CN115174062A - Cloud service authentication method, device, equipment and storage medium - Google Patents

Cloud service authentication method, device, equipment and storage medium Download PDF

Info

Publication number
CN115174062A
CN115174062A CN202210764630.0A CN202210764630A CN115174062A CN 115174062 A CN115174062 A CN 115174062A CN 202210764630 A CN202210764630 A CN 202210764630A CN 115174062 A CN115174062 A CN 115174062A
Authority
CN
China
Prior art keywords
node
virtual node
virtual
encryption result
character string
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210764630.0A
Other languages
Chinese (zh)
Other versions
CN115174062B (en
Inventor
李朝霞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Unicom Digital Technology Co Ltd
Unicom Cloud Data Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Unicom Digital Technology Co Ltd
Unicom Cloud Data Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd, Unicom Digital Technology Co Ltd, Unicom Cloud Data Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN202210764630.0A priority Critical patent/CN115174062B/en
Publication of CN115174062A publication Critical patent/CN115174062A/en
Application granted granted Critical
Publication of CN115174062B publication Critical patent/CN115174062B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]

Abstract

The application provides a cloud service authentication method, a device, equipment and a storage medium, wherein the method comprises the following steps: the second virtual node responds to the file transmission request sent by the first virtual node and sends the random character string to the first virtual node, so that the first virtual node sends the random character string to the first real node after receiving the random character string; sending the random character string, the user work number of the first virtual node and the user work number of the second virtual node to the virtual server node, so that the virtual server node sends the random character string, the user work number of the first virtual node and the user work number of the second virtual node to the real server node, and receives a first encryption result sent by the first virtual node and a second encryption result sent by the real server node; and authenticating the second virtual node according to the first encryption result and the second encryption result.

Description

Cloud service authentication method, device, equipment and storage medium
Technical Field
The present application relates to the field of communications technologies, and in particular, to a cloud service authentication method, apparatus, device, and storage medium.
Background
With the development of information technology and cloud service, more and more virtual spaces appear in a network, people can enter the virtual spaces under the support of terminal equipment, various rich activities are carried out in the virtual spaces, and the metas is an intelligent product of the virtual spaces.
In the related art, various virtual spaces can provide various functions for users, so as to meet different requirements of the users. Thus, users often need to shuttle between various virtual spaces. Currently, when a user performs information interaction in a virtual space, a corresponding account needs to be registered, and login in the virtual space is realized according to the account.
However, in the prior art, when the virtual space is accessed, the registration and login modes are complex, the account information is easily lost, accurate authentication of the user cannot be realized, and the cloud service authentication security is low.
Disclosure of Invention
The application provides a cloud service authentication method, a cloud service authentication device, cloud service authentication equipment and a storage medium, and aims to solve the technical problems that in the prior art, when a virtual space is accessed, the registration and login modes are complex, account information is easy to lose, accurate authentication of a user cannot be achieved, and the cloud service authentication safety is low.
In a first aspect, the present application provides a cloud service authentication method, applied to a second virtual node, including:
responding to a file transmission request sent by a first virtual node, sending a random character string to the first virtual node, so that the first virtual node sends the random character string to a first real node after receiving the random character string, wherein the file transmission request carries a company identifier and a user work number of the first virtual node, and the random character string is used for the first real node to encrypt the random character string to obtain a first encryption result and send the first encryption result to the first virtual node, so that the first virtual node sends the first encryption result to a second virtual node;
sending the random character string, the user work number of the first virtual node and the user work number of the second virtual node to a virtual server node so that the virtual server node sends the random character string, the user work number of the first virtual node and the user work number of the second virtual node to a real server node, wherein the random character string and the user work number of the first virtual node are used for the real server node to encrypt the random character string according to the user work number of the first virtual node to obtain a second encryption result, and the second encryption result is sent to a second real node so that the second real node sends the second encryption result to the second virtual node;
receiving a first encryption result sent by the first virtual node and a second encryption result sent by the real server node;
and authenticating the second virtual node according to the first encryption result and the second encryption result.
The application provides a cloud service authentication method, which can realize cloud service authentication in a virtual space, if a first virtual node in the virtual space wants a second virtual node to transmit a certain file, a file transmission request is sent to the second virtual node, the second virtual node can generate a random character string after receiving the request, the random character string is sent to the first virtual node, and the character string is sent to a real server node through the virtual server node, so that the first virtual node and the real server node respectively encrypt the random character string through a preset encryption algorithm to respectively obtain corresponding encryption results, and authentication of the first virtual node can be realized through comparison of the encryption results twice, so that safety authentication between the nodes is realized, authentication is not required to be realized through registration or login of a user during each information transmission, the authentication safety and simplicity are improved, and the cloud service safety is improved.
Optionally, after the authenticating the second virtual node according to the first encryption result and the second encryption result, the method further includes:
and if the authentication is successful, sending a file to the first virtual node according to the file transmission request.
Here, for the first virtual node that is successfully authenticated, the second virtual node may directly transmit the file to the first virtual node, so that the transmission efficiency of the cloud service is improved.
Optionally, after the authenticating the second virtual node according to the first encryption result and the second encryption result, the method further includes:
and if the authentication is unsuccessful, prompting authentication failure information.
The authentication failure information can be prompted for the first virtual node which fails in authentication so as to prompt transmission limitation on the node which fails in authentication, and the security of the cloud service is further improved.
In a second aspect, the present application provides a cloud service authentication method, applied to a first virtual node, including:
sending a file transmission request to a second virtual node, so that the second virtual node sends a random character string to the first virtual node according to the file transmission request, and sends the random character string, a user work number of the first virtual node and a user work number of the second virtual node to a virtual server node, and the random character string, the user work number of the first virtual node and the user work number of the second virtual node are sent to a real server node through the virtual server node, wherein the file transmission request carries a company identifier and a user work number of the first virtual node, and the random character string and the user work number of the first virtual node are used for the real server node to encrypt the random character string according to the user work number of the first virtual node to obtain a second encryption result, and the second encryption result is sent to a second real node, so that the second real node sends the second encryption result to the second virtual node;
receiving a random character string sent by the second virtual node, sending the random character string to a first real node, so that the first real node encrypts a first encryption result obtained by processing the random character string, and sends the first encryption result to the first virtual node;
and receiving the first encryption result, and sending the first encryption result to the second virtual node, so that the second virtual node authenticates the second virtual node according to the first encryption result and the second encryption result.
When the first virtual node requests the second virtual node to transmit the file, the file transmission request is sent, so that the second virtual node generates a random character string for authentication, the random character string is sent to the first real node to be encrypted, the authentication of the first virtual node is achieved through an encryption result obtained by the real server node according to decryption of the random character string, and the safety of cloud service in the virtual world is guaranteed.
In a third aspect, the present application provides a cloud service authentication method, which is applied to a cloud service authentication system including a first real node, a second real node, a first virtual node, a second virtual node, a real server node, and a virtual server node, and the method includes:
the first virtual node sends a file transmission request to the second virtual node, wherein the file transmission request carries a company identifier and a user work number of the first virtual node;
the second virtual node sends a random character string to the first virtual node and sends the random character string, the user job number of the first virtual node and the user job number of the second virtual node to the virtual server node;
after receiving the random character string, the first virtual node sends the random character string to a first real node, so that the first real node encrypts a first encryption result obtained by processing the random character string, and sends the first encryption result to the first virtual node, and the first virtual node sends the first encryption result to a second virtual node;
the virtual server node sends the random character string, the user work number of the first virtual node and the user work number of the second virtual node to a real server node, so that the real server node encrypts the random character string according to the user work number of the first virtual node to obtain a second encryption result, and sends the second encryption result to the second real node;
the second real node sends the second encryption result to the second virtual node;
and the second virtual node authenticates the first virtual node according to the second encryption result and the first encryption result.
The method comprises the steps that two nodes in a metasma are in one-to-one correspondence with real life, the safety of the nodes of two parties transmitting data mutually needs to be guaranteed, the two worlds, namely the real world and the virtual world in the metasma are involved, and the corresponding nodes are a real server node, a first real node and a second real node, and a virtual server node, a first virtual node and a second virtual node in the virtual world. By processing the random character strings generated when cloud service cloud file transmission is initiated through the nodes, the safe and reliable operation of different employees at different physical positions in resource sharing transmission, document sharing and real-time editing and other work is realized, and the application and development of the metastic technology are promoted.
Optionally, before the first virtual node sends the file transfer request to the second virtual node, the method further includes:
and the real server node stores the user job number of the first virtual node and the user job number of the second virtual node.
Here, the real server node may store the user job number of the first virtual node and the user job number of the second virtual node in advance, so that in the cloud service process, the authentication of the nodes is realized according to the user job numbers sent by the first virtual node and the second virtual node.
In a fourth aspect, the present application provides a cloud service authentication apparatus, which is applied to a second virtual node, and includes:
the first sending module is used for responding to a file transmission request sent by a first virtual node, sending a random character string to the first virtual node, so that the first virtual node sends the random character string to a first real node after receiving the random character string, wherein the file transmission request carries a company identifier and a user work number of the first virtual node, and the random character string is used for encrypting the random character string by the first real node to obtain a first encryption result and sending the first encryption result to the first virtual node, so that the first virtual node sends the first encryption result to a second virtual node;
a second sending module, configured to send the random character string, the user job number of the first virtual node, and the user job number of the second virtual node to a virtual server node, so that the virtual server node sends the random character string, the user job number of the first virtual node, and the user job number of the second virtual node to a real server node, where the random character string and the user job number of the first virtual node are used by the real server node to encrypt the random character string according to the user job number of the first virtual node to obtain a second encryption result, and send the second encryption result to a second real node, so that the second real node sends the second encryption result to the second virtual node;
a first receiving module, configured to receive a first encryption result sent by the first virtual node and a second encryption result sent by the real server node;
and the authentication module is used for authenticating the second virtual node according to the first encryption result and the second encryption result.
Optionally, after the authenticating module authenticates the second virtual node according to the first encryption result and the second encryption result, the apparatus further includes:
and the transmission module is used for sending the file to the first virtual node according to the file transmission request if the authentication is successful.
Optionally, after the authenticating module authenticates the second virtual node according to the first encryption result and the second encryption result, the apparatus further includes:
and the prompting module is used for prompting authentication failure information if the authentication is unsuccessful.
In a fifth aspect, the present application provides a cloud service authentication method, which is applied to a first virtual node, and includes:
a third sending module, configured to send a file transmission request to a second virtual node, so that the second virtual node sends a random character string to the first virtual node according to the file transmission request, and sends the random character string, a user job number of the first virtual node, and a user job number of the second virtual node to a virtual server node, and sends the random character string, the user job number of the first virtual node, and the user job number of the second virtual node to a real server node through the virtual server node, where the file transmission request carries a company identifier and a user job number of the first virtual node, and the random character string and the user job number of the first virtual node are used for the real server node to encrypt the random character string according to the user job number of the first virtual node to obtain a second encryption result, and send the second encryption result to the second real node, so that the second real node sends the second encryption result to the second virtual node;
the second receiving module is used for receiving the random character string sent by the second virtual node, sending the random character string to the first real node, so that the first real node encrypts a first encryption result obtained by processing the random character string, and sends the first encryption result to the first virtual node;
and the third receiving module is used for receiving the first encryption result and sending the first encryption result to the second virtual node so that the second virtual node authenticates the second virtual node according to the first encryption result and the second encryption result.
In a sixth aspect, the present application provides a cloud service authentication device, including: at least one processor and a memory;
the memory stores computer-executable instructions;
the at least one processor executing the computer-executable instructions stored by the memory causes the at least one processor to perform the cloud service authentication method as set forth in the first aspect above and in various possible designs of the first aspect.
In a seventh aspect, the present application provides a cloud service authentication device, including: at least one processor and memory;
the memory stores computer-executable instructions;
the at least one processor executing the computer-executable instructions stored by the memory causes the at least one processor to perform the cloud service authentication method as set forth in the second aspect above and in various possible designs of the second aspect.
In an eighth aspect, the present application provides a computer-readable storage medium, in which computer-executable instructions are stored, and when a processor executes the computer-executable instructions, the cloud service authentication method according to the first aspect and various possible designs of the first aspect are implemented.
In a ninth aspect, the present application provides a computer-readable storage medium, which stores computer-executable instructions, and when executed by a processor, implements the cloud service authentication method as set forth in the second aspect and various possible designs of the second aspect.
In a tenth aspect, the present application provides a computer program product comprising a computer program that, when executed by a processor, implements the cloud service authentication method as set forth in the first aspect above and in various possible designs of the first aspect.
In an eleventh aspect, the present application provides a computer program product comprising a computer program that, when executed by a processor, implements the cloud service authentication method as set forth in the second aspect above and in various possible designs of the second aspect.
The cloud service authentication method, the cloud service authentication device, the server and the storage medium can achieve cloud service authentication in a virtual space, if a first virtual node in the virtual space wants a second virtual node to transmit a certain file, a file transmission request is sent to the second virtual node, the second virtual node can generate a random character string after receiving the request, the random character string is sent to the first virtual node, the character string is sent to a real server node through the virtual server node, the first virtual node and the real server node respectively encrypt the random character string through a preset encryption algorithm to respectively obtain corresponding encryption results, authentication of the first virtual node can be achieved through comparison of the encryption results twice, safety authentication between the nodes is achieved, authentication is not needed to be achieved through registration or login of a user during each information transmission, authentication safety and simplicity are improved, and cloud service safety is improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the description below are only some embodiments of the present application, and for those skilled in the art, other drawings may be obtained according to these drawings without inventive labor.
Fig. 1 is a schematic diagram of a cloud service authentication system architecture according to an embodiment of the present disclosure;
fig. 2 is a schematic flowchart of a cloud service authentication method according to an embodiment of the present disclosure;
fig. 3 is a schematic flowchart of another cloud service authentication method according to an embodiment of the present application;
fig. 4 is a schematic flowchart of another cloud service authentication method according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of a cloud service authentication apparatus according to an embodiment of the present disclosure;
fig. 6 is a schematic structural diagram of a cloud service authentication device according to an embodiment of the present application.
With the foregoing drawings in mind, certain embodiments of the disclosure have been shown and described in more detail below. These drawings and written description are not intended to limit the scope of the disclosed concepts in any way, but rather to illustrate the concepts of the disclosure to those skilled in the art by reference to specific embodiments.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
The terms "first," "second," "third," and "fourth," etc., in the description and claims of this application and in the foregoing drawings, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the application described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
In the technical scheme of the application, the collection, storage, use, processing, transmission, provision, disclosure and other processing of the related user data and other information all accord with the regulations of related laws and regulations and do not violate the good customs of the public order.
The meta universe mainly has the following core technologies: the first is an augmented reality technology. The augmented reality technology can provide immersive experience and can solve the problem that a mobile phone cannot solve. And secondly, a digital twin is adopted, so that the real world can be mirrored into the virtual world. This also means that inside the metasphere we can see many of their own virtual avatars. Thirdly, an economic system is built by using a block chain. With the further development of the meta universe, the simulation degree of the whole real society is enhanced. At present, the specific assumption of the meta universe still stays in a conceptual stage, and a specific technical implementation mode and a core architecture are lacked. In addition, in the virtual world of the meta universe, since data needs to be transmitted between people or between nodes, the reliability of the identity of the other party needs to be verified, and the data packet transmitted by the other party needs to be accepted, so that the situation that the file transmitted by an illegal hacker carries viruses and potential safety hazards are brought to the terminal of a user is avoided. In the related art, various virtual spaces can provide various functions for users, so as to meet different requirements of the users. Thus, users often need to shuttle between various virtual spaces. Currently, when a user performs information interaction in a virtual space, the user needs to register a corresponding account, and login in the virtual space is realized according to the account. However, in the prior art, when the virtual space is accessed, the registration and login modes are complex, the account information is easily lost, accurate authentication of the user cannot be realized, and the cloud service authentication security is low.
In order to solve the above technical problem, embodiments of the present application provide a cloud service authentication method, apparatus, server, and storage medium, which provide a process of authenticating mutual real identities of two nodes in a meta universe, where the nodes in the meta universe all correspond to real life one to one, and security of two nodes that transmit data to each other needs to be guaranteed, and the method relates to two worlds, a virtual world in the real world and a virtual world, where the nodes that correspond respectively are a real server node, a first real node, a second real node, and a virtual server node, a first virtual node, and a second virtual node in the virtual world. By processing the random character strings generated when cloud service cloud file transmission is initiated through the nodes, the safe and reliable operation of different employees at different physical positions in resource sharing transmission, document sharing and real-time editing and other work is realized, and the application and development of the metastic technology are promoted.
Optionally, fig. 1 is a schematic diagram of an architecture of a cloud service authentication system provided in an embodiment of the present application. As shown in fig. 1, the architecture includes a first real node 101, a second real node 102, a first virtual node 103, a second virtual node 104, a real server node 105, and a virtual server node 106.
It can be understood that the number and the specific structure of the first real node 101, the first virtual node 103, the second virtual node 104, the second real node 102, the real server node 105, and the virtual server node 106 may be determined according to actual situations, fig. 1 is only an illustration, and the number of the nodes is not particularly limited in the embodiment of the present application.
The first real node 101 (for convenience of example, in the embodiment of the present application, the node a may be represented), the second real node 102 (in the embodiment of the present application, the node B may be represented), and the real server node 105 (in the embodiment of the present application, the server MM may be represented) are real nodes, the first virtual node 103 (in the embodiment of the present application, the node C may be represented), the second virtual node 104 (in the embodiment of the present application, the node D may be represented), and the virtual server node 106 (in the embodiment of the present application, the server NN may be represented) are nodes in the metastic space, the first real node 101 corresponds to the first virtual node 103 in the metastic space, the second real node 102 corresponds to the second virtual node 104 in the metastic space, and the real server node 105 corresponds to the virtual server node 106 in the metastic space.
In one possible scenario, for example, a company has 2 core servers, in the real world, server MM, corresponding to server NN in the metastic universe. The server is NN with its own corresponding identity and identification in the meta universe. The work number of the enterprise employee, the corresponding password and the node identification of the real world are stored in the server MM in advance. The node A and the node B are employees belonging to a certain company and are respectively located in different office places to work, and the node A and the node B respectively have corresponding identities and identifications in the real world and the meta universe. Node a corresponds to node C in the metasphere and node B corresponds to node D in the metasphere.
Optionally, the node a and the node B belong to the same employee of a certain company and are respectively located in different office places to work, and the node a and the node B respectively have their corresponding identities and identities in the real world and the meta universe. Node a corresponds to node C in the metasphere and node B corresponds to node D in the metasphere.
Optionally, the node a and the node B are respectively accessed to the network through wireless network communication technology WIFI or a mobile switching network, and here, we do not limit the network access modes of the node a and the node B, for example, consider the possibility of home office or the possibility of a non-office area such as going out and going on a business.
Optionally, the node a and the node B pre-store an identifier of the core server MM of the enterprise and an Internet Protocol (IP) address of interconnection between networks, and an identifier and an IP address of the server NN in the meta universe corresponding to the server MM.
The real nodes can communicate with corresponding virtual nodes in the metasuniverse, for example, the first real node 101 can communicate with the first virtual node 103, and communication can be implemented between any two nodes in the metasuniverse (for example, the first virtual node 103 can communicate with the second virtual node 104, and only one possible way of communication connection is shown by a connecting line in fig. 1).
It can be understood that the structure illustrated in the embodiment of the present application does not constitute a specific limitation to the cloud service authentication system architecture. In other possible embodiments of the present application, the foregoing architecture may include more or less components than those shown in the drawings, or combine some components, or split some components, or arrange different components, which may be determined according to practical application scenarios, and is not limited herein. The components shown in fig. 1 may be implemented in hardware, software, or a combination of software and hardware.
In addition, the network architecture and the service scenario described in the embodiment of the present application are for more clearly illustrating the technical solution of the embodiment of the present application, and do not constitute a limitation to the technical solution provided in the embodiment of the present application, and it can be known by a person skilled in the art that along with the evolution of the network architecture and the appearance of a new service scenario, the technical solution provided in the embodiment of the present application is also applicable to similar technical problems.
The technical solutions of the present application are described below with several embodiments as examples, and the same or similar concepts or processes may not be described in detail in some embodiments.
Fig. 2 is a schematic flowchart of a cloud service authentication method provided in an embodiment of the present application, where the embodiment of the present application may be applied to the second virtual node 104 in fig. 1, the second virtual node 104 may be a server, and a specific execution subject may be determined according to an actual application scenario. As shown in fig. 2, the method comprises the steps of:
s201: and responding to a file transmission request sent by the first virtual node, and sending a random character string to the first virtual node, so that the first virtual node sends the random character string to the first real node after receiving the random character string.
The file transmission request carries a company identifier and a user work number of the first virtual node.
The random character string is used for the first real node to encrypt the random character string to obtain a first encryption result, and the first encryption result is sent to the first virtual node, so that the first virtual node sends the first encryption result to the second virtual node.
The random character string is used for the first real node to obtain a first encryption result in an encryption mode, and comparison authentication is carried out through the first encryption result.
Optionally, the first real node obtains the first encryption result in an encryption manner, and the encryption may be performed by combining a preset algorithm with the password of the first real node, where the preset algorithm may be determined according to an actual situation, and the embodiment of the present application does not specifically limit this.
S202: and sending the random character string, the user job number of the first virtual node and the user job number of the second virtual node to the virtual server node so that the virtual server node sends the random character string, the user job number of the first virtual node and the user job number of the second virtual node to the real server node.
The random character string and the user work number of the first virtual node are used for the real server node to encrypt the random character string according to the user work number of the first virtual node to obtain a second encryption result, and the second encryption result is sent to the second real node, so that the second real node sends the second encryption result to the second virtual node.
Here, the real server node may determine the corresponding password according to the user job number of the first virtual node, and then encrypt the password according to the password by combining the password of the first real node with a preset algorithm, where the preset algorithm may be determined according to an actual situation, and this is not specifically limited in the embodiment of the present application.
S203: and receiving a first encryption result sent by the first virtual node and a second encryption result sent by the real server node.
S204: and authenticating the second virtual node according to the first encryption result and the second encryption result.
Optionally, after authenticating the second virtual node according to the first encryption result and the second encryption result, the method further includes: and if the authentication is successful, sending the file to the first virtual node according to the file transmission request.
Here, for the first virtual node successfully authenticated, the second virtual node may directly transmit the file to the first virtual node, so that the transmission efficiency of the cloud service is improved.
Optionally, after authenticating the second virtual node according to the first encryption result and the second encryption result, the method further includes: and if the authentication is unsuccessful, prompting authentication failure information.
For the first virtual node which fails in authentication, the embodiment of the application can prompt authentication failure information to prompt transmission limitation on the node which fails in authentication, so that the security of the cloud service is further improved.
The cloud service authentication method can achieve cloud service authentication in a virtual space, if a first virtual node in the virtual space wants a second virtual node to transmit a certain file, a file transmission request is sent to the second virtual node, the second virtual node can generate a random character string after receiving the request, the random character string is sent to the first virtual node, the character string is sent to a real server node through the virtual server node, the first virtual node and the real server node respectively encrypt the random character string through a preset encryption algorithm to obtain corresponding encryption results, authentication of the first virtual node can be achieved through comparison of the encryption results twice, safety authentication between the nodes is achieved, authentication is achieved without the need of a user through registration or login during each information transmission, authentication safety and simplicity are improved, and cloud service security is improved.
Fig. 3 is a flowchart illustrating another cloud service authentication method provided in the embodiment of the present application, where the embodiment of the present application may be applied to the first virtual node 103 in fig. 1, the first virtual node 103 may be a server, and a specific execution subject may be determined according to an actual application scenario. As shown in fig. 3, the method comprises the steps of:
s301: and sending a file transmission request to a second virtual node so that the second virtual node sends a random character string to the first virtual node according to the file transmission request, sends the random character string, the user job number of the first virtual node and the user job number of the second virtual node to a virtual server node, and sends the random character string, the user job number of the first virtual node and the user job number of the second virtual node to a real server node through the virtual server node.
The file transmission request carries a company identification and a user work number of the first virtual node, the random character string and the user work number of the first virtual node are used for the real server node to encrypt the random character string according to the user work number of the first virtual node to obtain a second encryption result, and the second encryption result is sent to the second real node, so that the second real node sends the second encryption result to the second virtual node.
S302: and receiving a random character string sent by the second virtual node, sending the random character string to the first real node, so that the first real node encrypts a first encryption result obtained by processing the random character string, and sending the first encryption result to the first virtual node.
S303: and receiving the first encryption result and sending the first encryption result to the second virtual node so that the second virtual node authenticates the second virtual node according to the first encryption result and the second encryption result.
When the first virtual node requests the second virtual node to transmit the file, the file transmission request is sent, so that the second virtual node generates a random character string for authentication, the random character string is sent to the first real node to be encrypted, the authentication of the first virtual node is achieved through an encryption result obtained by the real server node according to decryption of the random character string, and the safety of cloud service in the virtual world is guaranteed.
Fig. 4 is a schematic flow diagram of another cloud service authentication method provided in an embodiment of the present application, where the embodiment of the present application may be applied to the cloud service authentication system in fig. 1, the cloud service authentication system includes a first real node, a second real node, a first virtual node, a second virtual node, a real server node, and a virtual server node, the cloud service authentication system may be a server, and a specific execution subject may be determined according to an actual application scenario. As shown in fig. 4, the method includes the steps of:
s401: the first virtual node sends a file transfer request to the second virtual node.
The file transmission request carries a company identification and a user work number of the first virtual node.
Optionally, before the first virtual node sends the file transfer request to the second virtual node, the method further includes: the real server node stores the user job number of the first virtual node and the user job number of the second virtual node.
Optionally, the work number and the corresponding password of the employee of the enterprise and the node identifier of the real world are stored in advance on the server MM.
Here, the real server node may store the user job number of the first virtual node and the user job number of the second virtual node in advance, so that in the cloud service process, the authentication of the nodes is realized according to the user job numbers sent by the first virtual node and the second virtual node.
S402: the second virtual node sends the random string to the first virtual node.
S403: and the second virtual node sends the random character string, the user job number of the first virtual node and the user job number of the second virtual node to the virtual server node.
Alternatively, step S402 and step S403 may be performed simultaneously, and the order is not limited.
In a possible implementation mode, a node C requests a node D of the metasequoiy to transmit a project file in the metasequoiy, wherein in the request information, the node C indicates that the company identification and the work number of the node C are 068123 (the work number is only exemplary and can be determined according to actual conditions), the node D dares not to transmit the project file inside the company at will, and the node C is feared to be a disguised colleague 068123 of the company (the work number is only exemplary and can be determined according to actual conditions). Thus, node D sends a random string 98765 to node C, while sending random string 98765 and node C job number 068123, as well as its own job number 024567, to server NN.
S404: and after receiving the random character string, the first virtual node sends the random character string to the first real node.
S405: the first real node encrypts the random character string to obtain a first encryption result, and sends the first encryption result to the first virtual node.
S406: and the first virtual node sends the first encryption result to the second virtual node.
In a possible implementation manner, the node C receives the random string 98765, sends the random string 98765 to the node a in the real world corresponding to the node C, the node a calculates the random string according to a predetermined algorithm by using a password of the node a to obtain a first encryption result, then the node a sends the first encryption result to the node C, and the node C sends the first encryption result to the node D.
S407: and the virtual server node sends the random character string, the user job number of the first virtual node and the user job number of the second virtual node to the real server node.
S408: and the real server node encrypts the random character string according to the user work number of the first virtual node to obtain a second encryption result, and sends the second encryption result to the second real node.
In a possible implementation manner, the server NN sends the received random string 98765, the work number 068123 of the node C and the work number 024567 of the node D to the server MM, and the server MM queries the password corresponding to the work number in the internal list of the server MM according to the received random string 98765 and the password corresponding to the work number 068123 and calculates according to a pre-agreed algorithm to obtain a second encryption result. The server MM sends the second encryption result to the node B corresponding to the node D. Rather than directly to the server NN in order for the true node D to find itself to verify the true or false of the node C. Rather than someone impersonating node D. Therefore, the second encryption result needs to be sent to the node B in the real world corresponding to the node D. Since the identity and IP address of the node B are pre-stored in advance in the server MM.
S409: and the second real node sends the second encryption result to the second virtual node.
S410: and the second virtual node authenticates the first virtual node according to the second encryption result and the first encryption result.
Optionally, the node B sends the second encryption result to the node D, and the node D compares the first encryption result and the second encryption result received by the node D from the node C, and if the first encryption result and the second encryption result are consistent, the node D considers that the node C and the node D are colleagues of a unit in the real world, and then the unit project file can be transmitted to the other party. If not, node B informs node D that the company internal project file may not be sent to node C.
Alternatively, the sequence of step S405 to step S406 and the sequence of step S407 to step S409 are not limited, and may be performed simultaneously.
The embodiment of the application provides a mutual real identity authentication process of two nodes in a meta-space, the nodes in the meta-space are all in one-to-one correspondence with real life, the safety of the nodes of two parties transmitting data mutually needs to be guaranteed, and the method relates to two worlds, namely a real world and a virtual world in the meta-space, wherein the corresponding nodes are a real server node, a first real node and a second real node, and a virtual server node, a first virtual node and a second virtual node in the virtual world. By processing the random character strings generated when cloud service cloud file transmission is initiated through the nodes, the safe and reliable operation of different employees at different physical positions in resource sharing transmission, document sharing and real-time editing and other work is realized, and the application and development of the metastic technology are promoted.
Fig. 5 is a schematic structural diagram of a cloud service authentication apparatus provided in an embodiment of the present application, and is applied to a second virtual node, as shown in fig. 5, the apparatus in the embodiment of the present application includes: a first sending module 501, a second sending module 502, a first receiving module 503 and an authentication module 504. The cloud service authentication apparatus herein may be a server of the metastic space, or a chip or an integrated circuit that realizes a function of the server. Here, the division of the first sending module 501, the second sending module 502, the first receiving module 503 and the authentication module 504 is only a division of logical functions, and the two may be integrated or independent physically.
The first sending module is used for responding to a file transmission request sent by a first virtual node, sending a random character string to the first virtual node, so that the first virtual node sends the random character string to a first real node after receiving the random character string, wherein the file transmission request carries a company identifier and a user work number of the first virtual node, and the random character string is used for encrypting the random character string by the first real node to obtain a first encryption result and sending the first encryption result to the first virtual node, so that the first virtual node sends the first encryption result to a second virtual node;
the second sending module is used for sending the random character string, the user work number of the first virtual node and the user work number of the second virtual node to the virtual server node so that the virtual server node sends the random character string, the user work number of the first virtual node and the user work number of the second virtual node to the real server node, wherein the random character string and the user work number of the first virtual node are used for the real server node to encrypt the random character string according to the user work number of the first virtual node to obtain a second encryption result, and the second encryption result is sent to the second real node so that the second real node sends the second encryption result to the second virtual node;
the first receiving module is used for receiving a first encryption result sent by the first virtual node and a second encryption result sent by the real server node;
and the authentication module is used for authenticating the second virtual node according to the first encryption result and the second encryption result.
Optionally, after the authenticating module authenticates the second virtual node according to the first encryption result and the second encryption result, the apparatus further includes:
and the transmission module is used for sending the file to the first virtual node according to the file transmission request if the authentication is successful.
Optionally, after the authenticating module authenticates the second virtual node according to the first encryption result and the second encryption result, the apparatus further includes:
and the prompting module is used for prompting authentication failure information if the authentication is unsuccessful.
In order to realize the above embodiments, the embodiments of the present disclosure further provide an electronic device.
Referring to fig. 6, which shows a schematic structural diagram of an electronic device 600 suitable for implementing the embodiment of the present disclosure, the electronic device 600 may be a terminal device or a server, and the electronic device is a cloud service authentication device. Among them, the terminal Device may include, but is not limited to, a mobile terminal such as a mobile phone, a notebook computer, a Digital broadcast receiver, a Personal Digital Assistant (PDA), a tablet computer (PAD), a Portable Multimedia Player (PMP), a car terminal (e.g., car navigation terminal), etc., and a fixed terminal such as a Digital TV, a desktop computer, etc. The electronic device shown in fig. 6 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present disclosure.
As shown in fig. 6, the electronic device 600 may include a processing means (e.g., a central processing unit, a graphics processor, etc.) 601, which may perform various suitable actions and processes according to a program stored in a Read Only Memory (ROM) 602 or a program loaded from a storage means 608 into a Random Access Memory (RAM) 603. In the RAM 603, various programs and data necessary for the operation of the electronic apparatus 600 are also stored. The processing device 601, the ROM 602, and the RAM 603 are connected to each other via a bus 604. An input/output (I/O) interface 605 is also connected to bus 604.
Generally, the following devices may be connected to the I/O interface 605: input devices 606 including, for example, a touch screen, touch pad, keyboard, mouse, camera, microphone, accelerometer, gyroscope, etc.; an output device 607 including, for example, a Liquid Crystal Display (LCD), a speaker, a vibrator, and the like; storage 608 including, for example, magnetic tape, hard disk, etc.; and a communication device 609. The communication means 609 may allow the electronic device 600 to communicate with other devices wirelessly or by wire to exchange data. While fig. 6 illustrates an electronic device 600 having various means, it is to be understood that not all illustrated means are required to be implemented or provided. More or fewer devices may alternatively be implemented or provided.
In particular, according to an embodiment of the present disclosure, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network via the communication means 609, or may be installed from the storage means 608, or may be installed from the ROM 602. The computer program, when executed by the processing device 601, performs the above-described functions defined in the methods of the embodiments of the present disclosure.
It should be noted that the computer readable medium of the present disclosure may be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In contrast, in the present disclosure, a computer readable signal medium may comprise a propagated data signal with computer readable program code embodied therein, either in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, optical cables, RF (radio frequency), etc., or any suitable combination of the foregoing.
The computer readable medium may be embodied in the electronic device; or may exist separately without being assembled into the electronic device.
The computer readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to perform the methods shown in the above embodiments.
Computer program code for carrying out operations for aspects of the present disclosure may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, smalltalk, C + +, and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of Network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
Another cloud service authentication apparatus provided in an embodiment of the present application is applied to a first virtual node, and the apparatus in the embodiment of the present application includes: the device comprises a third sending module, a second receiving module and a third receiving module. The cloud service authentication device may be a server or a terminal device of the metasma, or a chip or an integrated circuit that implements a function of the server. It should be noted here that the division of the third sending module, the second receiving module and the third receiving module is only a division of logical functions, and the two may be integrated or independent physically.
The third sending module is used for sending a file transmission request to the second virtual node so that the second virtual node sends a random character string to the first virtual node according to the file transmission request and sends the random character string, a user work number of the first virtual node and a user work number of the second virtual node to the virtual server node, and the random character string, the user work number of the first virtual node and the user work number of the second virtual node are sent to the real server node through the virtual server node, wherein the file transmission request carries a company identification and the user work number of the first virtual node, and the random character string and the user work number of the first virtual node are used for the real server node to encrypt the random character string according to the user work number of the first virtual node to obtain a second encryption result and send the second encryption result to the second real node so that the second real node sends the second encryption result to the second virtual node;
the second receiving module is used for receiving the random character string sent by the second virtual node, sending the random character string to the first real node, so that the first real node encrypts the random character string to obtain a first encryption result, and sends the first encryption result to the first virtual node;
and the third receiving module is used for receiving the first encryption result and sending the first encryption result to the second virtual node so that the second virtual node authenticates the second virtual node according to the first encryption result and the second encryption result.
The cloud service authentication device provided by the embodiment of the application is applied to the first virtual node, and can be a server or a terminal device. The components shown herein, their connections and relationships, and their functions, are meant to be exemplary only, and are not limiting to the implementations of the present application described and/or claimed herein.
The cloud service authentication apparatus includes: a processor and memory, the various components being interconnected using different buses, and may be mounted on a common motherboard or in other manners as desired. The processor may process instructions executed within the cloud service authentication apparatus, including instructions for graphical information stored in or on the memory for display on an external input/output device (such as a display device coupled to the interface). In other embodiments, multiple processors and/or multiple buses may be used, along with multiple memories and multiple memories, as desired.
The memory, as a non-transitory computer readable storage medium, may be used to store non-transitory software programs, non-transitory computer executable programs, and modules, such as program instructions/modules corresponding to the method of cloud service authentication device in the embodiments of the present application. The processor executes various functional applications and cloud service authentication methods by running non-transitory software programs, instructions, and modules stored in the memory, that is, the method of implementing the cloud service authentication apparatus in the above method embodiments.
The cloud service authentication apparatus may further include: an input device and an output device. The processor, memory, input device, and output device may be connected by a bus or other means.
The input means may receive input numeric or character information and generate key signal inputs related to user settings and function control of the cloud service authentication apparatus, such as a touch screen, a keypad, a mouse, or a plurality of mouse buttons, a trackball, a joystick, and the like. The output device may be an output device such as a display device of the cloud service authentication apparatus. The display device may include, but is not limited to, a Liquid Crystal Display (LCD), a Light Emitting Diode (LED) display, and a plasma display. In some implementations, the display device can be a touch screen.
The cloud service authentication device of the embodiment of the present application may be configured to execute the technical solutions in the method embodiments of the present application, and the implementation principle and the technical effect are similar, which are not described herein again.
An embodiment of the present application further provides a computer-readable storage medium, where computer-executable instructions are stored in the computer-readable storage medium, and when the computer-executable instructions are executed by a processor, the computer-readable storage medium is used to implement any one of the cloud service authentication methods described above.
An embodiment of the present application further provides a computer program product, which includes a computer program, and when the computer program is executed by a processor, the computer program is configured to implement any one of the cloud service authentication methods described above.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, a division of a unit is merely a logical division, and an actual implementation may have another division, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit may be implemented in the form of hardware, or may also be implemented in the form of a software functional unit.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the application disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements that have been described above and shown in the drawings, and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (10)

1. The cloud service authentication method is applied to a second virtual node and comprises the following steps:
responding to a file transmission request sent by a first virtual node, sending a random character string to the first virtual node, so that the first virtual node sends the random character string to a first real node after receiving the random character string, wherein the file transmission request carries a company identifier and a user work number of the first virtual node, and the random character string is used for the first real node to encrypt the random character string to obtain a first encryption result and send the first encryption result to the first virtual node, so that the first virtual node sends the first encryption result to a second virtual node;
sending the random character string, the user work number of the first virtual node and the user work number of the second virtual node to a virtual server node so that the virtual server node sends the random character string, the user work number of the first virtual node and the user work number of the second virtual node to a real server node, wherein the random character string and the user work number of the first virtual node are used for the real server node to encrypt the random character string according to the user work number of the first virtual node to obtain a second encryption result, and the second encryption result is sent to a second real node so that the second real node sends the second encryption result to the second virtual node;
receiving a first encryption result sent by the first virtual node and a second encryption result sent by the real server node;
and authenticating the second virtual node according to the first encryption result and the second encryption result.
2. The method of claim 1, further comprising, after the authenticating the second virtual node according to the first encryption result and the second encryption result:
and if the authentication is successful, sending a file to the first virtual node according to the file transmission request.
3. The method of claim 1, further comprising, after the authenticating the second virtual node according to the first encryption result and the second encryption result:
and if the authentication is unsuccessful, prompting authentication failure information.
4. A cloud service authentication method is applied to a first virtual node and comprises the following steps:
sending a file transmission request to a second virtual node, so that the second virtual node sends a random character string to the first virtual node according to the file transmission request, and sends the random character string, a user work number of the first virtual node and a user work number of the second virtual node to a virtual server node, and the random character string, the user work number of the first virtual node and the user work number of the second virtual node are sent to a real server node through the virtual server node, wherein the file transmission request carries a company identifier and a user work number of the first virtual node, and the random character string and the user work number of the first virtual node are used for the real server node to encrypt the random character string according to the user work number of the first virtual node to obtain a second encryption result, and the second encryption result is sent to a second real node, so that the second real node sends the second encryption result to the second virtual node;
receiving a random character string sent by the second virtual node, sending the random character string to a first real node, so that the first real node encrypts a first encryption result obtained by processing the random character string, and sends the first encryption result to the first virtual node;
and receiving the first encryption result, and sending the first encryption result to the second virtual node, so that the second virtual node authenticates the second virtual node according to the first encryption result and the second encryption result.
5. A cloud service authentication method is applied to a cloud service authentication system comprising a first real node, a second real node, a first virtual node, a second virtual node, a real server node and a virtual server node, and comprises the following steps:
the first virtual node sends a file transmission request to the second virtual node, wherein the file transmission request carries a company identifier and a user work number of the first virtual node;
the second virtual node sends a random character string to the first virtual node and sends the random character string, the user job number of the first virtual node and the user job number of the second virtual node to the virtual server node;
after receiving the random character string, the first virtual node sends the random character string to a first real node, so that the first real node encrypts a first encryption result obtained by processing the random character string, and sends the first encryption result to the first virtual node, and the first virtual node sends the first encryption result to a second virtual node;
the virtual server node sends the random character string, the user work number of the first virtual node and the user work number of the second virtual node to a real server node, so that the real server node encrypts the random character string according to the user work number of the first virtual node to obtain a second encryption result, and sends the second encryption result to the second real node;
the second real node sends the second encryption result to the second virtual node;
and the second virtual node authenticates the first virtual node according to the second encryption result and the first encryption result.
6. The method of claim 5, further comprising, before the first virtual node sends a file transfer request to the second virtual node:
and the real server node stores the user job number of the first virtual node and the user job number of the second virtual node.
7. A cloud service authentication device, comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of claims 1 to 3.
8. A cloud service authentication device, comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of claim 4.
9. A computer-readable storage medium having stored therein computer-executable instructions for implementing the cloud service authentication method of any one of claims 1 to 3 when executed by a processor.
10. A computer-readable storage medium having computer-executable instructions stored therein, which when executed by a processor, are configured to implement the cloud service authentication method of claim 4.
CN202210764630.0A 2022-06-30 2022-06-30 Cloud service authentication method, device, equipment and storage medium Active CN115174062B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210764630.0A CN115174062B (en) 2022-06-30 2022-06-30 Cloud service authentication method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210764630.0A CN115174062B (en) 2022-06-30 2022-06-30 Cloud service authentication method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN115174062A true CN115174062A (en) 2022-10-11
CN115174062B CN115174062B (en) 2024-04-09

Family

ID=83489687

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210764630.0A Active CN115174062B (en) 2022-06-30 2022-06-30 Cloud service authentication method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115174062B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090037905A1 (en) * 2007-08-03 2009-02-05 Hamilton Ii Rick Allen Method for transferring inventory between virtual universes
US20100153722A1 (en) * 2008-12-11 2010-06-17 International Business Machines Corporation Method and system to prove identity of owner of an avatar in virtual world
CN109313777A (en) * 2016-06-16 2019-02-05 维萨国际服务协会 The safety method of virtual reality transaction
CN109639695A (en) * 2018-12-21 2019-04-16 中山大学新华学院 Dynamic identity authentication method, electronic equipment and storage medium based on mutual trust framework
CN111464367A (en) * 2020-04-21 2020-07-28 深圳信息职业技术学院 Method, device, computer equipment and storage medium for establishing virtual communication connection
CN112003879A (en) * 2020-10-22 2020-11-27 腾讯科技(深圳)有限公司 Data transmission method for virtual scene, computer device and storage medium
CN114070568A (en) * 2021-11-04 2022-02-18 北京百度网讯科技有限公司 Data processing method and device, electronic equipment and storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090037905A1 (en) * 2007-08-03 2009-02-05 Hamilton Ii Rick Allen Method for transferring inventory between virtual universes
US20100153722A1 (en) * 2008-12-11 2010-06-17 International Business Machines Corporation Method and system to prove identity of owner of an avatar in virtual world
CN109313777A (en) * 2016-06-16 2019-02-05 维萨国际服务协会 The safety method of virtual reality transaction
CN109639695A (en) * 2018-12-21 2019-04-16 中山大学新华学院 Dynamic identity authentication method, electronic equipment and storage medium based on mutual trust framework
CN111464367A (en) * 2020-04-21 2020-07-28 深圳信息职业技术学院 Method, device, computer equipment and storage medium for establishing virtual communication connection
CN112003879A (en) * 2020-10-22 2020-11-27 腾讯科技(深圳)有限公司 Data transmission method for virtual scene, computer device and storage medium
CN114070568A (en) * 2021-11-04 2022-02-18 北京百度网讯科技有限公司 Data processing method and device, electronic equipment and storage medium

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
DIANWEI WANG: "Research on Metaverse: Concept, development and standard system", 2021 2ND INTERNATIONAL CONFERENCE ON ELECTRONICS, COMMUNICATIONS AND INFORMATION TECHNOLOGY (CECIT), 1 April 2022 (2022-04-01) *
LYNHLZOU: "服务器开发设计之算法宝典", HTTP://WWW.YITB.COM/ARTICLE-8321, 27 December 2021 (2021-12-27) *
李鸣: "区块链:元宇宙的核心基础设施", 计算机工程, 14 June 2022 (2022-06-14) *

Also Published As

Publication number Publication date
CN115174062B (en) 2024-04-09

Similar Documents

Publication Publication Date Title
US9992176B2 (en) Systems and methods for encrypted communication in a secure network
US10412061B2 (en) Method and system for encrypted communications
TWI672648B (en) Business process method and device, data share system, and storage medium
CN111737366B (en) Private data processing method, device, equipment and storage medium of block chain
CN107241339B (en) Identity authentication method, identity authentication device and storage medium
CN114679293A (en) Access control method, device and storage medium based on zero trust security
US20220116392A1 (en) Method and system for contextual access control
CN113347206A (en) Network access method and device
US20210211293A1 (en) Systems and methods for out-of-band authenticity verification of mobile applications
CN115001841A (en) Identity authentication method, identity authentication device and storage medium
CN113037741A (en) Authentication method and related device
KR101246339B1 (en) System and method using qr code for security authentication
CN115174558B (en) Cloud network end integrated identity authentication method, device, equipment and storage medium
CN115801299B (en) Meta universe identity authentication method, device, equipment and storage medium
CN115174062B (en) Cloud service authentication method, device, equipment and storage medium
CN114048498A (en) Data sharing method, device, equipment and medium
CN114417309A (en) Bidirectional identity authentication method, device, equipment and storage medium
CN110933016B (en) Login authentication method and device for call center system
CN115021939B (en) Identity authentication method, device, equipment and storage medium
CN115174106A (en) Cloud service authentication method, device, equipment and storage medium
CN111212062B (en) Information completion method and device, storage medium and electronic equipment
CN115801252B (en) Safe cloud desktop system combined with quantum encryption technology
US20230127607A1 (en) Methods, devices, and computer program products for authenticating peripheral device
CN115174109A (en) Enterprise employee identity authentication method, device, equipment and storage medium
CN115174107A (en) Authentication method, device, equipment and storage medium of virtual user

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant