CN114499940A - Network connection method, device and computer readable medium - Google Patents

Network connection method, device and computer readable medium Download PDF

Info

Publication number
CN114499940A
CN114499940A CN202111577379.9A CN202111577379A CN114499940A CN 114499940 A CN114499940 A CN 114499940A CN 202111577379 A CN202111577379 A CN 202111577379A CN 114499940 A CN114499940 A CN 114499940A
Authority
CN
China
Prior art keywords
verification
local time
time
request
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111577379.9A
Other languages
Chinese (zh)
Inventor
潘硕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN202111577379.9A priority Critical patent/CN114499940A/en
Publication of CN114499940A publication Critical patent/CN114499940A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The application discloses a network connection method, a network connection device and a computer readable medium, wherein the method is applied to a browser client, and the browser client is in communication connection with a server; the browser client sends a connection request of a secure network to the server; receiving a verification request which is sent by a server and corresponds to the connection request; then, according to the verification request, verifying the local time to obtain a first verification result; if the first verification result represents that the verification fails, adjusting the local time to obtain the adjusted local time; finally, based on the adjusted local time, the verification of the local time is executed again to obtain a second verification result; and if the second verification result represents that the verification is passed, executing networking operation corresponding to the connection request.

Description

Network connection method, device and computer readable medium
Technical Field
The present invention relates to the field of information processing technologies, and in particular, to a network connection method, an apparatus, and a computer-readable medium.
Background
Electronic products such as mobile phones, tablets, notebook computers or desktop computers are not used for a long time, so that a system clock fails when the electronic products are powered on again, and the local time of the electronic products is inconsistent with the network time. When a user accesses the http webpage, user information needs to be input in a login interface, and the login interface cannot be opened or the user information cannot be input due to the fact that the local time of the electronic product is inconsistent with the network time, so that the network between the server and the main device cannot be connected.
When the existing scheme is used for solving the problems, the latest updating time of the electronic product recording system is usually adopted, and if the local time is earlier than the recording time, the local time is updated to the recording time; however, if the system does not update the system time for a long time, the recorded latest update time is older, and when the user uses the electronic product again, the problem that the system time is inconsistent with the network time still exists, so that the user cannot access the https webpage.
Disclosure of Invention
In order to solve the problems in the prior art, embodiments of the present invention provide a network connection method, an apparatus, and a computer readable medium, which can still effectively connect a network when an electronic product is not used for a long time and is powered on again, thereby improving user networking experience.
To achieve the above object, according to a first aspect of the embodiments of the present invention, a network connection method is provided, where the method is applied to a browser client; the browser client is in communication connection with the server; the method comprises the following steps: sending a connection request of a secure network to the server; receiving a verification request which is sent by a server and corresponds to the connection request; according to the verification request, verifying the local time to obtain a first verification result; if the first verification result represents that the verification fails, adjusting the local time to obtain the adjusted local time; re-executing the verification of the local time based on the adjusted local time to obtain a second verification result; and if the second verification result represents that the verification is passed, executing networking operation corresponding to the connection request.
Optionally, the adjusting the local time includes: pushing the local time backwards by a first preset step length to obtain the adjusted local time; wherein, the first preset step length is N years or M months, and N and M are natural numbers more than or equal to 1.
Optionally, if the second verification result represents that the verification fails, the local time is continuously pushed backwards according to the first preset step length to obtain the adjusted local time, and the step of verifying is executed until the verification passes.
Optionally, if the second verification result represents that the verification passes, the networking operation corresponding to the connection request is executed, including: if the second verification result represents that the verification passes, generating a verification interface corresponding to the verification request; and sending user verification information corresponding to the verification request to the server side based on the trigger of the verification interface verification information, so that the server side can execute networking operation corresponding to the connection request based on the user verification information.
Optionally, the verifying the local time according to the verification request to obtain a first verification result includes: acquiring a digital certificate from a server according to the verification request; extracting a verification time from the digital certificate; and verifying the local time by using the verification time to obtain a first verification result.
Optionally, the verifying the local time by using the verification time to obtain a first verification result includes: acquiring local time; judging whether the local time is within the range of the verification time; if the judgment result represents that the local time is within the verification time range, determining that the first verification result passes; and if the judgment result represents that the local time is not within the verification time range, determining that the first verification result fails.
Optionally, the browser client interacts with the server through an http communication protocol.
In order to achieve the above object, according to a second aspect of the embodiments of the present application, there is also provided a network connection device, wherein the network connection device is applied to a browser client; the browser client is in communication connection with the server; the device comprises: a sending module, configured to send a connection request of a secure network to the server; the receiving module is used for receiving a verification request which is sent by a server and corresponds to the connection request; the adjusting module is used for verifying the local time according to the verification request to obtain a first verification result; if the first verification result represents that the verification fails, adjusting the local time to obtain the adjusted local time; the execution module is used for re-executing the verification of the local time based on the adjusted local time to obtain a second verification result; and if the second verification result represents that the verification is passed, executing networking operation corresponding to the connection request.
Optionally, the adjusting module includes: the acquisition unit is used for acquiring the digital certificate from the server side according to the verification request; an extracting unit configured to extract a verification time from the digital certificate; and the verification unit is used for verifying the local time by utilizing the verification time to obtain a first verification result.
To achieve the above object, according to a third aspect of embodiments of the present application, there is further provided a computer-readable storage medium, wherein a computer program is stored in the computer-readable storage medium, and when being executed by a processor, the computer program implements the method according to the first aspect.
In order to achieve the above object, according to a fourth aspect of embodiments of the present application, there is also provided an electronic apparatus, including: a processor; a memory for storing the processor-executable instructions; the processor is configured to read the executable instructions from the memory and execute the instructions to implement the method of the first aspect.
Compared with the related art, the network connection method, the network connection device and the computer readable medium are provided by the embodiment of the application, the method is applied to the browser client, and the browser client is in communication connection with the server; the browser client sends a connection request of a secure network to the server; receiving a verification request which is sent by a server and corresponds to the connection request; then, according to the verification request, verifying the local time to obtain a first verification result; if the first verification result represents that the verification fails, adjusting the local time to obtain the adjusted local time; finally, based on the adjusted local time, the verification of the local time is executed again to obtain a second verification result; and if the second verification result represents that the verification is passed, executing networking operation corresponding to the connection request. Therefore, the network can be automatically and effectively connected, the problem that the network connection of the electronic product is not good due to the fact that the local time of the electronic product is inconsistent with the network time because the electronic product is not used for a long time in the prior art is solved, and the networking experience of a user is improved.
It is to be understood that the teachings of this application need not achieve all of the above-described benefits, but rather that specific embodiments may achieve specific technical results, and that other embodiments of this application may achieve benefits not mentioned above.
Drawings
The drawings are included to provide a further understanding of the application and are not to be construed as limiting the application. Wherein like or corresponding reference numerals designate like or corresponding parts throughout the several views.
Fig. 1 is a schematic flow chart of a network connection method according to an embodiment of the present application;
FIG. 2 is a schematic flow chart diagram of a network connection method according to another embodiment of the present application;
FIG. 3 is a schematic flow chart diagram of a local time verification method according to an embodiment of the present application;
fig. 4 is a schematic diagram illustrating an http network connection process according to an embodiment of the present application;
fig. 5 is a schematic block diagram of a network connection device according to an embodiment of the present application.
Detailed Description
The following description of the exemplary embodiments of the present application, taken in conjunction with the accompanying drawings, includes various details of the embodiments of the application for the understanding of the same, which are to be considered exemplary only. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the present application. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.
The user enters a web address of http at the browser client and then connects to 443 port of the server. The server side adopting the http protocol is provided with a set of digital certificates, the digital certificates can be made by the user himself or applied to an organization by the user, the difference is that the certificates issued by the user himself can be continuously accessed only by the client side through verification, and a prompt page cannot be popped up when the certificates applied by a trusted company are used. A digital certificate contains a public key, a private key, an authority that issued the certificate, and a certificate validity period for the digital certificate.
The server transmits the digital certificate to the browser client, and the browser client verifies whether the digital certificate is valid, such as an issuing organization, a certificate validity period and the like. If an exception is found, a warning box is popped up to prompt that the certificate has a problem. If the verification is passed, the browser client generates a random value; and then encrypting the random value by using the public key, sending the encrypted random value to the server, decrypting by using a private key corresponding to the public key by using the server so as to obtain the random value transmitted by the browser client, and symmetrically encrypting the message information sent between the server and the client by using the random value. Thereby improving the security of the transmission of data.
According to the method and the system, the browser client is not used for a long time, so that the system clock has delay. When the browser client verifies the certificate validity period of the digital certificate, whether the local time is within the certificate validity period of the digital certificate is judged, and if the verification result shows that the local time is not within the certificate validity period, the local time is adjusted to be within the certificate validity period of the digital certificate, so that the certificate validity period of the digital certificate passes verification. After the digital certificate passes the verification, the browser client can generate a verification interface corresponding to the verification request, so that the wireless network connection of the browser client is facilitated.
Fig. 1 is a schematic flow chart of a network connection method according to an embodiment of the present application. A network connection method is applied to a browser client, and the browser client is in communication connection with a server; the method at least comprises the following operation flows: s101, sending a connection request of a secure network to a server; s102, receiving a verification request which is sent by a server and corresponds to the connection request; s103, verifying the local time according to the verification request to obtain a first verification result; if the first verification result represents that the verification fails, adjusting the local time to obtain the adjusted local time; s104, re-executing the verification of the local time based on the adjusted local time to obtain a second verification result; and S105, if the second verification result represents that the verification is passed, executing networking operation corresponding to the connection request.
In S101, based on a trigger of the user to the browser client, the browser client sends a connection request of the secure network to the server. Here, the secure network may be a wireless network based on the http protocol, or may be a wireless network encrypted based on another protocol.
In S102, the server sends a verification request corresponding to the connection request to the browser client according to the connection request, and the browser client receives the verification request. Here, the authentication request may be an authentication request based on an account and a password of the user logging in the network, or may be other requests for user authentication, which is not limited herein.
In S103, the local time is obtained from the RTC clock of the browser client, and the local time may be verified based on the time of the server, or may be verified based on a security certificate between the client and the server, which is not limited herein.
If the first verification result represents that the local time does not meet the preset condition, the first verification result is indicated to fail, and at the moment, the local time needs to be pushed backwards by a first preset step length, so that the local time is adjusted for the first time; wherein, the first preset step length is N years or M months, and N and M are natural numbers more than or equal to 1. If the first verification result represents that the local time meets the preset condition, the first verification result is passed, and at the moment, networking operation corresponding to the connection request needs to be executed. The first preset step length may also be N days or M weeks, where N and M are natural numbers greater than or equal to 1. Alternatively, the first preset step may be N hours or M minutes, where N and M are natural numbers greater than or equal to 1.
For example: the first preset step length is 1 year, the local time is 6 months and 1 day in 2019, and the adjusted local time is 6 months and 1 day in 2020 by gradually overlapping according to the first preset step length on the basis of the local time.
If the first preset step length is 8 months and the local time is 2019, 6, month and 1 day, gradually overlapping according to the first preset step length on the basis of the local time to obtain the adjusted local time of 2020, 4, month and 1 day.
If the first preset step length is 15 months and the local time is 6 months and 1 day in 2019, and the first preset step length is 3 months in 1 year, the years can be adjusted first and then the months can be adjusted when the first preset step length is gradually overlapped, namely 1 year is prolonged and then 3 months are prolonged on the basis of 2019, and the adjusted local time is 9 months and 1 day in 2020.
It should be noted that, in order to prevent an unexpected situation from occurring at the browser client due to too large adjustment range, an upper limit is usually set for the first preset step length.
In S104 to S105, the adjusted local time is verified again, so that a second verification result is obtained. And if the second verification result represents that the adjusted local time meets the preset condition, the second verification result is passed, and at the moment, the browser client executes networking operation corresponding to the connection request. If the second verification result represents that the adjusted local time does not meet the preset condition, the second verification result is failed; at the moment, the adjusted local time is continuously pushed backwards according to the first preset step length, so that the local time is adjusted for the second time; verifying the local time after the second adjustment, and if the local time passes the verification, executing networking operation; and if the verification is not passed, continuing to adjust the local time until the verification is passed.
Here, the preset condition may be an authentication time extracted from the digital certificate acquired by the server by the browser client. The preset condition may also be the time of authentication and the issuing authority.
For example, when the preset condition is the verification time, the browser client acquires a digital certificate from the server according to the verification request, then acquires a certificate validity period from the digital certificate, takes the certificate validity period as the verification time, and finally verifies the local time by judging whether the local time meets the verification time.
When the preset conditions are the verification time and the issuing mechanism, the browser client acquires the digital certificate from the server according to the verification request, then extracts the certificate issuing mechanism from the digital certificate, firstly judges whether the issuing mechanism is wrong, if the issuing mechanism is wrong, acquires the certificate validity period from the digital certificate, takes the certificate validity period as the verification time, and finally judges whether the local time meets the verification time, so that the local time is verified.
According to the method and the device, a browser client sends a connection request of a secure network to a server, receives a verification request which is sent by the server and corresponds to the connection request, and then verifies local time according to the verification request to obtain a first verification result; if the first verification result represents that the verification fails, adjusting the local time to obtain the adjusted local time; finally, based on the adjusted local time, the verification of the local time is executed again to obtain a second verification result; and if the second verification result represents that the verification is passed, executing networking operation corresponding to the connection request. Therefore, the network can be automatically and effectively connected, the problem that the network connection of the electronic product is not good due to the fact that the local time of the electronic product is inconsistent with the network time because the electronic product is not used for a long time in the prior art is solved, and the networking experience of a user is improved.
As shown in fig. 2, a schematic flow chart of a network connection method according to another embodiment of the present application is shown. The embodiment is further optimized on the basis of the previous embodiment. A network connection method is applied to a browser client, and the method at least comprises the following operation flows: s201, sending a connection request of a secure network to a server; s202, receiving a verification request which is sent by a server and corresponds to the connection request; s203, verifying the local time according to the verification request to obtain a first verification result; if the first verification result represents that the verification fails, adjusting the local time to obtain the adjusted local time; s204, based on the adjusted local time, re-executing the verification of the local time to obtain a second verification result; s205, if the second verification result represents that the verification passes, generating a verification interface corresponding to the verification request; s206, if the second verification result represents that the verification fails, the local time is continuously pushed backwards according to the first preset step length to obtain the adjusted local time, the verification step is executed until the verification is passed, and a verification interface corresponding to the verification request is generated; s207, based on the trigger of the verification interface verification information, sending user verification information corresponding to the verification request to the server side, so that the server side can execute networking operation corresponding to the connection request based on the user verification information.
The specific implementation processes of S201, S202, S203, and S204 are similar to those of S101, S102, S103, and S104 in fig. 1, and are not repeated here.
In S205 to S207, the verification interface is a verification interface based on the user identity information, for example: the authentication interface may be an interface of a user login account and a login password. Then, based on the triggering of the user to the interface of the login account and the login password, generating user authentication information; the browser client sends user authentication information corresponding to the authentication request to the server; and the server verifies the identity of the user according to the user verification information, and if the user identity verification passes, the server sends networking success information to the browser client.
Therefore, in the embodiment, based on the verification result of the browser client to the local time, the local time is adjusted until the local time passes the verification, and a verification interface is generated; therefore, the local time of the browser client is adjusted to be within the validity period of the certificate. Then based on the interaction between the browser client and the server, the server receives the user verification information sent by the browser client, verifies the user verification information and finally performs networking based on the verification result; therefore, the network of the browser client can be safely and effectively connected, and the reliability of network connection is improved.
As shown in fig. 3, a schematic flow chart of a local time verification method according to an embodiment of the present application is shown. The embodiment is further optimized on the basis of the previous embodiment. The local time verification method at least comprises the following operation flows: s301, acquiring a digital certificate from a server side according to the verification request;
s302, extracting verification time from the digital certificate; s303, verifying the local time by using the verification time to obtain a first verification result.
Specifically, after receiving a verification request sent by a server, a browser client acquires a digital certificate from the server based on the verification request; extracting verification time from the acquired digital certificate, then acquiring local time, and judging whether the local time is in the range of the verification time; if the judgment result represents that the local time is within the verification time range, determining that the first verification result passes; and if the judgment result represents that the local time is not within the range of the verification time, determining that the first verification result fails.
Here, the verification time generally refers to a time range. The certificate validity period of the digital certificate may be set as the verification time; the verification time may also be extracted based on the certificate validity period of the digital certificate, for example: the certificate validity period of the digital certificate is usually counted up to the year, month and day, and here, the year or month of the certificate validity period extracted from the digital certificate may be taken as the verification time. For example: the certificate validity of the digital certificate is from 2021/6/24 to 2026/1/25; the authentication time extracted from the digital certificate is 2021 to 2026 years; if the local time is 2019, 6, month and 1, the local time is not in the verification time range, so that the local time verification fails; if the local time is 2021/1/1 or 2021/6/1, the local time passes the verification since the local time is within the verification time range.
The digital certificate may be a CA digital certificate. The CA digital certificate ensures that the transmission signal between the browser client and the server is not intercepted or tampered, thereby ensuring the safety of information transmission between the browser client and the multi-server. The CA digital certificate is used for indicating the identity information of a certificate owner, the signature of a CA organization, a public key, a private key and the validity period of the certificate; the identity information is used for proving the identity of the certificate holder; the CA signature is used for ensuring the authenticity of the identity; the public key and the private key are used for encryption and decryption in the communication process, so that the safety of communication information is ensured; the certificate validity period is used to indicate the time at which the digital certificate is valid.
It should be understood that, in various embodiments of the present invention, the sequence numbers of the above-mentioned processes do not mean the execution sequence, and the execution sequence of each process should be determined by its function and the inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present invention.
In this embodiment, the browser client acquires the digital certificate from the server, extracts the verification time from the digital certificate, and then verifies the local time based on the verification time; therefore, the local time can be effectively verified, and the reliability and the accuracy of the verification result are improved.
The present embodiment will be described in detail with reference to specific application scenarios.
The network request mode is generally divided into two types, namely an Http request and an Http request, wherein the Http transmission belongs to plaintext transmission and is easily intercepted by a person and peeps contents in the plaintext transmission, and the Http is a secure hypertext transmission protocol with an SSL/TLS layer (secure socket layer) added on the basis of Http, and the transmitted contents are obtained by encryption, so the Http is a secure transmission.
Fig. 4 is a schematic diagram illustrating an http network connection process according to an embodiment of the present invention. The browser client and the server interact through an http communication protocol. Based on the triggering of the user on the network connection of the browser client, the browser client sends a connection request of an http network to the server, and the server sends a verification request for networking to the browser client based on the connection request. And the browser client acquires the CA digital certificate from the server according to the verification request, wherein the certificate validity period of the CA digital certificate is 2021/6/24-2026/1/25. The verification time extracted from the CA digital certificate in this embodiment is 2021 to 2026 years. And then the browser client acquires the local time and judges whether the local time is within the verification time range. And if the judgment result represents that the local time of the browser client is within the verification time range, determining that the local time passes verification, and generating a verification interface corresponding to the verification request, wherein the verification interface is used for displaying an interface for logging in a network account and a password. If the judgment result represents that the local time of the browser client is not in the verification time range, determining that the local time is not verified, and adjusting the local time in a mode of increasing year by year to obtain the adjusted local time; for example: the local time is 2019/6/1, and 1 year is added to the local time to obtain an adjusted local time of 2020/6/1. And then judging whether the adjusted local time is in the verification time range or not, if so, continuing to add 1 year to the adjusted local time to obtain 2021/6/1, judging whether the adjusted local time is in the verification time range or not, and if so, passing the characterization verification and generating a verification interface.
The browser client generates verification information based on the triggering of a user on a login network account and a password interface, the verification information is sent to the server, the server verifies the verification information, and if the verification result represents that the user identity verification passes, the browser client sends information that the wireless network connection is successful. Therefore, the http network can be safely and quickly connected, and the safety of network connection is improved.
As shown in fig. 5, a schematic block diagram of a network connection apparatus according to an embodiment of the present application is shown. A network connection device is applied to a browser client; the browser client is in communication connection with the server; the apparatus 500 comprises: a sending module 501, configured to send a connection request of a secure network to a server; a receiving module 502, configured to receive a verification request corresponding to the connection request sent by the server; the adjusting module 503 is configured to verify the local time according to the verification request to obtain a first verification result; if the first verification result represents that the verification fails, adjusting the local time to obtain the adjusted local time; an execution module 504, configured to re-execute the verification of the local time based on the adjusted local time to obtain a second verification result; and if the second verification result represents that the verification is passed, executing networking operation corresponding to the connection request.
In an alternative embodiment, the adjustment module comprises: the adjusting unit is used for pushing the local time backwards by a first preset step length to obtain the adjusted local time; the first preset step length is N years or M months, and N and M are natural numbers which are more than or equal to 1.
In an optional embodiment, the adjusting module 503 is further configured to, if the second verification result represents that the verification fails, continue to push the local time backward according to a first preset step length to obtain an adjusted local time, and execute the step of verification until the verification passes.
In an alternative embodiment, the execution module 504 includes: the generating unit is used for generating a verification interface corresponding to the verification request if the second verification result represents that the verification passes; and the sending unit is used for sending the user authentication information corresponding to the authentication request to the server side based on the trigger of the authentication interface authentication information so that the server side can execute networking operation corresponding to the connection request based on the user authentication information.
In an alternative embodiment, the adjusting module 503 includes: the acquisition unit is used for acquiring the digital certificate from the server side according to the verification request; an extracting unit configured to extract the verification time from the digital certificate; and the verification unit is used for verifying the local time by utilizing the verification time to obtain a first verification result.
In an alternative embodiment, the verification unit comprises: an acquisition subunit, configured to acquire local time; the judging subunit is used for judging whether the local time is within the range of the verification time; the first determining subunit is used for determining that the first verification result passes if the judgment result represents that the local time is within the verification time range; and the second determining subunit is used for determining that the first verification result fails if the judgment result represents that the local time is not within the range of the verification time.
In an alternative embodiment, the browser client interacts with the server via the http communication protocol.
The device can execute the network connection method provided by the embodiment of the application, and has the corresponding functional modules and beneficial effects of executing the network connection method. For details of the network connection method provided in the embodiments of the present application, reference may be made to the following description.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The above-described device embodiments are merely illustrative, for example, the division of the unit is only one logical function division, and there may be other division ways in actual implementation, such as: multiple units or components may be combined, or may be integrated into another device, or some features may be omitted, or not implemented. In addition, the coupling, direct coupling or communication connection between the components shown or discussed may be through some interfaces, and the indirect coupling or communication connection between the devices or units may be electrical, mechanical or other forms.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units; can be located in one place or distributed on a plurality of network units; some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, all functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may be separately regarded as one unit, or two or more units may be integrated into one unit; the integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
Those of ordinary skill in the art will understand that: all or part of the steps for realizing the method embodiments can be completed by hardware related to program instructions, the program can be stored in a computer readable storage medium, and the program executes the steps comprising the method embodiments when executed; and the aforementioned storage medium includes: various media capable of storing program codes, such as a removable storage medium, a Read Only Memory (ROM), a magnetic disk, and an optical disk.
Alternatively, the integrated units described above in the present application may be stored in a computer-readable storage medium if they are implemented in the form of software functional modules and sold or used as independent products. Based on such understanding, the technical solutions of the embodiments of the present application or portions thereof that contribute to the related art may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for enabling a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the methods of the embodiments of the present application. And the aforementioned storage medium includes: a removable storage medium, a ROM, a magnetic disk, an optical disk, or the like, which can store the program code.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (10)

1. A network connection method is applied to a browser client; the browser client is in communication connection with the server; the method comprises the following steps:
sending a connection request of a secure network to the server;
receiving a verification request which is sent by a server and corresponds to the connection request;
according to the verification request, verifying the local time to obtain a first verification result; if the first verification result represents that the verification fails, adjusting the local time to obtain the adjusted local time;
re-executing the verification of the local time based on the adjusted local time to obtain a second verification result; and if the second verification result represents that the verification is passed, executing networking operation corresponding to the connection request.
2. The method of claim 1, wherein the adjusting the local time comprises:
pushing the local time backwards by a first preset step length to obtain the adjusted local time; wherein, the first preset step length is N years or M months, and N and M are natural numbers more than or equal to 1.
3. The method of claim 1, wherein,
and if the second verification result represents that the verification fails, continuously pushing the local time backwards according to the first preset step length to obtain the adjusted local time, and executing the verification step until the verification is passed.
4. The method of claim 1, wherein if the second verification result indicates that the verification passes, performing a networking operation corresponding to the connection request comprises:
if the second verification result represents that the verification passes, generating a verification interface corresponding to the verification request;
and sending user verification information corresponding to the verification request to the server side based on the trigger of the verification interface verification information, so that the server side can execute networking operation corresponding to the connection request based on the user verification information.
5. The method of claim 1, wherein the verifying the local time according to the verification request to obtain a first verification result comprises:
acquiring a digital certificate from a server according to the verification request;
extracting an authentication time from the digital certificate;
and verifying the local time by using the verification time to obtain a first verification result.
6. The method of claim 5, wherein the verifying the local time by using the verification time to obtain a first verification result comprises:
acquiring local time;
judging whether the local time is within the range of the verification time;
if the judgment result represents that the local time is within the verification time range, determining that the first verification result passes;
and if the judgment result represents that the local time is not within the verification time range, determining that the first verification result fails.
7. The method of claim 1, wherein the browser client interacts with the server via an http communication protocol.
8. A network connection device is applied to a browser client; the browser client is in communication connection with the server; the device comprises:
a sending module, configured to send a connection request of a secure network to the server;
the receiving module is used for receiving a verification request which is sent by a server and corresponds to the connection request;
the adjusting module is used for verifying the local time according to the verification request to obtain a first verification result; if the first verification result represents that the verification fails, adjusting the local time to obtain the adjusted local time;
the execution module is used for re-executing the verification of the local time based on the adjusted local time to obtain a second verification result; and if the second verification result represents that the verification is passed, executing networking operation corresponding to the connection request.
9. The apparatus of claim 8, wherein the adjustment module comprises:
the acquisition unit is used for acquiring the digital certificate from the server side according to the verification request;
an extracting unit configured to extract a verification time from the digital certificate;
and the verification unit is used for verifying the local time by utilizing the verification time to obtain a first verification result.
10. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the method of any one of claims 1 to 7.
CN202111577379.9A 2021-12-22 2021-12-22 Network connection method, device and computer readable medium Pending CN114499940A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111577379.9A CN114499940A (en) 2021-12-22 2021-12-22 Network connection method, device and computer readable medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111577379.9A CN114499940A (en) 2021-12-22 2021-12-22 Network connection method, device and computer readable medium

Publications (1)

Publication Number Publication Date
CN114499940A true CN114499940A (en) 2022-05-13

Family

ID=81494368

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111577379.9A Pending CN114499940A (en) 2021-12-22 2021-12-22 Network connection method, device and computer readable medium

Country Status (1)

Country Link
CN (1) CN114499940A (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH05225151A (en) * 1992-02-13 1993-09-03 Toshiba Corp User certification system
CN101478358A (en) * 2008-01-02 2009-07-08 中兴通讯股份有限公司 Method and device for optimized time synchronization correction
CN102625428A (en) * 2012-04-24 2012-08-01 苏州摩多物联科技有限公司 Time synchronization method of wireless sensor networks
CN107508682A (en) * 2017-08-16 2017-12-22 努比亚技术有限公司 Browser certificate authentication method and mobile terminal
CN108259437A (en) * 2016-12-29 2018-07-06 北京神州泰岳软件股份有限公司 A kind of http access methods, http-server and system
CN111541665A (en) * 2020-04-16 2020-08-14 苏州浪潮智能科技有限公司 Data access method, device, storage medium and cluster type security management platform
CN113472790A (en) * 2021-06-30 2021-10-01 中国工商银行股份有限公司 Information transmission method based on HTTPS (hypertext transfer protocol secure protocol), client and server
CN113630364A (en) * 2020-05-06 2021-11-09 阿里巴巴集团控股有限公司 Equipment end, server end, network system and network connection method

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH05225151A (en) * 1992-02-13 1993-09-03 Toshiba Corp User certification system
CN101478358A (en) * 2008-01-02 2009-07-08 中兴通讯股份有限公司 Method and device for optimized time synchronization correction
CN102625428A (en) * 2012-04-24 2012-08-01 苏州摩多物联科技有限公司 Time synchronization method of wireless sensor networks
CN108259437A (en) * 2016-12-29 2018-07-06 北京神州泰岳软件股份有限公司 A kind of http access methods, http-server and system
CN107508682A (en) * 2017-08-16 2017-12-22 努比亚技术有限公司 Browser certificate authentication method and mobile terminal
CN111541665A (en) * 2020-04-16 2020-08-14 苏州浪潮智能科技有限公司 Data access method, device, storage medium and cluster type security management platform
CN113630364A (en) * 2020-05-06 2021-11-09 阿里巴巴集团控股有限公司 Equipment end, server end, network system and network connection method
CN113472790A (en) * 2021-06-30 2021-10-01 中国工商银行股份有限公司 Information transmission method based on HTTPS (hypertext transfer protocol secure protocol), client and server

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
一个渣渣: "https安全证书过期失效的原因以及解决办法", 《FENXIANGLE.ME/FENXIANG/7973.HTML》 *

Similar Documents

Publication Publication Date Title
US20210367795A1 (en) Identity-Linked Authentication Through A User Certificate System
KR101544722B1 (en) Method for performing non-repudiation, payment managing server and user device therefor
CN110677418B (en) Trusted voiceprint authentication method and device, electronic equipment and storage medium
US10680827B2 (en) Asymmetric session credentials
US10402797B2 (en) Secured authentication and transaction authorization for mobile and internet-of-things devices
CN101272237B (en) Method and system for automatically generating and filling login information
US10182044B1 (en) Personalizing global session identifiers
JP4690779B2 (en) Attribute certificate verification method and apparatus
CN101777983B (en) Trading signature method, authentication server and system
CN101461209A (en) Arrangement and method for securing data transmission
CN104038486A (en) System and method for realizing user login identification based on identification type codes
KR101879758B1 (en) Method for Generating User Digital Certificate for Individual User Terminal and for Authenticating Using the Same Digital Certificate
US12033142B2 (en) Authenticator app for consent architecture
US11997210B2 (en) Protection of online applications and webpages using a blockchain
US20220029819A1 (en) Ssl communication system, client, server, ssl communication method, and computer program
CN104125064B (en) A kind of dynamic cipher authentication method, client and Verification System
JP5958703B2 (en) Data certification system and data certification server
JP6712707B2 (en) Server system and method for controlling a plurality of service systems
JP5039931B2 (en) Information processing device
WO2014136665A1 (en) Communications system, client terminal, server, data communications method, and data communications program
CN107918739B (en) Data protection method and device and storage medium
CN114499940A (en) Network connection method, device and computer readable medium
JP5489913B2 (en) Portable information device and encrypted communication program
KR101868564B1 (en) Apparatus for authenticating user in association with user-identification-registration and local-authentication and method for using the same
CN113360924A (en) Data processing method, device, electronic equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination