CN113660098A - Information authentication storage method and system based on big data - Google Patents
Information authentication storage method and system based on big data Download PDFInfo
- Publication number
- CN113660098A CN113660098A CN202110978572.7A CN202110978572A CN113660098A CN 113660098 A CN113660098 A CN 113660098A CN 202110978572 A CN202110978572 A CN 202110978572A CN 113660098 A CN113660098 A CN 113660098A
- Authority
- CN
- China
- Prior art keywords
- terminal equipment
- information
- user terminal
- information authentication
- big data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000003860 storage Methods 0.000 title claims abstract description 61
- 238000000034 method Methods 0.000 title claims abstract description 40
- 238000004891 communication Methods 0.000 claims abstract description 156
- 230000005540 biological transmission Effects 0.000 claims abstract description 62
- 238000012795 verification Methods 0.000 claims description 32
- 230000008569 process Effects 0.000 claims description 12
- 230000004044 response Effects 0.000 claims description 12
- 230000010365 information processing Effects 0.000 claims description 8
- 238000013500 data storage Methods 0.000 abstract description 7
- 238000004519 manufacturing process Methods 0.000 description 6
- 238000010586 diagram Methods 0.000 description 3
- 238000009826 distribution Methods 0.000 description 2
- 230000002349 favourable effect Effects 0.000 description 2
- 230000000977 initiatory effect Effects 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
- H04L67/141—Setup of application sessions
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention provides an information authentication storage method and system based on big data, after mutual authentication is carried out by an information authentication storage terminal device and a user terminal device, the information authentication storage terminal device receives big data information transmitted by the user terminal device, so that the invention can carry out encryption transmission during data storage, and can prevent other external personnel from stealing data to be stored or stored. In addition, after the flow bandwidth on the wireless communication link is dynamically adjusted, the big data information is not transmitted quickly in the transmission process or slowly in the transmission process, but is stably transmitted on the communication link, so that the problem of network congestion when the user terminal equipment transmits data to the information authentication storage terminal equipment can be solved, and the problem that the flow bandwidth cannot be fully used can be solved.
Description
Technical Field
The invention relates to the technical field of big data, in particular to an information authentication storage method and system based on big data.
Background
In recent years, information technologies such as big data and cloud computing are developed and are more and more widely applied to various industries, so that the life of people is more convenient. However, as demand and business continue to evolve, the data generated also grows geometrically. The large-scale data set has immeasurable value, and the relationship among the data plays an important role in the operation and decision of company enterprises. When mass data is processed and stored in a centralized manner, security problems of the mass data also face greater and greater challenges, and data stored by a user is easily stolen by others, so that loss of the user is caused.
Disclosure of Invention
In view of the above disadvantages of the prior art, an object of the present invention is to provide an information authentication storage method and system based on big data, which are used to solve the problem in the prior art that data is easily stolen by others when being stored.
In order to achieve the above objects and other related objects, the present invention provides a big data based information authentication storage method, including the steps of:
acquiring big data information generated on user terminal equipment, and establishing communication connection between the user terminal equipment and information authentication terminal equipment based on the big data information;
after the communication connection is established, the information authentication terminal equipment is controlled to receive an authentication request from the user terminal equipment, the validity of a public key certificate of the user terminal equipment is authenticated according to the authentication request, and after the validity verification is passed, a central certificate and a corresponding authentication certificate chain in the information authentication terminal equipment are responded to the user terminal equipment; controlling the information authentication terminal equipment to receive an information authentication storage request from the user terminal equipment, and remotely injecting an encryption key into the user terminal equipment according to the information authentication storage request;
and encrypting the big data information generated on the user terminal equipment by using the encryption key, transmitting the encrypted big data information to the information authentication terminal equipment for information authentication according to the communication connection which is pre-established between the user terminal equipment and the information authentication terminal equipment, and storing the big data information into the information authentication terminal equipment after the information authentication is finished.
Optionally, the process of establishing a communication connection between the user terminal device and the information authentication terminal device includes:
acquiring a serial number generated on the information authentication terminal equipment;
generating a communication access request of the information authentication terminal equipment according to the big data information;
acquiring verification information stored in a server by the user terminal equipment based on the communication access request;
verifying the serial number by using the verification information, and determining whether the serial number exists in a directory corresponding to the verification information; if the information authentication terminal device exists completely, establishing communication connection between the user terminal device and the information authentication terminal device; and if the information authentication terminal device does not exist completely, the communication connection between the user terminal device and the information authentication terminal device is not established.
Optionally, after the user terminal device establishes a communication connection with the information authentication terminal device, the method further includes:
acquiring a flow configuration request generated by a target user on the user terminal equipment;
creating at least one sub-traffic pool according to the traffic configuration request, and acquiring partial traffic bandwidth from a total traffic pool as initial traffic bandwidth of the sub-traffic pool after the creation of the sub-traffic pool is completed;
and equally dividing the initial flow bandwidth into wireless communication links in the user terminal equipment and the information authentication terminal equipment after the communication connection is established.
Optionally, the method further comprises: after information authentication is completed, acquiring the transmission duration of the big data information on the wireless communication link;
and judging whether the transmission time length is within a preset time length range, if not, dynamically adjusting the initial flow bandwidth on the wireless communication link, and controlling the transmission time length of the big data information on the wireless communication link to be within the preset time length range.
Optionally, the method further comprises: if the transmission duration is less than the minimum value in the preset duration range, reducing the initial flow bandwidth in the wireless communication link, transmitting the big data information to the information authentication terminal equipment by using the communication link with the reduced flow bandwidth, and controlling the transmission duration of the big data information to be within the preset duration range;
if the transmission time length is larger than the maximum value in the preset time length range, acquiring part or all of the traffic bandwidth from the residual traffic bandwidth of the total traffic pool, superposing the acquired part or all of the traffic bandwidth on the wireless communication link to form a superposed communication link, transmitting the big data information to the information authentication terminal equipment by utilizing the superposed communication link, and controlling the transmission time length of the big data information to be in the preset time length range.
Optionally, the method further comprises: acquiring a response message of address allocation equipment aiming at the user terminal equipment, wherein the response message carries a network address and a physical address of the user terminal equipment;
controlling the authentication information processing equipment to determine the authentication information of the user terminal equipment according to the response message;
and the authentication information processing equipment sends the authentication information to an authentication server so that the authentication server performs access authentication on the user terminal equipment according to the authentication information.
The invention also provides an information authentication storage system based on big data, which comprises:
the communication module is used for acquiring big data information generated on the user terminal equipment and establishing communication connection between the user terminal equipment and the information authentication terminal equipment based on the big data information;
the information authentication module is used for controlling the information authentication terminal equipment to receive an authentication request from the user terminal equipment after communication connection is established, authenticating the legality of a public key certificate of the user terminal equipment according to the authentication request, and responding a central certificate in the information authentication terminal equipment and a corresponding authentication certificate chain to the user terminal equipment after the legality verification is passed; controlling the information authentication terminal equipment to receive an information authentication storage request from the user terminal equipment, and remotely injecting an encryption key into the user terminal equipment according to the information authentication storage request;
and the encryption storage module is used for encrypting the big data information generated on the user terminal equipment by using the encryption key, transmitting the encrypted big data information to the information authentication terminal equipment for information authentication according to the communication connection which is pre-established between the user terminal equipment and the information authentication terminal equipment, and storing the big data information into the information authentication terminal equipment after the information authentication is finished.
Optionally, the process of establishing a communication connection between the user terminal device and the information authentication terminal device includes:
acquiring a serial number generated on the information authentication terminal equipment;
generating a communication access request of the information authentication terminal equipment according to the big data information;
acquiring verification information stored in a server by the user terminal equipment based on the communication access request;
verifying the serial number by using the verification information, and determining whether the serial number exists in a directory corresponding to the verification information; if the information authentication terminal device exists completely, establishing communication connection between the user terminal device and the information authentication terminal device; and if the information authentication terminal device does not exist completely, the communication connection between the user terminal device and the information authentication terminal device is not established.
Optionally, after the user terminal device establishes a communication connection with the information authentication terminal device, the method further includes:
acquiring a flow configuration request generated by a target user on the user terminal equipment;
creating at least one sub-traffic pool according to the traffic configuration request, and acquiring partial traffic bandwidth from a total traffic pool as initial traffic bandwidth of the sub-traffic pool after the creation of the sub-traffic pool is completed;
and equally dividing the initial flow bandwidth into wireless communication links in the user terminal equipment and the information authentication terminal equipment after the communication connection is established.
Optionally, the method further comprises: after information authentication is completed, acquiring the transmission duration of the big data information on the wireless communication link;
judging whether the transmission time length is within a preset time length range, if not, dynamically adjusting the initial flow bandwidth on the wireless communication link, and controlling the transmission time length of the big data information on the wireless communication link to be within the preset time length range;
if the transmission duration is less than the minimum value in the preset duration range, reducing the initial flow bandwidth in the wireless communication link, transmitting the big data information to the information authentication terminal equipment by using the communication link with the reduced flow bandwidth, and controlling the transmission duration of the big data information to be within the preset duration range;
if the transmission time length is larger than the maximum value in the preset time length range, acquiring part or all of the traffic bandwidth from the residual traffic bandwidth of the total traffic pool, superposing the acquired part or all of the traffic bandwidth on the wireless communication link to form a superposed communication link, transmitting the big data information to the information authentication terminal equipment by utilizing the superposed communication link, and controlling the transmission time length of the big data information to be in the preset time length range.
As described above, the present invention provides an information authentication storage method and system based on big data, which has the following beneficial effects: the method comprises the steps of firstly, acquiring big data information generated on user terminal equipment, and establishing communication connection between the user terminal equipment and information authentication terminal equipment based on the big data information; after the communication connection is established, the information authentication terminal equipment is controlled to receive an authentication request from the user terminal equipment, the validity of a public key certificate of the user terminal equipment is authenticated according to the authentication request, and after the validity verification is passed, a central certificate and a corresponding authentication certificate chain in the information authentication terminal equipment are responded to the user terminal equipment; controlling the information authentication terminal equipment to receive an information authentication storage request from the user terminal equipment, and remotely injecting an encryption key into the user terminal equipment according to the information authentication storage request; and encrypting the big data information generated on the user terminal equipment by using the encryption key, transmitting the encrypted big data information to the information authentication terminal equipment for information authentication according to the communication connection which is pre-established between the user terminal equipment and the information authentication terminal equipment, and storing the big data information into the information authentication terminal equipment after the information authentication is finished. Therefore, after mutual verification is carried out by the information authentication storage terminal equipment and the user terminal equipment, the information authentication storage terminal equipment receives the big data information transmitted by the user terminal equipment, so that the data storage system can carry out encryption transmission during data storage, and can prevent other external personnel from stealing the data to be stored or stored. In addition, after the flow bandwidth on the wireless communication link is dynamically adjusted, the big data information is not transmitted quickly in the transmission process or slowly in the transmission process, but is stably transmitted on the communication link, so that the problem of network congestion when the user terminal equipment transmits data to the information authentication storage terminal equipment can be solved, and the problem that the flow bandwidth cannot be fully used can be solved.
Drawings
Fig. 1 is a schematic flowchart of an information authentication storage method based on big data according to an embodiment;
FIG. 2 is a flow diagram illustrating establishing a communication connection according to an embodiment;
FIG. 3 is a flow diagram illustrating the allocation of traffic for a wireless communication link according to one embodiment;
fig. 4 is a schematic hardware structure diagram of an information authentication storage system based on big data according to an embodiment.
Detailed Description
The embodiments of the present invention are described below with reference to specific embodiments, and other advantages and effects of the present invention will be easily understood by those skilled in the art from the disclosure of the present specification. The invention is capable of other and different embodiments and of being practiced or of being carried out in various ways, and its several details are capable of modification in various respects, all without departing from the spirit and scope of the present invention. It is to be noted that the features in the following embodiments and examples may be combined with each other without conflict.
It should be noted that the drawings provided in the following embodiments are only for illustrating the basic idea of the present invention, and the components related to the present invention are only shown in the drawings rather than drawn according to the number, shape and size of the components in actual implementation, and the type, quantity and proportion of the components in actual implementation may be changed freely, and the layout of the components may be more complicated.
Referring to fig. 1, the present invention provides an information authentication and storage method based on big data, which includes the following steps:
s110, acquiring big data information generated on user terminal equipment, and establishing communication connection between the user terminal equipment and information authentication terminal equipment based on the big data information;
s120, after the communication connection is established, controlling the information authentication terminal equipment to receive an authentication request from the user terminal equipment, authenticating the legality of a public key certificate of the user terminal equipment according to the authentication request, and responding a central certificate and a corresponding authentication certificate chain in the information authentication terminal equipment to the user terminal equipment after the legality verification is passed; controlling the information authentication terminal equipment to receive an information authentication storage request from the user terminal equipment, and remotely injecting an encryption key into the user terminal equipment according to the information authentication storage request;
s130, the big data information generated on the user terminal equipment is encrypted by using the encryption key, the encrypted big data information is transmitted to the information authentication terminal equipment for information authentication according to the communication connection which is pre-established between the user terminal equipment and the information authentication terminal equipment, and the big data information is stored in the information authentication terminal equipment after the information authentication is finished.
As an example, a specific process of the user terminal device initiating the authentication request includes: establishing network connection between user terminal equipment and information authentication terminal equipment; according to the message format of the network link of the established network connection, the session feature code for carrying out the key distribution transaction and the public key certificate of the user terminal equipment are sent to the information authentication terminal equipment, and an authentication request is sent to the information authentication terminal equipment. Specifically, the public key certificate of the user terminal device is preset in the user terminal device and is a public key certificate issued by the user terminal device certificate issuing center. And calling a pseudo-random number generation interface by the user terminal equipment, randomly generating a character string consisting of 16-byte hash codes, and distributing the character string serving as a key to the transaction session feature code. Establishing network connection between user terminal equipment and information authentication terminal equipment; and according to the message format of the network link of the established network connection, sending the public key certificate of the session feature code user terminal equipment to the information authentication terminal equipment, and authenticating the legality of the user terminal equipment by the information authentication terminal equipment.
The specific process of using the information authentication terminal device to authenticate the validity of the public key certificate of the user terminal device includes: performing first validity authentication on a public key certificate of the user terminal equipment based on a certificate authentication public key preset in the information authentication terminal equipment; if the first authentication fails, the public key certificate of the user terminal equipment is considered to be illegal; if the first authentication is successful, analyzing the public key certificate of the user terminal equipment, and acquiring the corresponding public key certificate identity information terminal serial number and the user terminal equipment public key; matching the serial number of the public key certificate identity information terminal with the hardware serial number of the user terminal equipment, and performing second validity authentication; if the matching fails, the public key certificate of the user terminal equipment is considered to be illegal; if the matching is successful, the public key certificate of the user terminal equipment is considered to be legal; and the public key certificate of the user terminal equipment passes the validity authentication of the information authentication terminal equipment. Specifically, the information authentication terminal device is preset with a certificate authentication public key of a certificate issuing center of the user terminal device. And verifying the validity of the public key certificate of the user terminal equipment, and if the authentication fails, terminating the transaction process by the information authentication terminal equipment without responding to the user terminal equipment. Firstly, performing first authentication, using a certificate authentication public key to verify whether a public key certificate of the user terminal equipment is legal or not through the information authentication terminal equipment, and if the first authentication fails, considering that the public key certificate of the user terminal equipment is illegal. If the first authentication is successful, the public key certificate content of the user terminal equipment is analyzed through the information authentication terminal equipment, and the identity information terminal serial number of the public key certificate and the public key of the user terminal equipment are obtained. Matching the serial number of the public key certificate identity information terminal with the hardware serial number of the user terminal equipment, and performing second validity authentication; if the information authentication terminal equipment does not approve the public key certificate identity information terminal serial number information, namely the information is not matched with the terminal hardware serial number, the second authentication is failed, and the public key certificate of the user terminal equipment is illegal. If the information authentication terminal equipment approves the public key certificate identity information terminal serial number information, namely the information is matched with the terminal hardware serial number, the second authentication is successful, and the public key certificate of the user terminal equipment is legal. After the first authentication and the second authentication of the public key certificate of the user terminal equipment by the information authentication terminal equipment are both successful, the public key certificate of the user terminal equipment is considered to be legal.
Therefore, after mutual verification is carried out by the information authentication storage terminal equipment and the user terminal equipment, the information authentication storage terminal equipment receives the big data information transmitted by the user terminal equipment, so that the embodiment can carry out encryption transmission during data storage, and can prevent other external personnel from stealing the data to be stored or stored.
In an exemplary embodiment, as shown in fig. 2, the process of establishing a communication connection between the user terminal device and the information authentication terminal device includes:
s210, acquiring a serial number generated on the information authentication terminal equipment;
s220, generating a communication access request of the information authentication terminal equipment according to the big data information;
s230, acquiring the verification information stored in the server by the user terminal equipment based on the communication access request;
s240, verifying the serial number by using the verification information, and determining whether the serial number exists in a directory corresponding to the verification information; if the information authentication terminal device exists completely, establishing communication connection between the user terminal device and the information authentication terminal device; and if the information authentication terminal device does not exist completely, the communication connection between the user terminal device and the information authentication terminal device is not established.
In an exemplary embodiment, as shown in fig. 3, after the user terminal device establishes a communication connection with the information authentication terminal device, the method further includes:
s310, acquiring a flow configuration request generated by a target user on the user terminal equipment;
s320, creating at least one sub-traffic pool according to the traffic configuration request, and acquiring partial traffic bandwidth from the total traffic pool as the initial traffic bandwidth of the sub-traffic pool after the creation of the sub-traffic pool is completed;
s330, the initial flow bandwidth is evenly distributed in a wireless communication link between the user terminal equipment and the information authentication terminal equipment after the communication connection is established.
For example, in the embodiment of the present application, 80 target users send traffic configuration requests, the server receives the traffic configuration requests sent by the 80 target users, and creates 10 sub-traffic pools in the target traffic pool according to the traffic configuration requests sent by the 80 target users, and each sub-traffic pool minus 8 wireless communication links allocates an initial traffic bandwidth. Due to the fact that links for transmitting the traffic configuration request are out-of-order and uncontrolled, the 10 sub-traffic pools may not be uniformly distributed in the 80 wireless communication links, and thus, it may happen that the traffic configured by the traffic configuration request received in one or more wireless communication links exceeds its initial traffic, so that some user terminal devices where target users are located may not obtain bandwidth or traffic, or obtain less bandwidth or traffic, and directly affect the use experience of the target users; and the flow in the other sub-flow pool can not be fully used and is in an idle state, so that the flow utilization rate is low. Specifically, there may be traffic configuration requests in which 20 to 30 wireless communication links allocate 50 to 70 target users, and the remaining 50 to 60 wireless communication links allocate the remaining 10 to 30 target users, so that most of the traffic configuration requests of the target users are concentrated in the 20 to 30 wireless communication links, and the remaining 50 to 60 wireless communication links have fewer traffic configuration requests, so that the remaining traffic of the remaining 50 to 60 wireless communication links is excessive and is in an idle state, and is not fully used, resulting in low traffic utilization rate. If the flow of each sub-flow pool is directly increased, not only can the production cost be increased, but also the problems continue to exist due to the characteristics of disordered and uncontrolled transmission of the link, which directly causes that the enterprise cannot increase the corresponding income while increasing the production cost, and also influences the use experience of the target user. The technical scheme is used for dynamically configuring the sub-flow pools with more or more concentrated flow configuration requests in real time and allocating more flows to the sub-flow pools, for example, the residual flows in the target flow pool are allocated to the sub-flow pools with more or more concentrated flow configuration requests, so that the idle flows in the target flow pool are fully utilized under the condition of not changing the existing total flow, the use experience of a target user can be increased, and the favorable comment of more target users can be obtained under the condition of not paying more production cost.
In an exemplary embodiment, further comprising: after information authentication is completed, acquiring the transmission duration of the big data information on the wireless communication link;
and judging whether the transmission time length is within a preset time length range, if not, dynamically adjusting the initial flow bandwidth on the wireless communication link, and controlling the transmission time length of the big data information on the wireless communication link to be within the preset time length range.
Specifically, if the transmission duration is less than the minimum value in the preset duration range, the initial traffic bandwidth in the wireless communication link is reduced, the communication link with the reduced traffic bandwidth is used to transmit the big data information to the information authentication terminal device, and the transmission duration of the big data information is controlled to be within the preset duration range. If the transmission time length is larger than the maximum value in the preset time length range, acquiring part or all of the traffic bandwidth from the residual traffic bandwidth of the total traffic pool, superposing the acquired part or all of the traffic bandwidth on the wireless communication link to form a superposed communication link, transmitting the big data information to the information authentication terminal equipment by utilizing the superposed communication link, and controlling the transmission time length of the big data information to be in the preset time length range.
Therefore, after the flow bandwidth on the wireless communication link is dynamically adjusted, the big data information is not transmitted quickly in the transmission process or slowly in the transmission process, but is stably transmitted on the communication link, so that the method can solve the problem of network congestion when the user terminal equipment transmits data to the information authentication storage terminal equipment, and can solve the problem that the flow bandwidth cannot be fully used.
In an exemplary embodiment, further comprising: acquiring a response message of address allocation equipment aiming at the user terminal equipment, wherein the response message carries a network address and a physical address of the user terminal equipment; controlling the authentication information processing equipment to determine the authentication information of the user terminal equipment according to the response message; and the authentication information processing equipment sends the authentication information to an authentication server so that the authentication server performs access authentication on the user terminal equipment according to the authentication information.
In summary, the method first obtains big data information generated on the user terminal device, and establishes a communication connection between the user terminal device and the information authentication terminal device based on the big data information; after the communication connection is established, the information authentication terminal equipment is controlled to receive an authentication request from the user terminal equipment, the validity of a public key certificate of the user terminal equipment is authenticated according to the authentication request, and after the validity verification is passed, a central certificate and a corresponding authentication certificate chain in the information authentication terminal equipment are responded to the user terminal equipment; controlling the information authentication terminal equipment to receive an information authentication storage request from the user terminal equipment, and remotely injecting an encryption key into the user terminal equipment according to the information authentication storage request; and encrypting the big data information generated on the user terminal equipment by using the encryption key, transmitting the encrypted big data information to the information authentication terminal equipment for information authentication according to the communication connection which is pre-established between the user terminal equipment and the information authentication terminal equipment, and storing the big data information into the information authentication terminal equipment after the information authentication is finished. Therefore, after mutual verification is carried out by the information authentication storage terminal equipment and the user terminal equipment, the information authentication storage terminal equipment receives the big data information transmitted by the user terminal equipment, so that the method can carry out encryption transmission during data storage, and can prevent other external personnel from stealing the data to be stored or stored. In addition, after the flow bandwidth on the wireless communication link is dynamically adjusted, the big data information is not transmitted quickly in the transmission process or slowly in the transmission process, but is stably transmitted on the communication link, so that the method can solve the problem of network congestion when the user terminal equipment transmits data to the information authentication storage terminal equipment, and can solve the problem that the flow bandwidth cannot be fully used.
As shown in fig. 4, the present invention further provides an information authentication storage system based on big data, wherein the system includes:
the communication module M10 is configured to acquire big data information generated on the user terminal device, and establish a communication connection between the user terminal device and the information authentication terminal device based on the big data information;
an information authentication module M20, configured to control the information authentication terminal device to receive an authentication request from the user terminal device after a communication connection is established, authenticate the validity of a public key certificate of the user terminal device according to the authentication request, and respond a central certificate and a corresponding authentication certificate chain in the information authentication terminal device to the user terminal device after the validity verification passes; controlling the information authentication terminal equipment to receive an information authentication storage request from the user terminal equipment, and remotely injecting an encryption key into the user terminal equipment according to the information authentication storage request;
and the encryption storage module M30 is configured to encrypt the big data information generated on the user terminal device by using the encryption key, transmit the encrypted big data information to the information authentication terminal device for information authentication according to a communication connection pre-established between the user terminal device and the information authentication terminal device, and store the big data information into the information authentication terminal device after information authentication is completed.
As an example, a specific process of the user terminal device initiating the authentication request includes: establishing network connection between user terminal equipment and information authentication terminal equipment; according to the message format of the network link of the established network connection, the session feature code for carrying out the key distribution transaction and the public key certificate of the user terminal equipment are sent to the information authentication terminal equipment, and an authentication request is sent to the information authentication terminal equipment. Specifically, the public key certificate of the user terminal device is preset in the user terminal device and is a public key certificate issued by the user terminal device certificate issuing center. And calling a pseudo-random number generation interface by the user terminal equipment, randomly generating a character string consisting of 16-byte hash codes, and distributing the character string serving as a key to the transaction session feature code. Establishing network connection between user terminal equipment and information authentication terminal equipment; and according to the message format of the network link of the established network connection, sending the public key certificate of the session feature code user terminal equipment to the information authentication terminal equipment, and authenticating the legality of the user terminal equipment by the information authentication terminal equipment.
The specific process of using the information authentication terminal device to authenticate the validity of the public key certificate of the user terminal device includes: performing first validity authentication on a public key certificate of the user terminal equipment based on a certificate authentication public key preset in the information authentication terminal equipment; if the first authentication fails, the public key certificate of the user terminal equipment is considered to be illegal; if the first authentication is successful, analyzing the public key certificate of the user terminal equipment, and acquiring the corresponding public key certificate identity information terminal serial number and the user terminal equipment public key; matching the serial number of the public key certificate identity information terminal with the hardware serial number of the user terminal equipment, and performing second validity authentication; if the matching fails, the public key certificate of the user terminal equipment is considered to be illegal; if the matching is successful, the public key certificate of the user terminal equipment is considered to be legal; and the public key certificate of the user terminal equipment passes the validity authentication of the information authentication terminal equipment. Specifically, the information authentication terminal device is preset with a certificate authentication public key of a certificate issuing center of the user terminal device. And verifying the validity of the public key certificate of the user terminal equipment, and if the authentication fails, terminating the transaction process by the information authentication terminal equipment without responding to the user terminal equipment. Firstly, performing first authentication, using a certificate authentication public key to verify whether a public key certificate of the user terminal equipment is legal or not through the information authentication terminal equipment, and if the first authentication fails, considering that the public key certificate of the user terminal equipment is illegal. If the first authentication is successful, the public key certificate content of the user terminal equipment is analyzed through the information authentication terminal equipment, and the identity information terminal serial number of the public key certificate and the public key of the user terminal equipment are obtained. Matching the serial number of the public key certificate identity information terminal with the hardware serial number of the user terminal equipment, and performing second validity authentication; if the information authentication terminal equipment does not approve the public key certificate identity information terminal serial number information, namely the information is not matched with the terminal hardware serial number, the second authentication is failed, and the public key certificate of the user terminal equipment is illegal. If the information authentication terminal equipment approves the public key certificate identity information terminal serial number information, namely the information is matched with the terminal hardware serial number, the second authentication is successful, and the public key certificate of the user terminal equipment is legal. After the first authentication and the second authentication of the public key certificate of the user terminal equipment by the information authentication terminal equipment are both successful, the public key certificate of the user terminal equipment is considered to be legal.
Therefore, after mutual verification is carried out by the information authentication storage terminal equipment and the user terminal equipment, the information authentication storage terminal equipment receives the big data information transmitted by the user terminal equipment, so that the embodiment can carry out encryption transmission during data storage, and can prevent other external personnel from stealing the data to be stored or stored.
In an exemplary embodiment, the process of establishing a communication connection between the user terminal device and the information authentication terminal device includes:
acquiring a serial number generated on the information authentication terminal equipment;
generating a communication access request of the information authentication terminal equipment according to the big data information;
acquiring verification information stored in a server by the user terminal equipment based on the communication access request;
verifying the serial number by using the verification information, and determining whether the serial number exists in a directory corresponding to the verification information; if the information authentication terminal device exists completely, establishing communication connection between the user terminal device and the information authentication terminal device; and if the information authentication terminal device does not exist completely, the communication connection between the user terminal device and the information authentication terminal device is not established.
In an exemplary embodiment, after the user terminal device establishes a communication connection with the information authentication terminal device, the method further includes:
acquiring a flow configuration request generated by a target user on the user terminal equipment;
creating at least one sub-traffic pool according to the traffic configuration request, and acquiring partial traffic bandwidth from a total traffic pool as initial traffic bandwidth of the sub-traffic pool after the creation of the sub-traffic pool is completed;
and equally dividing the initial flow bandwidth into wireless communication links in the user terminal equipment and the information authentication terminal equipment after the communication connection is established.
For example, in the embodiment of the present application, 80 target users send traffic configuration requests, the server receives the traffic configuration requests sent by the 80 target users, and creates 10 sub-traffic pools in the target traffic pool according to the traffic configuration requests sent by the 80 target users, and each sub-traffic pool minus 8 wireless communication links allocates an initial traffic bandwidth. Due to the fact that links for transmitting the traffic configuration request are out-of-order and uncontrolled, the 10 sub-traffic pools may not be uniformly distributed in the 80 wireless communication links, and thus, it may happen that the traffic configured by the traffic configuration request received in one or more wireless communication links exceeds its initial traffic, so that some user terminal devices where target users are located may not obtain bandwidth or traffic, or obtain less bandwidth or traffic, and directly affect the use experience of the target users; and the flow in the other sub-flow pool can not be fully used and is in an idle state, so that the flow utilization rate is low. Specifically, there may be traffic configuration requests in which 20 to 30 wireless communication links allocate 50 to 70 target users, and the remaining 50 to 60 wireless communication links allocate the remaining 10 to 30 target users, so that most of the traffic configuration requests of the target users are concentrated in the 20 to 30 wireless communication links, and the remaining 50 to 60 wireless communication links have fewer traffic configuration requests, so that the remaining traffic of the remaining 50 to 60 wireless communication links is excessive and is in an idle state, and is not fully used, resulting in low traffic utilization rate. If the flow of each sub-flow pool is directly increased, not only can the production cost be increased, but also the problems continue to exist due to the characteristics of disordered and uncontrolled transmission of the link, which directly causes that the enterprise cannot increase the corresponding income while increasing the production cost, and also influences the use experience of the target user. The technical scheme is used for dynamically configuring the sub-flow pools with more or more concentrated flow configuration requests in real time and allocating more flows to the sub-flow pools, for example, the residual flows in the target flow pool are allocated to the sub-flow pools with more or more concentrated flow configuration requests, so that the idle flows in the target flow pool are fully utilized under the condition of not changing the existing total flow, the use experience of a target user can be increased, and the favorable comment of more target users can be obtained under the condition of not paying more production cost.
In an exemplary embodiment, further comprising: after information authentication is completed, acquiring the transmission duration of the big data information on the wireless communication link;
and judging whether the transmission time length is within a preset time length range, if not, dynamically adjusting the initial flow bandwidth on the wireless communication link, and controlling the transmission time length of the big data information on the wireless communication link to be within the preset time length range.
Specifically, if the transmission duration is less than the minimum value in the preset duration range, the initial traffic bandwidth in the wireless communication link is reduced, the communication link with the reduced traffic bandwidth is used to transmit the big data information to the information authentication terminal device, and the transmission duration of the big data information is controlled to be within the preset duration range. If the transmission time length is larger than the maximum value in the preset time length range, acquiring part or all of the traffic bandwidth from the residual traffic bandwidth of the total traffic pool, superposing the acquired part or all of the traffic bandwidth on the wireless communication link to form a superposed communication link, transmitting the big data information to the information authentication terminal equipment by utilizing the superposed communication link, and controlling the transmission time length of the big data information to be in the preset time length range.
Therefore, after the system dynamically adjusts the flow bandwidth on the wireless communication link, the big data information is not transmitted quickly in the transmission process or slowly in the transmission process, but is stably transmitted on the communication link, so that the system can solve the problem of network congestion when the user terminal equipment transmits data to the information authentication storage terminal equipment, and can solve the problem that the flow bandwidth cannot be fully used.
In an exemplary embodiment, further comprising: acquiring a response message of address allocation equipment aiming at the user terminal equipment, wherein the response message carries a network address and a physical address of the user terminal equipment; controlling the authentication information processing equipment to determine the authentication information of the user terminal equipment according to the response message; and the authentication information processing equipment sends the authentication information to an authentication server so that the authentication server performs access authentication on the user terminal equipment according to the authentication information.
In summary, the system first obtains big data information generated on the user terminal device, and establishes a communication connection between the user terminal device and the information authentication terminal device based on the big data information; after the communication connection is established, the information authentication terminal equipment is controlled to receive an authentication request from the user terminal equipment, the validity of a public key certificate of the user terminal equipment is authenticated according to the authentication request, and after the validity verification is passed, a central certificate and a corresponding authentication certificate chain in the information authentication terminal equipment are responded to the user terminal equipment; controlling the information authentication terminal equipment to receive an information authentication storage request from the user terminal equipment, and remotely injecting an encryption key into the user terminal equipment according to the information authentication storage request; and encrypting the big data information generated on the user terminal equipment by using the encryption key, transmitting the encrypted big data information to the information authentication terminal equipment for information authentication according to the communication connection which is pre-established between the user terminal equipment and the information authentication terminal equipment, and storing the big data information into the information authentication terminal equipment after the information authentication is finished. Therefore, after mutual verification is carried out by the information authentication storage terminal equipment and the user terminal equipment, the information authentication storage terminal equipment receives the big data information transmitted by the user terminal equipment, so that the system can carry out encryption transmission during data storage, and can prevent other external personnel from stealing data to be stored or stored. In addition, after the system dynamically adjusts the flow bandwidth on the wireless communication link, the big data information is not transmitted quickly in the transmission process, or transmitted slowly in the transmission process, but is stably transmitted on the communication link, so that the system can also solve the problem of network congestion when the user terminal equipment transmits data to the information authentication storage terminal equipment, and can solve the problem that the flow bandwidth cannot be fully used.
The foregoing embodiments are merely illustrative of the principles and utilities of the present invention and are not intended to limit the invention. Any person skilled in the art can modify or change the above-mentioned embodiments without departing from the spirit and scope of the present invention. Accordingly, it is intended that all equivalent modifications or changes which can be made by those skilled in the art without departing from the spirit and technical spirit of the present invention be covered by the claims of the present invention.
Claims (10)
1. An information authentication storage method based on big data is characterized by comprising the following steps:
acquiring big data information generated on user terminal equipment, and establishing communication connection between the user terminal equipment and information authentication terminal equipment based on the big data information;
after the communication connection is established, the information authentication terminal equipment is controlled to receive an authentication request from the user terminal equipment, the validity of a public key certificate of the user terminal equipment is authenticated according to the authentication request, and after the validity verification is passed, a central certificate and a corresponding authentication certificate chain in the information authentication terminal equipment are responded to the user terminal equipment; controlling the information authentication terminal equipment to receive an information authentication storage request from the user terminal equipment, and remotely injecting an encryption key into the user terminal equipment according to the information authentication storage request;
and encrypting the big data information generated on the user terminal equipment by using the encryption key, transmitting the encrypted big data information to the information authentication terminal equipment for information authentication according to the communication connection which is pre-established between the user terminal equipment and the information authentication terminal equipment, and storing the big data information into the information authentication terminal equipment after the information authentication is finished.
2. The big data-based information authentication storage method according to claim 1, wherein the process of establishing the communication connection between the user terminal device and the information authentication terminal device comprises:
acquiring a serial number generated on the information authentication terminal equipment;
generating a communication access request of the information authentication terminal equipment according to the big data information;
acquiring verification information stored in a server by the user terminal equipment based on the communication access request;
verifying the serial number by using the verification information, and determining whether the serial number exists in a directory corresponding to the verification information; if the information authentication terminal device exists completely, establishing communication connection between the user terminal device and the information authentication terminal device; and if the information authentication terminal device does not exist completely, the communication connection between the user terminal device and the information authentication terminal device is not established.
3. The big data-based information authentication and storage method according to claim 1 or 2, further comprising, after the user terminal device establishes a communication connection with the information authentication terminal device:
acquiring a flow configuration request generated by a target user on the user terminal equipment;
creating at least one sub-traffic pool according to the traffic configuration request, and acquiring partial traffic bandwidth from a total traffic pool as initial traffic bandwidth of the sub-traffic pool after the creation of the sub-traffic pool is completed;
and equally dividing the initial flow bandwidth into wireless communication links in the user terminal equipment and the information authentication terminal equipment after the communication connection is established.
4. The big data-based information authentication storage method according to claim 3, further comprising: after information authentication is completed, acquiring the transmission duration of the big data information on the wireless communication link;
and judging whether the transmission time length is within a preset time length range, if not, dynamically adjusting the initial flow bandwidth on the wireless communication link, and controlling the transmission time length of the big data information on the wireless communication link to be within the preset time length range.
5. The big data-based information authentication storage method according to claim 4, further comprising: if the transmission duration is less than the minimum value in the preset duration range, reducing the initial flow bandwidth in the wireless communication link, transmitting the big data information to the information authentication terminal equipment by using the communication link with the reduced flow bandwidth, and controlling the transmission duration of the big data information to be within the preset duration range;
if the transmission time length is larger than the maximum value in the preset time length range, acquiring part or all of the traffic bandwidth from the residual traffic bandwidth of the total traffic pool, superposing the acquired part or all of the traffic bandwidth on the wireless communication link to form a superposed communication link, transmitting the big data information to the information authentication terminal equipment by utilizing the superposed communication link, and controlling the transmission time length of the big data information to be in the preset time length range.
6. The big data-based information authentication storage method according to claim 1, further comprising: acquiring a response message of address allocation equipment aiming at the user terminal equipment, wherein the response message carries a network address and a physical address of the user terminal equipment;
controlling the authentication information processing equipment to determine the authentication information of the user terminal equipment according to the response message;
and the authentication information processing equipment sends the authentication information to an authentication server so that the authentication server performs access authentication on the user terminal equipment according to the authentication information.
7. An information authentication storage system based on big data, which is characterized in that the system comprises:
the communication module is used for acquiring big data information generated on the user terminal equipment and establishing communication connection between the user terminal equipment and the information authentication terminal equipment based on the big data information;
the information authentication module is used for controlling the information authentication terminal equipment to receive an authentication request from the user terminal equipment after communication connection is established, authenticating the legality of a public key certificate of the user terminal equipment according to the authentication request, and responding a central certificate in the information authentication terminal equipment and a corresponding authentication certificate chain to the user terminal equipment after the legality verification is passed; controlling the information authentication terminal equipment to receive an information authentication storage request from the user terminal equipment, and remotely injecting an encryption key into the user terminal equipment according to the information authentication storage request;
and the encryption storage module is used for encrypting the big data information generated on the user terminal equipment by using the encryption key, transmitting the encrypted big data information to the information authentication terminal equipment for information authentication according to the communication connection which is pre-established between the user terminal equipment and the information authentication terminal equipment, and storing the big data information into the information authentication terminal equipment after the information authentication is finished.
8. The big data based information authentication storage system according to claim 7, wherein the process of establishing the communication connection between the user terminal device and the information authentication terminal device comprises:
acquiring a serial number generated on the information authentication terminal equipment;
generating a communication access request of the information authentication terminal equipment according to the big data information;
acquiring verification information stored in a server by the user terminal equipment based on the communication access request;
verifying the serial number by using the verification information, and determining whether the serial number exists in a directory corresponding to the verification information; if the information authentication terminal device exists completely, establishing communication connection between the user terminal device and the information authentication terminal device; and if the information authentication terminal device does not exist completely, the communication connection between the user terminal device and the information authentication terminal device is not established.
9. The big data based information authentication storage system according to claim 7 or 8, further comprising, after the user terminal device establishes a communication connection with the information authentication terminal device:
acquiring a flow configuration request generated by a target user on the user terminal equipment;
creating at least one sub-traffic pool according to the traffic configuration request, and acquiring partial traffic bandwidth from a total traffic pool as initial traffic bandwidth of the sub-traffic pool after the creation of the sub-traffic pool is completed;
and equally dividing the initial flow bandwidth into wireless communication links in the user terminal equipment and the information authentication terminal equipment after the communication connection is established.
10. The big data based information authentication storage system according to claim 9, further comprising: after information authentication is completed, acquiring the transmission duration of the big data information on the wireless communication link;
judging whether the transmission time length is within a preset time length range, if not, dynamically adjusting the initial flow bandwidth on the wireless communication link, and controlling the transmission time length of the big data information on the wireless communication link to be within the preset time length range;
if the transmission duration is less than the minimum value in the preset duration range, reducing the initial flow bandwidth in the wireless communication link, transmitting the big data information to the information authentication terminal equipment by using the communication link with the reduced flow bandwidth, and controlling the transmission duration of the big data information to be within the preset duration range;
if the transmission time length is larger than the maximum value in the preset time length range, acquiring part or all of the traffic bandwidth from the residual traffic bandwidth of the total traffic pool, superposing the acquired part or all of the traffic bandwidth on the wireless communication link to form a superposed communication link, transmitting the big data information to the information authentication terminal equipment by utilizing the superposed communication link, and controlling the transmission time length of the big data information to be in the preset time length range.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110978572.7A CN113660098A (en) | 2021-08-25 | 2021-08-25 | Information authentication storage method and system based on big data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110978572.7A CN113660098A (en) | 2021-08-25 | 2021-08-25 | Information authentication storage method and system based on big data |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113660098A true CN113660098A (en) | 2021-11-16 |
Family
ID=78481875
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110978572.7A Pending CN113660098A (en) | 2021-08-25 | 2021-08-25 | Information authentication storage method and system based on big data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113660098A (en) |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105282143A (en) * | 2015-09-09 | 2016-01-27 | 民航局空管局技术中心 | Message access control method, device and system |
CN106921481A (en) * | 2015-12-28 | 2017-07-04 | 航天信息股份有限公司 | A kind of system and method for tenant's division and purview certification based on PKI |
CN107566407A (en) * | 2017-10-20 | 2018-01-09 | 哈尔滨工程大学 | A kind of two-way authentication Security Data Transmission and storage method based on USBkey |
CN109274602A (en) * | 2018-09-28 | 2019-01-25 | 深圳供电局有限公司 | Flow managing method, device, computer equipment and storage medium |
CN110177001A (en) * | 2019-05-21 | 2019-08-27 | 广东联合电子服务股份有限公司 | A kind of NFC circle deposit method, system and storage medium based on soft certificate |
CN111277508A (en) * | 2020-01-07 | 2020-06-12 | 上海飞旗网络技术股份有限公司 | Dynamic flow pool configuration method based on data transmission |
CN111669335A (en) * | 2020-06-17 | 2020-09-15 | 山东博远数据服务有限公司 | Stable and efficient network big data communication method and system |
CN112199688A (en) * | 2019-07-08 | 2021-01-08 | 成都乐珂科技有限公司 | File encryption protection method and access control system |
CN112769574A (en) * | 2020-12-28 | 2021-05-07 | 云从科技集团股份有限公司 | Key injection method and system, key management system, device and machine readable medium |
CN112988674A (en) * | 2021-03-12 | 2021-06-18 | 平安国际智慧城市科技股份有限公司 | Method and device for processing big data file, computer equipment and storage medium |
-
2021
- 2021-08-25 CN CN202110978572.7A patent/CN113660098A/en active Pending
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105282143A (en) * | 2015-09-09 | 2016-01-27 | 民航局空管局技术中心 | Message access control method, device and system |
CN106921481A (en) * | 2015-12-28 | 2017-07-04 | 航天信息股份有限公司 | A kind of system and method for tenant's division and purview certification based on PKI |
CN107566407A (en) * | 2017-10-20 | 2018-01-09 | 哈尔滨工程大学 | A kind of two-way authentication Security Data Transmission and storage method based on USBkey |
CN109274602A (en) * | 2018-09-28 | 2019-01-25 | 深圳供电局有限公司 | Flow managing method, device, computer equipment and storage medium |
CN110177001A (en) * | 2019-05-21 | 2019-08-27 | 广东联合电子服务股份有限公司 | A kind of NFC circle deposit method, system and storage medium based on soft certificate |
CN112199688A (en) * | 2019-07-08 | 2021-01-08 | 成都乐珂科技有限公司 | File encryption protection method and access control system |
CN111277508A (en) * | 2020-01-07 | 2020-06-12 | 上海飞旗网络技术股份有限公司 | Dynamic flow pool configuration method based on data transmission |
CN111669335A (en) * | 2020-06-17 | 2020-09-15 | 山东博远数据服务有限公司 | Stable and efficient network big data communication method and system |
CN112769574A (en) * | 2020-12-28 | 2021-05-07 | 云从科技集团股份有限公司 | Key injection method and system, key management system, device and machine readable medium |
CN112988674A (en) * | 2021-03-12 | 2021-06-18 | 平安国际智慧城市科技股份有限公司 | Method and device for processing big data file, computer equipment and storage medium |
Non-Patent Citations (1)
Title |
---|
陈天华: "基于PKI技术的网络安全策略", 信息技术与标准化, no. 10 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106357649B (en) | User identity authentication system and method | |
US8631481B2 (en) | Access to a network for distributing digital content | |
CN103428696B (en) | Virtual SIM card achieving method and system and relevant device | |
US6275859B1 (en) | Tree-based reliable multicast system where sessions are established by repair nodes that authenticate receiver nodes presenting participation certificates granted by a central authority | |
US7562224B2 (en) | System and method for multi-session establishment for a single device | |
CN100512201C (en) | Method for dealing inserted-requested message of business in groups | |
CN111275419B (en) | Block chain wallet signature right confirming method, device and system | |
TWI746229B (en) | A multi-node authentication method and apparatus based on block chain | |
CN101772024A (en) | User identification method, device and system | |
CN111414647A (en) | Tamper-proof data sharing system and method based on block chain technology | |
CN105050086A (en) | Method for terminal to log in Wifi hotspot | |
CN111181931B (en) | Authorization system and method based on user terminal authentication | |
CN115883154A (en) | Access certificate issuing method, block chain-based data access method and device | |
CN104796399A (en) | Key negotiation method of data encryption transmission | |
KR102372503B1 (en) | Method for providing authentification service by using decentralized identity and server using the same | |
CN110247905A (en) | The data backup memory method and system of secure authentication mode based on Token | |
HUE029848T2 (en) | Method and equipment for establishing secure connection on a communication network | |
US9622075B2 (en) | System and method for adaptive multifactor authentication | |
JP2016139910A (en) | Authentication system, authentication key management device, authentication key management method and authentication key management program | |
CN115473655B (en) | Terminal authentication method, device and storage medium for access network | |
CN101051897B (en) | Biological information certifying method | |
CN113660098A (en) | Information authentication storage method and system based on big data | |
CN106789076B (en) | Interaction method and device for server and intelligent equipment | |
CN115913521A (en) | Method for identity authentication based on quantum key | |
CN112383392B (en) | Video conference rotation encryption method, video conference rotation encryption equipment and computer readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |