CN113660098A - Information authentication storage method and system based on big data - Google Patents

Information authentication storage method and system based on big data Download PDF

Info

Publication number
CN113660098A
CN113660098A CN202110978572.7A CN202110978572A CN113660098A CN 113660098 A CN113660098 A CN 113660098A CN 202110978572 A CN202110978572 A CN 202110978572A CN 113660098 A CN113660098 A CN 113660098A
Authority
CN
China
Prior art keywords
terminal equipment
information
user terminal
information authentication
big data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110978572.7A
Other languages
Chinese (zh)
Inventor
蒋妙法
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202110978572.7A priority Critical patent/CN113660098A/en
Publication of CN113660098A publication Critical patent/CN113660098A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides an information authentication storage method and system based on big data, after mutual authentication is carried out by an information authentication storage terminal device and a user terminal device, the information authentication storage terminal device receives big data information transmitted by the user terminal device, so that the invention can carry out encryption transmission during data storage, and can prevent other external personnel from stealing data to be stored or stored. In addition, after the flow bandwidth on the wireless communication link is dynamically adjusted, the big data information is not transmitted quickly in the transmission process or slowly in the transmission process, but is stably transmitted on the communication link, so that the problem of network congestion when the user terminal equipment transmits data to the information authentication storage terminal equipment can be solved, and the problem that the flow bandwidth cannot be fully used can be solved.

Description

Information authentication storage method and system based on big data
Technical Field
The invention relates to the technical field of big data, in particular to an information authentication storage method and system based on big data.
Background
In recent years, information technologies such as big data and cloud computing are developed and are more and more widely applied to various industries, so that the life of people is more convenient. However, as demand and business continue to evolve, the data generated also grows geometrically. The large-scale data set has immeasurable value, and the relationship among the data plays an important role in the operation and decision of company enterprises. When mass data is processed and stored in a centralized manner, security problems of the mass data also face greater and greater challenges, and data stored by a user is easily stolen by others, so that loss of the user is caused.
Disclosure of Invention
In view of the above disadvantages of the prior art, an object of the present invention is to provide an information authentication storage method and system based on big data, which are used to solve the problem in the prior art that data is easily stolen by others when being stored.
In order to achieve the above objects and other related objects, the present invention provides a big data based information authentication storage method, including the steps of:
acquiring big data information generated on user terminal equipment, and establishing communication connection between the user terminal equipment and information authentication terminal equipment based on the big data information;
after the communication connection is established, the information authentication terminal equipment is controlled to receive an authentication request from the user terminal equipment, the validity of a public key certificate of the user terminal equipment is authenticated according to the authentication request, and after the validity verification is passed, a central certificate and a corresponding authentication certificate chain in the information authentication terminal equipment are responded to the user terminal equipment; controlling the information authentication terminal equipment to receive an information authentication storage request from the user terminal equipment, and remotely injecting an encryption key into the user terminal equipment according to the information authentication storage request;
and encrypting the big data information generated on the user terminal equipment by using the encryption key, transmitting the encrypted big data information to the information authentication terminal equipment for information authentication according to the communication connection which is pre-established between the user terminal equipment and the information authentication terminal equipment, and storing the big data information into the information authentication terminal equipment after the information authentication is finished.
Optionally, the process of establishing a communication connection between the user terminal device and the information authentication terminal device includes:
acquiring a serial number generated on the information authentication terminal equipment;
generating a communication access request of the information authentication terminal equipment according to the big data information;
acquiring verification information stored in a server by the user terminal equipment based on the communication access request;
verifying the serial number by using the verification information, and determining whether the serial number exists in a directory corresponding to the verification information; if the information authentication terminal device exists completely, establishing communication connection between the user terminal device and the information authentication terminal device; and if the information authentication terminal device does not exist completely, the communication connection between the user terminal device and the information authentication terminal device is not established.
Optionally, after the user terminal device establishes a communication connection with the information authentication terminal device, the method further includes:
acquiring a flow configuration request generated by a target user on the user terminal equipment;
creating at least one sub-traffic pool according to the traffic configuration request, and acquiring partial traffic bandwidth from a total traffic pool as initial traffic bandwidth of the sub-traffic pool after the creation of the sub-traffic pool is completed;
and equally dividing the initial flow bandwidth into wireless communication links in the user terminal equipment and the information authentication terminal equipment after the communication connection is established.
Optionally, the method further comprises: after information authentication is completed, acquiring the transmission duration of the big data information on the wireless communication link;
and judging whether the transmission time length is within a preset time length range, if not, dynamically adjusting the initial flow bandwidth on the wireless communication link, and controlling the transmission time length of the big data information on the wireless communication link to be within the preset time length range.
Optionally, the method further comprises: if the transmission duration is less than the minimum value in the preset duration range, reducing the initial flow bandwidth in the wireless communication link, transmitting the big data information to the information authentication terminal equipment by using the communication link with the reduced flow bandwidth, and controlling the transmission duration of the big data information to be within the preset duration range;
if the transmission time length is larger than the maximum value in the preset time length range, acquiring part or all of the traffic bandwidth from the residual traffic bandwidth of the total traffic pool, superposing the acquired part or all of the traffic bandwidth on the wireless communication link to form a superposed communication link, transmitting the big data information to the information authentication terminal equipment by utilizing the superposed communication link, and controlling the transmission time length of the big data information to be in the preset time length range.
Optionally, the method further comprises: acquiring a response message of address allocation equipment aiming at the user terminal equipment, wherein the response message carries a network address and a physical address of the user terminal equipment;
controlling the authentication information processing equipment to determine the authentication information of the user terminal equipment according to the response message;
and the authentication information processing equipment sends the authentication information to an authentication server so that the authentication server performs access authentication on the user terminal equipment according to the authentication information.
The invention also provides an information authentication storage system based on big data, which comprises:
the communication module is used for acquiring big data information generated on the user terminal equipment and establishing communication connection between the user terminal equipment and the information authentication terminal equipment based on the big data information;
the information authentication module is used for controlling the information authentication terminal equipment to receive an authentication request from the user terminal equipment after communication connection is established, authenticating the legality of a public key certificate of the user terminal equipment according to the authentication request, and responding a central certificate in the information authentication terminal equipment and a corresponding authentication certificate chain to the user terminal equipment after the legality verification is passed; controlling the information authentication terminal equipment to receive an information authentication storage request from the user terminal equipment, and remotely injecting an encryption key into the user terminal equipment according to the information authentication storage request;
and the encryption storage module is used for encrypting the big data information generated on the user terminal equipment by using the encryption key, transmitting the encrypted big data information to the information authentication terminal equipment for information authentication according to the communication connection which is pre-established between the user terminal equipment and the information authentication terminal equipment, and storing the big data information into the information authentication terminal equipment after the information authentication is finished.
Optionally, the process of establishing a communication connection between the user terminal device and the information authentication terminal device includes:
acquiring a serial number generated on the information authentication terminal equipment;
generating a communication access request of the information authentication terminal equipment according to the big data information;
acquiring verification information stored in a server by the user terminal equipment based on the communication access request;
verifying the serial number by using the verification information, and determining whether the serial number exists in a directory corresponding to the verification information; if the information authentication terminal device exists completely, establishing communication connection between the user terminal device and the information authentication terminal device; and if the information authentication terminal device does not exist completely, the communication connection between the user terminal device and the information authentication terminal device is not established.
Optionally, after the user terminal device establishes a communication connection with the information authentication terminal device, the method further includes:
acquiring a flow configuration request generated by a target user on the user terminal equipment;
creating at least one sub-traffic pool according to the traffic configuration request, and acquiring partial traffic bandwidth from a total traffic pool as initial traffic bandwidth of the sub-traffic pool after the creation of the sub-traffic pool is completed;
and equally dividing the initial flow bandwidth into wireless communication links in the user terminal equipment and the information authentication terminal equipment after the communication connection is established.
Optionally, the method further comprises: after information authentication is completed, acquiring the transmission duration of the big data information on the wireless communication link;
judging whether the transmission time length is within a preset time length range, if not, dynamically adjusting the initial flow bandwidth on the wireless communication link, and controlling the transmission time length of the big data information on the wireless communication link to be within the preset time length range;
if the transmission duration is less than the minimum value in the preset duration range, reducing the initial flow bandwidth in the wireless communication link, transmitting the big data information to the information authentication terminal equipment by using the communication link with the reduced flow bandwidth, and controlling the transmission duration of the big data information to be within the preset duration range;
if the transmission time length is larger than the maximum value in the preset time length range, acquiring part or all of the traffic bandwidth from the residual traffic bandwidth of the total traffic pool, superposing the acquired part or all of the traffic bandwidth on the wireless communication link to form a superposed communication link, transmitting the big data information to the information authentication terminal equipment by utilizing the superposed communication link, and controlling the transmission time length of the big data information to be in the preset time length range.
As described above, the present invention provides an information authentication storage method and system based on big data, which has the following beneficial effects: the method comprises the steps of firstly, acquiring big data information generated on user terminal equipment, and establishing communication connection between the user terminal equipment and information authentication terminal equipment based on the big data information; after the communication connection is established, the information authentication terminal equipment is controlled to receive an authentication request from the user terminal equipment, the validity of a public key certificate of the user terminal equipment is authenticated according to the authentication request, and after the validity verification is passed, a central certificate and a corresponding authentication certificate chain in the information authentication terminal equipment are responded to the user terminal equipment; controlling the information authentication terminal equipment to receive an information authentication storage request from the user terminal equipment, and remotely injecting an encryption key into the user terminal equipment according to the information authentication storage request; and encrypting the big data information generated on the user terminal equipment by using the encryption key, transmitting the encrypted big data information to the information authentication terminal equipment for information authentication according to the communication connection which is pre-established between the user terminal equipment and the information authentication terminal equipment, and storing the big data information into the information authentication terminal equipment after the information authentication is finished. Therefore, after mutual verification is carried out by the information authentication storage terminal equipment and the user terminal equipment, the information authentication storage terminal equipment receives the big data information transmitted by the user terminal equipment, so that the data storage system can carry out encryption transmission during data storage, and can prevent other external personnel from stealing the data to be stored or stored. In addition, after the flow bandwidth on the wireless communication link is dynamically adjusted, the big data information is not transmitted quickly in the transmission process or slowly in the transmission process, but is stably transmitted on the communication link, so that the problem of network congestion when the user terminal equipment transmits data to the information authentication storage terminal equipment can be solved, and the problem that the flow bandwidth cannot be fully used can be solved.
Drawings
Fig. 1 is a schematic flowchart of an information authentication storage method based on big data according to an embodiment;
FIG. 2 is a flow diagram illustrating establishing a communication connection according to an embodiment;
FIG. 3 is a flow diagram illustrating the allocation of traffic for a wireless communication link according to one embodiment;
fig. 4 is a schematic hardware structure diagram of an information authentication storage system based on big data according to an embodiment.
Detailed Description
The embodiments of the present invention are described below with reference to specific embodiments, and other advantages and effects of the present invention will be easily understood by those skilled in the art from the disclosure of the present specification. The invention is capable of other and different embodiments and of being practiced or of being carried out in various ways, and its several details are capable of modification in various respects, all without departing from the spirit and scope of the present invention. It is to be noted that the features in the following embodiments and examples may be combined with each other without conflict.
It should be noted that the drawings provided in the following embodiments are only for illustrating the basic idea of the present invention, and the components related to the present invention are only shown in the drawings rather than drawn according to the number, shape and size of the components in actual implementation, and the type, quantity and proportion of the components in actual implementation may be changed freely, and the layout of the components may be more complicated.
Referring to fig. 1, the present invention provides an information authentication and storage method based on big data, which includes the following steps:
s110, acquiring big data information generated on user terminal equipment, and establishing communication connection between the user terminal equipment and information authentication terminal equipment based on the big data information;
s120, after the communication connection is established, controlling the information authentication terminal equipment to receive an authentication request from the user terminal equipment, authenticating the legality of a public key certificate of the user terminal equipment according to the authentication request, and responding a central certificate and a corresponding authentication certificate chain in the information authentication terminal equipment to the user terminal equipment after the legality verification is passed; controlling the information authentication terminal equipment to receive an information authentication storage request from the user terminal equipment, and remotely injecting an encryption key into the user terminal equipment according to the information authentication storage request;
s130, the big data information generated on the user terminal equipment is encrypted by using the encryption key, the encrypted big data information is transmitted to the information authentication terminal equipment for information authentication according to the communication connection which is pre-established between the user terminal equipment and the information authentication terminal equipment, and the big data information is stored in the information authentication terminal equipment after the information authentication is finished.
As an example, a specific process of the user terminal device initiating the authentication request includes: establishing network connection between user terminal equipment and information authentication terminal equipment; according to the message format of the network link of the established network connection, the session feature code for carrying out the key distribution transaction and the public key certificate of the user terminal equipment are sent to the information authentication terminal equipment, and an authentication request is sent to the information authentication terminal equipment. Specifically, the public key certificate of the user terminal device is preset in the user terminal device and is a public key certificate issued by the user terminal device certificate issuing center. And calling a pseudo-random number generation interface by the user terminal equipment, randomly generating a character string consisting of 16-byte hash codes, and distributing the character string serving as a key to the transaction session feature code. Establishing network connection between user terminal equipment and information authentication terminal equipment; and according to the message format of the network link of the established network connection, sending the public key certificate of the session feature code user terminal equipment to the information authentication terminal equipment, and authenticating the legality of the user terminal equipment by the information authentication terminal equipment.
The specific process of using the information authentication terminal device to authenticate the validity of the public key certificate of the user terminal device includes: performing first validity authentication on a public key certificate of the user terminal equipment based on a certificate authentication public key preset in the information authentication terminal equipment; if the first authentication fails, the public key certificate of the user terminal equipment is considered to be illegal; if the first authentication is successful, analyzing the public key certificate of the user terminal equipment, and acquiring the corresponding public key certificate identity information terminal serial number and the user terminal equipment public key; matching the serial number of the public key certificate identity information terminal with the hardware serial number of the user terminal equipment, and performing second validity authentication; if the matching fails, the public key certificate of the user terminal equipment is considered to be illegal; if the matching is successful, the public key certificate of the user terminal equipment is considered to be legal; and the public key certificate of the user terminal equipment passes the validity authentication of the information authentication terminal equipment. Specifically, the information authentication terminal device is preset with a certificate authentication public key of a certificate issuing center of the user terminal device. And verifying the validity of the public key certificate of the user terminal equipment, and if the authentication fails, terminating the transaction process by the information authentication terminal equipment without responding to the user terminal equipment. Firstly, performing first authentication, using a certificate authentication public key to verify whether a public key certificate of the user terminal equipment is legal or not through the information authentication terminal equipment, and if the first authentication fails, considering that the public key certificate of the user terminal equipment is illegal. If the first authentication is successful, the public key certificate content of the user terminal equipment is analyzed through the information authentication terminal equipment, and the identity information terminal serial number of the public key certificate and the public key of the user terminal equipment are obtained. Matching the serial number of the public key certificate identity information terminal with the hardware serial number of the user terminal equipment, and performing second validity authentication; if the information authentication terminal equipment does not approve the public key certificate identity information terminal serial number information, namely the information is not matched with the terminal hardware serial number, the second authentication is failed, and the public key certificate of the user terminal equipment is illegal. If the information authentication terminal equipment approves the public key certificate identity information terminal serial number information, namely the information is matched with the terminal hardware serial number, the second authentication is successful, and the public key certificate of the user terminal equipment is legal. After the first authentication and the second authentication of the public key certificate of the user terminal equipment by the information authentication terminal equipment are both successful, the public key certificate of the user terminal equipment is considered to be legal.
Therefore, after mutual verification is carried out by the information authentication storage terminal equipment and the user terminal equipment, the information authentication storage terminal equipment receives the big data information transmitted by the user terminal equipment, so that the embodiment can carry out encryption transmission during data storage, and can prevent other external personnel from stealing the data to be stored or stored.
In an exemplary embodiment, as shown in fig. 2, the process of establishing a communication connection between the user terminal device and the information authentication terminal device includes:
s210, acquiring a serial number generated on the information authentication terminal equipment;
s220, generating a communication access request of the information authentication terminal equipment according to the big data information;
s230, acquiring the verification information stored in the server by the user terminal equipment based on the communication access request;
s240, verifying the serial number by using the verification information, and determining whether the serial number exists in a directory corresponding to the verification information; if the information authentication terminal device exists completely, establishing communication connection between the user terminal device and the information authentication terminal device; and if the information authentication terminal device does not exist completely, the communication connection between the user terminal device and the information authentication terminal device is not established.
In an exemplary embodiment, as shown in fig. 3, after the user terminal device establishes a communication connection with the information authentication terminal device, the method further includes:
s310, acquiring a flow configuration request generated by a target user on the user terminal equipment;
s320, creating at least one sub-traffic pool according to the traffic configuration request, and acquiring partial traffic bandwidth from the total traffic pool as the initial traffic bandwidth of the sub-traffic pool after the creation of the sub-traffic pool is completed;
s330, the initial flow bandwidth is evenly distributed in a wireless communication link between the user terminal equipment and the information authentication terminal equipment after the communication connection is established.
For example, in the embodiment of the present application, 80 target users send traffic configuration requests, the server receives the traffic configuration requests sent by the 80 target users, and creates 10 sub-traffic pools in the target traffic pool according to the traffic configuration requests sent by the 80 target users, and each sub-traffic pool minus 8 wireless communication links allocates an initial traffic bandwidth. Due to the fact that links for transmitting the traffic configuration request are out-of-order and uncontrolled, the 10 sub-traffic pools may not be uniformly distributed in the 80 wireless communication links, and thus, it may happen that the traffic configured by the traffic configuration request received in one or more wireless communication links exceeds its initial traffic, so that some user terminal devices where target users are located may not obtain bandwidth or traffic, or obtain less bandwidth or traffic, and directly affect the use experience of the target users; and the flow in the other sub-flow pool can not be fully used and is in an idle state, so that the flow utilization rate is low. Specifically, there may be traffic configuration requests in which 20 to 30 wireless communication links allocate 50 to 70 target users, and the remaining 50 to 60 wireless communication links allocate the remaining 10 to 30 target users, so that most of the traffic configuration requests of the target users are concentrated in the 20 to 30 wireless communication links, and the remaining 50 to 60 wireless communication links have fewer traffic configuration requests, so that the remaining traffic of the remaining 50 to 60 wireless communication links is excessive and is in an idle state, and is not fully used, resulting in low traffic utilization rate. If the flow of each sub-flow pool is directly increased, not only can the production cost be increased, but also the problems continue to exist due to the characteristics of disordered and uncontrolled transmission of the link, which directly causes that the enterprise cannot increase the corresponding income while increasing the production cost, and also influences the use experience of the target user. The technical scheme is used for dynamically configuring the sub-flow pools with more or more concentrated flow configuration requests in real time and allocating more flows to the sub-flow pools, for example, the residual flows in the target flow pool are allocated to the sub-flow pools with more or more concentrated flow configuration requests, so that the idle flows in the target flow pool are fully utilized under the condition of not changing the existing total flow, the use experience of a target user can be increased, and the favorable comment of more target users can be obtained under the condition of not paying more production cost.
In an exemplary embodiment, further comprising: after information authentication is completed, acquiring the transmission duration of the big data information on the wireless communication link;
and judging whether the transmission time length is within a preset time length range, if not, dynamically adjusting the initial flow bandwidth on the wireless communication link, and controlling the transmission time length of the big data information on the wireless communication link to be within the preset time length range.
Specifically, if the transmission duration is less than the minimum value in the preset duration range, the initial traffic bandwidth in the wireless communication link is reduced, the communication link with the reduced traffic bandwidth is used to transmit the big data information to the information authentication terminal device, and the transmission duration of the big data information is controlled to be within the preset duration range. If the transmission time length is larger than the maximum value in the preset time length range, acquiring part or all of the traffic bandwidth from the residual traffic bandwidth of the total traffic pool, superposing the acquired part or all of the traffic bandwidth on the wireless communication link to form a superposed communication link, transmitting the big data information to the information authentication terminal equipment by utilizing the superposed communication link, and controlling the transmission time length of the big data information to be in the preset time length range.
Therefore, after the flow bandwidth on the wireless communication link is dynamically adjusted, the big data information is not transmitted quickly in the transmission process or slowly in the transmission process, but is stably transmitted on the communication link, so that the method can solve the problem of network congestion when the user terminal equipment transmits data to the information authentication storage terminal equipment, and can solve the problem that the flow bandwidth cannot be fully used.
In an exemplary embodiment, further comprising: acquiring a response message of address allocation equipment aiming at the user terminal equipment, wherein the response message carries a network address and a physical address of the user terminal equipment; controlling the authentication information processing equipment to determine the authentication information of the user terminal equipment according to the response message; and the authentication information processing equipment sends the authentication information to an authentication server so that the authentication server performs access authentication on the user terminal equipment according to the authentication information.
In summary, the method first obtains big data information generated on the user terminal device, and establishes a communication connection between the user terminal device and the information authentication terminal device based on the big data information; after the communication connection is established, the information authentication terminal equipment is controlled to receive an authentication request from the user terminal equipment, the validity of a public key certificate of the user terminal equipment is authenticated according to the authentication request, and after the validity verification is passed, a central certificate and a corresponding authentication certificate chain in the information authentication terminal equipment are responded to the user terminal equipment; controlling the information authentication terminal equipment to receive an information authentication storage request from the user terminal equipment, and remotely injecting an encryption key into the user terminal equipment according to the information authentication storage request; and encrypting the big data information generated on the user terminal equipment by using the encryption key, transmitting the encrypted big data information to the information authentication terminal equipment for information authentication according to the communication connection which is pre-established between the user terminal equipment and the information authentication terminal equipment, and storing the big data information into the information authentication terminal equipment after the information authentication is finished. Therefore, after mutual verification is carried out by the information authentication storage terminal equipment and the user terminal equipment, the information authentication storage terminal equipment receives the big data information transmitted by the user terminal equipment, so that the method can carry out encryption transmission during data storage, and can prevent other external personnel from stealing the data to be stored or stored. In addition, after the flow bandwidth on the wireless communication link is dynamically adjusted, the big data information is not transmitted quickly in the transmission process or slowly in the transmission process, but is stably transmitted on the communication link, so that the method can solve the problem of network congestion when the user terminal equipment transmits data to the information authentication storage terminal equipment, and can solve the problem that the flow bandwidth cannot be fully used.
As shown in fig. 4, the present invention further provides an information authentication storage system based on big data, wherein the system includes:
the communication module M10 is configured to acquire big data information generated on the user terminal device, and establish a communication connection between the user terminal device and the information authentication terminal device based on the big data information;
an information authentication module M20, configured to control the information authentication terminal device to receive an authentication request from the user terminal device after a communication connection is established, authenticate the validity of a public key certificate of the user terminal device according to the authentication request, and respond a central certificate and a corresponding authentication certificate chain in the information authentication terminal device to the user terminal device after the validity verification passes; controlling the information authentication terminal equipment to receive an information authentication storage request from the user terminal equipment, and remotely injecting an encryption key into the user terminal equipment according to the information authentication storage request;
and the encryption storage module M30 is configured to encrypt the big data information generated on the user terminal device by using the encryption key, transmit the encrypted big data information to the information authentication terminal device for information authentication according to a communication connection pre-established between the user terminal device and the information authentication terminal device, and store the big data information into the information authentication terminal device after information authentication is completed.
As an example, a specific process of the user terminal device initiating the authentication request includes: establishing network connection between user terminal equipment and information authentication terminal equipment; according to the message format of the network link of the established network connection, the session feature code for carrying out the key distribution transaction and the public key certificate of the user terminal equipment are sent to the information authentication terminal equipment, and an authentication request is sent to the information authentication terminal equipment. Specifically, the public key certificate of the user terminal device is preset in the user terminal device and is a public key certificate issued by the user terminal device certificate issuing center. And calling a pseudo-random number generation interface by the user terminal equipment, randomly generating a character string consisting of 16-byte hash codes, and distributing the character string serving as a key to the transaction session feature code. Establishing network connection between user terminal equipment and information authentication terminal equipment; and according to the message format of the network link of the established network connection, sending the public key certificate of the session feature code user terminal equipment to the information authentication terminal equipment, and authenticating the legality of the user terminal equipment by the information authentication terminal equipment.
The specific process of using the information authentication terminal device to authenticate the validity of the public key certificate of the user terminal device includes: performing first validity authentication on a public key certificate of the user terminal equipment based on a certificate authentication public key preset in the information authentication terminal equipment; if the first authentication fails, the public key certificate of the user terminal equipment is considered to be illegal; if the first authentication is successful, analyzing the public key certificate of the user terminal equipment, and acquiring the corresponding public key certificate identity information terminal serial number and the user terminal equipment public key; matching the serial number of the public key certificate identity information terminal with the hardware serial number of the user terminal equipment, and performing second validity authentication; if the matching fails, the public key certificate of the user terminal equipment is considered to be illegal; if the matching is successful, the public key certificate of the user terminal equipment is considered to be legal; and the public key certificate of the user terminal equipment passes the validity authentication of the information authentication terminal equipment. Specifically, the information authentication terminal device is preset with a certificate authentication public key of a certificate issuing center of the user terminal device. And verifying the validity of the public key certificate of the user terminal equipment, and if the authentication fails, terminating the transaction process by the information authentication terminal equipment without responding to the user terminal equipment. Firstly, performing first authentication, using a certificate authentication public key to verify whether a public key certificate of the user terminal equipment is legal or not through the information authentication terminal equipment, and if the first authentication fails, considering that the public key certificate of the user terminal equipment is illegal. If the first authentication is successful, the public key certificate content of the user terminal equipment is analyzed through the information authentication terminal equipment, and the identity information terminal serial number of the public key certificate and the public key of the user terminal equipment are obtained. Matching the serial number of the public key certificate identity information terminal with the hardware serial number of the user terminal equipment, and performing second validity authentication; if the information authentication terminal equipment does not approve the public key certificate identity information terminal serial number information, namely the information is not matched with the terminal hardware serial number, the second authentication is failed, and the public key certificate of the user terminal equipment is illegal. If the information authentication terminal equipment approves the public key certificate identity information terminal serial number information, namely the information is matched with the terminal hardware serial number, the second authentication is successful, and the public key certificate of the user terminal equipment is legal. After the first authentication and the second authentication of the public key certificate of the user terminal equipment by the information authentication terminal equipment are both successful, the public key certificate of the user terminal equipment is considered to be legal.
Therefore, after mutual verification is carried out by the information authentication storage terminal equipment and the user terminal equipment, the information authentication storage terminal equipment receives the big data information transmitted by the user terminal equipment, so that the embodiment can carry out encryption transmission during data storage, and can prevent other external personnel from stealing the data to be stored or stored.
In an exemplary embodiment, the process of establishing a communication connection between the user terminal device and the information authentication terminal device includes:
acquiring a serial number generated on the information authentication terminal equipment;
generating a communication access request of the information authentication terminal equipment according to the big data information;
acquiring verification information stored in a server by the user terminal equipment based on the communication access request;
verifying the serial number by using the verification information, and determining whether the serial number exists in a directory corresponding to the verification information; if the information authentication terminal device exists completely, establishing communication connection between the user terminal device and the information authentication terminal device; and if the information authentication terminal device does not exist completely, the communication connection between the user terminal device and the information authentication terminal device is not established.
In an exemplary embodiment, after the user terminal device establishes a communication connection with the information authentication terminal device, the method further includes:
acquiring a flow configuration request generated by a target user on the user terminal equipment;
creating at least one sub-traffic pool according to the traffic configuration request, and acquiring partial traffic bandwidth from a total traffic pool as initial traffic bandwidth of the sub-traffic pool after the creation of the sub-traffic pool is completed;
and equally dividing the initial flow bandwidth into wireless communication links in the user terminal equipment and the information authentication terminal equipment after the communication connection is established.
For example, in the embodiment of the present application, 80 target users send traffic configuration requests, the server receives the traffic configuration requests sent by the 80 target users, and creates 10 sub-traffic pools in the target traffic pool according to the traffic configuration requests sent by the 80 target users, and each sub-traffic pool minus 8 wireless communication links allocates an initial traffic bandwidth. Due to the fact that links for transmitting the traffic configuration request are out-of-order and uncontrolled, the 10 sub-traffic pools may not be uniformly distributed in the 80 wireless communication links, and thus, it may happen that the traffic configured by the traffic configuration request received in one or more wireless communication links exceeds its initial traffic, so that some user terminal devices where target users are located may not obtain bandwidth or traffic, or obtain less bandwidth or traffic, and directly affect the use experience of the target users; and the flow in the other sub-flow pool can not be fully used and is in an idle state, so that the flow utilization rate is low. Specifically, there may be traffic configuration requests in which 20 to 30 wireless communication links allocate 50 to 70 target users, and the remaining 50 to 60 wireless communication links allocate the remaining 10 to 30 target users, so that most of the traffic configuration requests of the target users are concentrated in the 20 to 30 wireless communication links, and the remaining 50 to 60 wireless communication links have fewer traffic configuration requests, so that the remaining traffic of the remaining 50 to 60 wireless communication links is excessive and is in an idle state, and is not fully used, resulting in low traffic utilization rate. If the flow of each sub-flow pool is directly increased, not only can the production cost be increased, but also the problems continue to exist due to the characteristics of disordered and uncontrolled transmission of the link, which directly causes that the enterprise cannot increase the corresponding income while increasing the production cost, and also influences the use experience of the target user. The technical scheme is used for dynamically configuring the sub-flow pools with more or more concentrated flow configuration requests in real time and allocating more flows to the sub-flow pools, for example, the residual flows in the target flow pool are allocated to the sub-flow pools with more or more concentrated flow configuration requests, so that the idle flows in the target flow pool are fully utilized under the condition of not changing the existing total flow, the use experience of a target user can be increased, and the favorable comment of more target users can be obtained under the condition of not paying more production cost.
In an exemplary embodiment, further comprising: after information authentication is completed, acquiring the transmission duration of the big data information on the wireless communication link;
and judging whether the transmission time length is within a preset time length range, if not, dynamically adjusting the initial flow bandwidth on the wireless communication link, and controlling the transmission time length of the big data information on the wireless communication link to be within the preset time length range.
Specifically, if the transmission duration is less than the minimum value in the preset duration range, the initial traffic bandwidth in the wireless communication link is reduced, the communication link with the reduced traffic bandwidth is used to transmit the big data information to the information authentication terminal device, and the transmission duration of the big data information is controlled to be within the preset duration range. If the transmission time length is larger than the maximum value in the preset time length range, acquiring part or all of the traffic bandwidth from the residual traffic bandwidth of the total traffic pool, superposing the acquired part or all of the traffic bandwidth on the wireless communication link to form a superposed communication link, transmitting the big data information to the information authentication terminal equipment by utilizing the superposed communication link, and controlling the transmission time length of the big data information to be in the preset time length range.
Therefore, after the system dynamically adjusts the flow bandwidth on the wireless communication link, the big data information is not transmitted quickly in the transmission process or slowly in the transmission process, but is stably transmitted on the communication link, so that the system can solve the problem of network congestion when the user terminal equipment transmits data to the information authentication storage terminal equipment, and can solve the problem that the flow bandwidth cannot be fully used.
In an exemplary embodiment, further comprising: acquiring a response message of address allocation equipment aiming at the user terminal equipment, wherein the response message carries a network address and a physical address of the user terminal equipment; controlling the authentication information processing equipment to determine the authentication information of the user terminal equipment according to the response message; and the authentication information processing equipment sends the authentication information to an authentication server so that the authentication server performs access authentication on the user terminal equipment according to the authentication information.
In summary, the system first obtains big data information generated on the user terminal device, and establishes a communication connection between the user terminal device and the information authentication terminal device based on the big data information; after the communication connection is established, the information authentication terminal equipment is controlled to receive an authentication request from the user terminal equipment, the validity of a public key certificate of the user terminal equipment is authenticated according to the authentication request, and after the validity verification is passed, a central certificate and a corresponding authentication certificate chain in the information authentication terminal equipment are responded to the user terminal equipment; controlling the information authentication terminal equipment to receive an information authentication storage request from the user terminal equipment, and remotely injecting an encryption key into the user terminal equipment according to the information authentication storage request; and encrypting the big data information generated on the user terminal equipment by using the encryption key, transmitting the encrypted big data information to the information authentication terminal equipment for information authentication according to the communication connection which is pre-established between the user terminal equipment and the information authentication terminal equipment, and storing the big data information into the information authentication terminal equipment after the information authentication is finished. Therefore, after mutual verification is carried out by the information authentication storage terminal equipment and the user terminal equipment, the information authentication storage terminal equipment receives the big data information transmitted by the user terminal equipment, so that the system can carry out encryption transmission during data storage, and can prevent other external personnel from stealing data to be stored or stored. In addition, after the system dynamically adjusts the flow bandwidth on the wireless communication link, the big data information is not transmitted quickly in the transmission process, or transmitted slowly in the transmission process, but is stably transmitted on the communication link, so that the system can also solve the problem of network congestion when the user terminal equipment transmits data to the information authentication storage terminal equipment, and can solve the problem that the flow bandwidth cannot be fully used.
The foregoing embodiments are merely illustrative of the principles and utilities of the present invention and are not intended to limit the invention. Any person skilled in the art can modify or change the above-mentioned embodiments without departing from the spirit and scope of the present invention. Accordingly, it is intended that all equivalent modifications or changes which can be made by those skilled in the art without departing from the spirit and technical spirit of the present invention be covered by the claims of the present invention.

Claims (10)

1. An information authentication storage method based on big data is characterized by comprising the following steps:
acquiring big data information generated on user terminal equipment, and establishing communication connection between the user terminal equipment and information authentication terminal equipment based on the big data information;
after the communication connection is established, the information authentication terminal equipment is controlled to receive an authentication request from the user terminal equipment, the validity of a public key certificate of the user terminal equipment is authenticated according to the authentication request, and after the validity verification is passed, a central certificate and a corresponding authentication certificate chain in the information authentication terminal equipment are responded to the user terminal equipment; controlling the information authentication terminal equipment to receive an information authentication storage request from the user terminal equipment, and remotely injecting an encryption key into the user terminal equipment according to the information authentication storage request;
and encrypting the big data information generated on the user terminal equipment by using the encryption key, transmitting the encrypted big data information to the information authentication terminal equipment for information authentication according to the communication connection which is pre-established between the user terminal equipment and the information authentication terminal equipment, and storing the big data information into the information authentication terminal equipment after the information authentication is finished.
2. The big data-based information authentication storage method according to claim 1, wherein the process of establishing the communication connection between the user terminal device and the information authentication terminal device comprises:
acquiring a serial number generated on the information authentication terminal equipment;
generating a communication access request of the information authentication terminal equipment according to the big data information;
acquiring verification information stored in a server by the user terminal equipment based on the communication access request;
verifying the serial number by using the verification information, and determining whether the serial number exists in a directory corresponding to the verification information; if the information authentication terminal device exists completely, establishing communication connection between the user terminal device and the information authentication terminal device; and if the information authentication terminal device does not exist completely, the communication connection between the user terminal device and the information authentication terminal device is not established.
3. The big data-based information authentication and storage method according to claim 1 or 2, further comprising, after the user terminal device establishes a communication connection with the information authentication terminal device:
acquiring a flow configuration request generated by a target user on the user terminal equipment;
creating at least one sub-traffic pool according to the traffic configuration request, and acquiring partial traffic bandwidth from a total traffic pool as initial traffic bandwidth of the sub-traffic pool after the creation of the sub-traffic pool is completed;
and equally dividing the initial flow bandwidth into wireless communication links in the user terminal equipment and the information authentication terminal equipment after the communication connection is established.
4. The big data-based information authentication storage method according to claim 3, further comprising: after information authentication is completed, acquiring the transmission duration of the big data information on the wireless communication link;
and judging whether the transmission time length is within a preset time length range, if not, dynamically adjusting the initial flow bandwidth on the wireless communication link, and controlling the transmission time length of the big data information on the wireless communication link to be within the preset time length range.
5. The big data-based information authentication storage method according to claim 4, further comprising: if the transmission duration is less than the minimum value in the preset duration range, reducing the initial flow bandwidth in the wireless communication link, transmitting the big data information to the information authentication terminal equipment by using the communication link with the reduced flow bandwidth, and controlling the transmission duration of the big data information to be within the preset duration range;
if the transmission time length is larger than the maximum value in the preset time length range, acquiring part or all of the traffic bandwidth from the residual traffic bandwidth of the total traffic pool, superposing the acquired part or all of the traffic bandwidth on the wireless communication link to form a superposed communication link, transmitting the big data information to the information authentication terminal equipment by utilizing the superposed communication link, and controlling the transmission time length of the big data information to be in the preset time length range.
6. The big data-based information authentication storage method according to claim 1, further comprising: acquiring a response message of address allocation equipment aiming at the user terminal equipment, wherein the response message carries a network address and a physical address of the user terminal equipment;
controlling the authentication information processing equipment to determine the authentication information of the user terminal equipment according to the response message;
and the authentication information processing equipment sends the authentication information to an authentication server so that the authentication server performs access authentication on the user terminal equipment according to the authentication information.
7. An information authentication storage system based on big data, which is characterized in that the system comprises:
the communication module is used for acquiring big data information generated on the user terminal equipment and establishing communication connection between the user terminal equipment and the information authentication terminal equipment based on the big data information;
the information authentication module is used for controlling the information authentication terminal equipment to receive an authentication request from the user terminal equipment after communication connection is established, authenticating the legality of a public key certificate of the user terminal equipment according to the authentication request, and responding a central certificate in the information authentication terminal equipment and a corresponding authentication certificate chain to the user terminal equipment after the legality verification is passed; controlling the information authentication terminal equipment to receive an information authentication storage request from the user terminal equipment, and remotely injecting an encryption key into the user terminal equipment according to the information authentication storage request;
and the encryption storage module is used for encrypting the big data information generated on the user terminal equipment by using the encryption key, transmitting the encrypted big data information to the information authentication terminal equipment for information authentication according to the communication connection which is pre-established between the user terminal equipment and the information authentication terminal equipment, and storing the big data information into the information authentication terminal equipment after the information authentication is finished.
8. The big data based information authentication storage system according to claim 7, wherein the process of establishing the communication connection between the user terminal device and the information authentication terminal device comprises:
acquiring a serial number generated on the information authentication terminal equipment;
generating a communication access request of the information authentication terminal equipment according to the big data information;
acquiring verification information stored in a server by the user terminal equipment based on the communication access request;
verifying the serial number by using the verification information, and determining whether the serial number exists in a directory corresponding to the verification information; if the information authentication terminal device exists completely, establishing communication connection between the user terminal device and the information authentication terminal device; and if the information authentication terminal device does not exist completely, the communication connection between the user terminal device and the information authentication terminal device is not established.
9. The big data based information authentication storage system according to claim 7 or 8, further comprising, after the user terminal device establishes a communication connection with the information authentication terminal device:
acquiring a flow configuration request generated by a target user on the user terminal equipment;
creating at least one sub-traffic pool according to the traffic configuration request, and acquiring partial traffic bandwidth from a total traffic pool as initial traffic bandwidth of the sub-traffic pool after the creation of the sub-traffic pool is completed;
and equally dividing the initial flow bandwidth into wireless communication links in the user terminal equipment and the information authentication terminal equipment after the communication connection is established.
10. The big data based information authentication storage system according to claim 9, further comprising: after information authentication is completed, acquiring the transmission duration of the big data information on the wireless communication link;
judging whether the transmission time length is within a preset time length range, if not, dynamically adjusting the initial flow bandwidth on the wireless communication link, and controlling the transmission time length of the big data information on the wireless communication link to be within the preset time length range;
if the transmission duration is less than the minimum value in the preset duration range, reducing the initial flow bandwidth in the wireless communication link, transmitting the big data information to the information authentication terminal equipment by using the communication link with the reduced flow bandwidth, and controlling the transmission duration of the big data information to be within the preset duration range;
if the transmission time length is larger than the maximum value in the preset time length range, acquiring part or all of the traffic bandwidth from the residual traffic bandwidth of the total traffic pool, superposing the acquired part or all of the traffic bandwidth on the wireless communication link to form a superposed communication link, transmitting the big data information to the information authentication terminal equipment by utilizing the superposed communication link, and controlling the transmission time length of the big data information to be in the preset time length range.
CN202110978572.7A 2021-08-25 2021-08-25 Information authentication storage method and system based on big data Pending CN113660098A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110978572.7A CN113660098A (en) 2021-08-25 2021-08-25 Information authentication storage method and system based on big data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110978572.7A CN113660098A (en) 2021-08-25 2021-08-25 Information authentication storage method and system based on big data

Publications (1)

Publication Number Publication Date
CN113660098A true CN113660098A (en) 2021-11-16

Family

ID=78481875

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110978572.7A Pending CN113660098A (en) 2021-08-25 2021-08-25 Information authentication storage method and system based on big data

Country Status (1)

Country Link
CN (1) CN113660098A (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105282143A (en) * 2015-09-09 2016-01-27 民航局空管局技术中心 Message access control method, device and system
CN106921481A (en) * 2015-12-28 2017-07-04 航天信息股份有限公司 A kind of system and method for tenant's division and purview certification based on PKI
CN107566407A (en) * 2017-10-20 2018-01-09 哈尔滨工程大学 A kind of two-way authentication Security Data Transmission and storage method based on USBkey
CN109274602A (en) * 2018-09-28 2019-01-25 深圳供电局有限公司 Flow managing method, device, computer equipment and storage medium
CN110177001A (en) * 2019-05-21 2019-08-27 广东联合电子服务股份有限公司 A kind of NFC circle deposit method, system and storage medium based on soft certificate
CN111277508A (en) * 2020-01-07 2020-06-12 上海飞旗网络技术股份有限公司 Dynamic flow pool configuration method based on data transmission
CN111669335A (en) * 2020-06-17 2020-09-15 山东博远数据服务有限公司 Stable and efficient network big data communication method and system
CN112199688A (en) * 2019-07-08 2021-01-08 成都乐珂科技有限公司 File encryption protection method and access control system
CN112769574A (en) * 2020-12-28 2021-05-07 云从科技集团股份有限公司 Key injection method and system, key management system, device and machine readable medium
CN112988674A (en) * 2021-03-12 2021-06-18 平安国际智慧城市科技股份有限公司 Method and device for processing big data file, computer equipment and storage medium

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105282143A (en) * 2015-09-09 2016-01-27 民航局空管局技术中心 Message access control method, device and system
CN106921481A (en) * 2015-12-28 2017-07-04 航天信息股份有限公司 A kind of system and method for tenant's division and purview certification based on PKI
CN107566407A (en) * 2017-10-20 2018-01-09 哈尔滨工程大学 A kind of two-way authentication Security Data Transmission and storage method based on USBkey
CN109274602A (en) * 2018-09-28 2019-01-25 深圳供电局有限公司 Flow managing method, device, computer equipment and storage medium
CN110177001A (en) * 2019-05-21 2019-08-27 广东联合电子服务股份有限公司 A kind of NFC circle deposit method, system and storage medium based on soft certificate
CN112199688A (en) * 2019-07-08 2021-01-08 成都乐珂科技有限公司 File encryption protection method and access control system
CN111277508A (en) * 2020-01-07 2020-06-12 上海飞旗网络技术股份有限公司 Dynamic flow pool configuration method based on data transmission
CN111669335A (en) * 2020-06-17 2020-09-15 山东博远数据服务有限公司 Stable and efficient network big data communication method and system
CN112769574A (en) * 2020-12-28 2021-05-07 云从科技集团股份有限公司 Key injection method and system, key management system, device and machine readable medium
CN112988674A (en) * 2021-03-12 2021-06-18 平安国际智慧城市科技股份有限公司 Method and device for processing big data file, computer equipment and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
陈天华: "基于PKI技术的网络安全策略", 信息技术与标准化, no. 10 *

Similar Documents

Publication Publication Date Title
CN106357649B (en) User identity authentication system and method
US8631481B2 (en) Access to a network for distributing digital content
CN103428696B (en) Virtual SIM card achieving method and system and relevant device
US6275859B1 (en) Tree-based reliable multicast system where sessions are established by repair nodes that authenticate receiver nodes presenting participation certificates granted by a central authority
US7562224B2 (en) System and method for multi-session establishment for a single device
CN100512201C (en) Method for dealing inserted-requested message of business in groups
CN111275419B (en) Block chain wallet signature right confirming method, device and system
TWI746229B (en) A multi-node authentication method and apparatus based on block chain
CN101772024A (en) User identification method, device and system
CN111414647A (en) Tamper-proof data sharing system and method based on block chain technology
CN105050086A (en) Method for terminal to log in Wifi hotspot
CN111181931B (en) Authorization system and method based on user terminal authentication
CN115883154A (en) Access certificate issuing method, block chain-based data access method and device
CN104796399A (en) Key negotiation method of data encryption transmission
KR102372503B1 (en) Method for providing authentification service by using decentralized identity and server using the same
CN110247905A (en) The data backup memory method and system of secure authentication mode based on Token
HUE029848T2 (en) Method and equipment for establishing secure connection on a communication network
US9622075B2 (en) System and method for adaptive multifactor authentication
JP2016139910A (en) Authentication system, authentication key management device, authentication key management method and authentication key management program
CN115473655B (en) Terminal authentication method, device and storage medium for access network
CN101051897B (en) Biological information certifying method
CN113660098A (en) Information authentication storage method and system based on big data
CN106789076B (en) Interaction method and device for server and intelligent equipment
CN115913521A (en) Method for identity authentication based on quantum key
CN112383392B (en) Video conference rotation encryption method, video conference rotation encryption equipment and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination