, the determining module 62 includes a comparing unit 621 and a first determining unit 622, where:
and the comparing unit 621 is configured to compare the current authentication reject number with a preset number threshold to obtain a comparison result.
The first determining unit 622 is configured to determine, according to a correspondence between the comparison result and the timer duration range, a target duration range corresponding to the current authentication reject number.
In one embodiment, the determining unit 622 is specifically configured to: if the comparison result shows that the current authentication rejection number is smaller than the first preset threshold value, the target duration range corresponding to the current authentication rejection number is the first duration range; if the comparison result shows that the current authentication rejection number is equal to the first preset threshold value, the target duration range corresponding to the current authentication rejection number is the second duration range; the minimum value of the second time length range is larger than the maximum value of the first time length range; if the comparison result shows that the current authentication rejection number is larger than the first preset threshold value, determining a target duration range corresponding to the current authentication rejection number according to the second preset threshold value; the second preset threshold is greater than the first preset threshold.
In one embodiment, the determining unit 622 is further configured to: if the comparison result is that the current authentication rejection number is larger than the first preset threshold value and smaller than the second preset threshold value, the target duration range corresponding to the current authentication rejection number is a first duration range; if the comparison result shows that the current authentication rejection number is greater than or equal to the second preset threshold value, the target duration range corresponding to the current authentication rejection number is a third duration range; the minimum value of the third time period range is greater than the maximum value of the second time period range.
In one embodiment, the determining unit 622 is further configured to: after the timer is started, resetting the current authentication rejection number to 0, and starting the registration flow when the third duration range is reached.
In one embodiment, the first preset threshold is 10 times and the second preset threshold is 20 times.
In one embodiment, the first time period ranges from 5s to 20s, the second time period ranges from 1min to 2min, and the third time period ranges from 30min to 60min.
In one embodiment, as shown in fig. 8, which shows a block diagram of an authentication device 80 provided in an embodiment of the present application, the starting module 63 includes: an adding unit 631, and a second determining unit 632, wherein:
an adding unit 631 for adding the count duration to the last stored random seed to obtain a current random seed; the counting time length is determined according to the value of a preset counter and the counting unit time length.
The second determining unit 632 is configured to determine, as the target duration, a random number within the target duration range according to the current random seed.
For specific limitations of the authentication device, reference may be made to the above limitations of the authentication method, and no further description is given here. The respective modules in the authentication device described above may be implemented in whole or in part by software, hardware, and combinations thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may invoke and perform the operations of the above modules.
In one embodiment, a computer device is provided, which may be a terminal, and the internal structure thereof may be as shown in fig. 9. The computer device includes a processor, a memory, a communication interface, a display screen, and an input device connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The communication interface of the computer device is used for carrying out wired or wireless communication with an external terminal, and the wireless mode can be realized through WIFI, an operator network, NFC (near field communication) or other technologies. The computer program is executed by a processor to implement an authentication method. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, can also be keys, a track ball or a touch pad arranged on the shell of the computer equipment, and can also be an external keyboard, a touch pad or a mouse and the like.
It will be appreciated by those skilled in the art that the structure shown in fig. 9 is merely a block diagram of a portion of the structure associated with the present application and is not limiting of the computer device to which the present application applies, and that a particular computer device may include more or fewer components than shown, or may combine some of the components, or have a different arrangement of components.
In one embodiment of the present application, a computer device is provided, the computer device comprising a memory and a processor, the memory having stored therein a computer program, the processor, when executing the computer program, performing the steps of:
when receiving an authentication rejection message sent by a network device, acquiring the current authentication rejection times; determining a target duration range corresponding to the current authentication rejection number according to the corresponding relation between the authentication rejection number and the timer duration range; the target duration range is the duration range of the timer; and determining the target duration within the target duration range, starting a timer, and starting a registration process when the target duration is reached.
In one embodiment, the processor when executing the computer program further performs the steps of:
comparing the current authentication rejection times with a preset time threshold to obtain a comparison result; and determining a target duration range corresponding to the current authentication rejection times according to the corresponding relation between the comparison result and the timer duration range.
In one embodiment, determining a target duration range corresponding to the current authentication rejection number according to a correspondence between a comparison result and a timer duration range includes:
if the comparison result shows that the current authentication rejection number is smaller than the first preset threshold value, the target duration range corresponding to the current authentication rejection number is the first duration range; if the comparison result shows that the current authentication rejection number is equal to the first preset threshold value, the target duration range corresponding to the current authentication rejection number is the second duration range; the minimum value of the second time length range is larger than the maximum value of the first time length range; if the comparison result shows that the current authentication rejection number is larger than the first preset threshold value, determining a target duration range corresponding to the current authentication rejection number according to the second preset threshold value; the second preset threshold is greater than the first preset threshold.
In one embodiment, determining the target duration range corresponding to the current authentication reject number according to the second preset threshold includes:
if the comparison result is that the current authentication rejection number is larger than the first preset threshold value and smaller than the second preset threshold value, the target duration range corresponding to the current authentication rejection number is a first duration range; if the comparison result shows that the current authentication rejection number is greater than or equal to the second preset threshold value, the target duration range corresponding to the current authentication rejection number is a third duration range; the minimum value of the third time period range is greater than the maximum value of the second time period range.
In one embodiment, the processor when executing the computer program further performs the steps of:
after the timer is started, resetting the current authentication rejection number to 0, and starting the registration flow when the third duration range is reached.
In one embodiment, the first preset threshold is 10 times and the second preset threshold is 20 times.
In one embodiment, the first time period ranges from 5s to 20s, the second time period ranges from 1min to 2min, and the third time period ranges from 30min to 60min.
In one embodiment, the processor when executing the computer program further performs the steps of:
adding counting time length to the last stored random seed to obtain a current random seed; the counting time length is determined according to the value of a preset counter and the counting unit time length; and determining the random number as a target duration within the target duration range according to the current random seed.
The computer device provided in the embodiments of the present application has similar implementation principles and technical effects to those of the above method embodiments, and will not be described herein.
In one embodiment of the present application, a computer readable storage medium is provided having a computer program stored thereon, which when executed by a processor, performs the steps of:
When receiving an authentication rejection message sent by a network device, acquiring the current authentication rejection times; determining a target duration range corresponding to the current authentication rejection number according to the corresponding relation between the authentication rejection number and the timer duration range; the target duration range is the duration range of the timer; and determining the target duration within the target duration range, starting a timer, and starting a registration process when the target duration is reached.
In one embodiment, the computer program when executed by the processor further performs the steps of:
comparing the current authentication rejection times with a preset time threshold to obtain a comparison result; and determining a target duration range corresponding to the current authentication rejection times according to the corresponding relation between the comparison result and the timer duration range.
In one embodiment, determining a target duration range corresponding to the current authentication rejection number according to a correspondence between a comparison result and a timer duration range includes:
if the comparison result shows that the current authentication rejection number is smaller than the first preset threshold value, the target duration range corresponding to the current authentication rejection number is the first duration range; if the comparison result shows that the current authentication rejection number is equal to the first preset threshold value, the target duration range corresponding to the current authentication rejection number is the second duration range; the minimum value of the second time length range is larger than the maximum value of the first time length range; if the comparison result shows that the current authentication rejection number is larger than the first preset threshold value, determining a target duration range corresponding to the current authentication rejection number according to the second preset threshold value; the second preset threshold is greater than the first preset threshold.
In one embodiment, determining the target duration range corresponding to the current authentication reject number according to the second preset threshold includes:
if the comparison result is that the current authentication rejection number is larger than the first preset threshold value and smaller than the second preset threshold value, the target duration range corresponding to the current authentication rejection number is a first duration range; if the comparison result shows that the current authentication rejection number is greater than or equal to the second preset threshold value, the target duration range corresponding to the current authentication rejection number is a third duration range; the minimum value of the third time period range is greater than the maximum value of the second time period range.
In one embodiment, the computer program when executed by the processor further performs the steps of:
after the timer is started, resetting the current authentication rejection number to 0, and starting the registration flow when the third duration range is reached.
In one embodiment, the first preset threshold is 10 times and the second preset threshold is 20 times.
In one embodiment, the first time period ranges from 5s to 20s, the second time period ranges from 1min to 2min, and the third time period ranges from 30min to 60min.
In one embodiment, the computer program when executed by the processor further performs the steps of:
adding counting time length to the last stored random seed to obtain a current random seed; the counting time length is determined according to the value of a preset counter and the counting unit time length; and determining the random number as a target duration within the target duration range according to the current random seed.
The computer readable storage medium provided in this embodiment has similar principles and technical effects to those of the above method embodiment, and will not be described herein.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the various embodiments provided herein may include non-volatile and/or volatile memory. The nonvolatile memory can include Read Only Memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), memory bus direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), among others.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The foregoing examples represent only a few embodiments of the present application, which are described in more detail and are not thereby to be construed as limiting the scope of the claims. It should be noted that it would be apparent to those skilled in the art that various modifications and improvements could be made without departing from the spirit of the present application, which would be within the scope of the present application. Accordingly, the scope of protection of the present application is to be determined by the claims appended hereto.

Claims (10)

1. A method of authentication, the method comprising:
when receiving an authentication rejection message sent by a network device, acquiring the current authentication rejection times;
comparing the current authentication rejection times with a preset time threshold to obtain a comparison result; determining a target duration range corresponding to the current authentication rejection times according to the corresponding relation between the comparison result and the timer duration range; the target duration range is the duration range of the timer;
And determining a target duration within the target duration range, starting the timer, and starting a registration process when the target duration is reached.
2. The method according to claim 1, wherein the determining the target duration range corresponding to the current authentication reject number according to the correspondence between the comparison result and the timer duration range includes:
if the comparison result shows that the current authentication rejection number is smaller than a first preset threshold value, the target duration range corresponding to the current authentication rejection number is a first duration range;
if the comparison result shows that the current authentication rejection number is equal to the first preset threshold value, the target duration range corresponding to the current authentication rejection number is a second duration range; the minimum value of the second time length range is larger than the maximum value of the first time length range;
if the comparison result shows that the current authentication rejection number is larger than the first preset threshold value, determining a target duration range corresponding to the current authentication rejection number according to a second preset threshold value; the second preset threshold is greater than the first preset threshold.
3. The method according to claim 2, wherein the determining, according to a second preset threshold, the target duration range corresponding to the current authentication reject number includes:
If the comparison result is that the current authentication rejection number is larger than the first preset threshold value and smaller than the second preset threshold value, the target duration range corresponding to the current authentication rejection number is a first duration range;
if the comparison result shows that the current authentication rejection number is greater than or equal to the second preset threshold value, the target duration range corresponding to the current authentication rejection number is a third duration range; the minimum value of the third duration range is greater than the maximum value of the second duration range.
4. The method of claim 3, wherein if the target duration range corresponding to the current authentication reject number is a third duration range, the method further comprises:
after the timer is started, resetting the current authentication rejection number to 0, and starting a registration process when the third duration range is reached.
5. The method of any one of claims 2-4, wherein the first preset threshold is 10 times and the second preset threshold is 20 times.
6. The method of any one of claims 3 or 4, wherein the first time period ranges from 5s to 20s, the second time period ranges from 1min to 2min, and the third time period ranges from 30min to 60min.
7. The method of any of claims 1-4, wherein determining a target duration within the target duration range comprises:
adding counting time length to the last stored random seed to obtain a current random seed; the counting time length is determined according to the value of a preset counter and the counting unit time length;
and determining a random number as the target duration within the target duration range according to the current random seed.
8. An authentication device, the device comprising:
the acquisition module is used for acquiring the current authentication rejection times when receiving the authentication rejection message sent by the network equipment;
the determining module is used for comparing the current authentication rejection times with a preset time threshold value to obtain a comparison result; determining a target duration range corresponding to the current authentication rejection times according to the corresponding relation between the comparison result and the timer duration range; the target duration range is the duration range of the timer;
the starting module is used for determining the target duration within the target duration range, starting the timer and starting the registration flow when the target duration is reached.
9. A computer device comprising a memory and a processor, the memory storing a computer program which, when executed by the processor, implements the steps of the method of any of claims 1 to 7.
10. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 7.
CN202011446704.3A 2020-12-11 2020-12-11 Authentication method, device, equipment and storage medium Active CN112616147B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011446704.3A CN112616147B (en) 2020-12-11 2020-12-11 Authentication method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011446704.3A CN112616147B (en) 2020-12-11 2020-12-11 Authentication method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN112616147A CN112616147A (en) 2021-04-06
CN112616147B true CN112616147B (en) 2023-05-09

Family

ID=75234486

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011446704.3A Active CN112616147B (en) 2020-12-11 2020-12-11 Authentication method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN112616147B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113793153A (en) * 2021-08-18 2021-12-14 宜卡科技(深圳)有限公司 Authentication channel selection method, terminal and readable storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017113063A1 (en) * 2015-12-28 2017-07-06 华为技术有限公司 Nas message processing and cell list updating methods and devices
WO2020034868A1 (en) * 2018-08-17 2020-02-20 维沃移动通信有限公司 Connection processing method and device

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101145965A (en) * 2007-07-17 2008-03-19 中兴通讯股份有限公司 A method and device for automatic login to telecommunication network management
CN102958101A (en) * 2012-12-03 2013-03-06 李俊 Method for avoiding wireless channel congestion on wireless communication terminal
CN114615703A (en) * 2018-10-09 2022-06-10 华为技术有限公司 Network slice access control method and device
CN109548020B (en) * 2018-12-13 2022-08-12 网宿科技股份有限公司 Compensation method and device after authentication failure, server and storage medium

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017113063A1 (en) * 2015-12-28 2017-07-06 华为技术有限公司 Nas message processing and cell list updating methods and devices
WO2020034868A1 (en) * 2018-08-17 2020-02-20 维沃移动通信有限公司 Connection processing method and device

Also Published As

Publication number Publication date
CN112616147A (en) 2021-04-06

Similar Documents

Publication Publication Date Title
CN109842611B (en) Identity authentication method, identity authentication device, computer equipment and storage medium
CN111949953A (en) Identity authentication method, system and device based on block chain and computer equipment
CN109462602B (en) Login information storage method, login verification method, device, equipment and medium
CN106357694B (en) Access request processing method and device
CN110944319B (en) 5G communication identity verification method, equipment and storage medium
CN111614548A (en) Message pushing method and device, computer equipment and storage medium
US20190116043A1 (en) Control method for enrolling face template data and related product
CN111866850A (en) Configuration file switching method and device, computer equipment and storage medium
CN110830280A (en) Micro-service gateway device and method and electronic equipment
CN109286933B (en) Authentication method, device, system, computer equipment and storage medium
CN109379779B (en) Dialing networking method and device, computer equipment and storage medium
WO2021169305A1 (en) Voiceprint data processing method and apparatus, computer device, and storage medium
CN112616147B (en) Authentication method, device, equipment and storage medium
CN111737681A (en) Resource acquisition method and device, storage medium and electronic device
CN113872990A (en) VPN network certificate authentication method and device based on SSL protocol and computer equipment
CN109906452B (en) Authentication method, authentication equipment and authentication system
CN110798432A (en) Security authentication method, device and system and mobile terminal
CN107204959B (en) Verification method, device and system of verification code
CN111371755A (en) Voiceprint data processing method and device, computer equipment and storage medium
CN111898110A (en) Method, device, server and storage medium for acquiring user identity information
CN114338132B (en) Secret-free login method, client application, operator server and electronic equipment
CN113742681B (en) Account management method and device, computer equipment and storage medium
US11936798B2 (en) Securing a provable resource possession
CN113114623A (en) Data connection method, device, terminal equipment and computer readable storage medium
CN111310130A (en) Authorization authentication processing method, device, storage medium and electronic device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant