WO2019104690A1 - 移动网络接入认证方法、装置、存储介质及区块链节点 - Google Patents

移动网络接入认证方法、装置、存储介质及区块链节点 Download PDF

Info

Publication number
WO2019104690A1
WO2019104690A1 PCT/CN2017/114072 CN2017114072W WO2019104690A1 WO 2019104690 A1 WO2019104690 A1 WO 2019104690A1 CN 2017114072 W CN2017114072 W CN 2017114072W WO 2019104690 A1 WO2019104690 A1 WO 2019104690A1
Authority
WO
WIPO (PCT)
Prior art keywords
authentication
user equipment
blockchain
information
authentication server
Prior art date
Application number
PCT/CN2017/114072
Other languages
English (en)
French (fr)
Inventor
李强
谢辉
王健
Original Assignee
深圳前海达闼云端智能科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳前海达闼云端智能科技有限公司 filed Critical 深圳前海达闼云端智能科技有限公司
Priority to PCT/CN2017/114072 priority Critical patent/WO2019104690A1/zh
Priority to CN201780006171.7A priority patent/CN108702622A/zh
Publication of WO2019104690A1 publication Critical patent/WO2019104690A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Definitions

  • the present disclosure relates to the field of information technology, and in particular, to a mobile network access authentication method, apparatus, storage medium, and blockchain node.
  • the access authentication of the mobile network is controlled by the operator of the mobile network.
  • the access authentication process is specifically: the operator issues a SIM card, a SIM card and an HSS (Home Subscriber Server).
  • a symmetric key is pre-stored in the user server.
  • the MME Mobility Management Entity
  • the HSS uses the symmetric key to generate an authentication set (including random The number and the expected challenge response XRES) are sent to the MME, and the MME sends an authentication request carrying the random number to the SIM card user equipment, and receives the user challenge response RES generated by the SIM card user equipment based on the pre-stored symmetric key and the random number. If the received client challenge response RES is consistent with the expected challenge response XRES in the authentication set, the access authentication succeeds.
  • the HSS is a centrally deployed server of the sub-area. If the problem occurs and the service is stopped, the user equipment whose home location is the HSS area cannot access the mobile network, which affects the reliability of the mobile network access authentication.
  • the main purpose of the present disclosure is to provide a mobile network access authentication method and apparatus to solve the technical problem of low reliability due to centralized deployment in the existing mobile network access technology.
  • a first aspect of the present disclosure provides a mobile network access authentication method, where the method is applied to an authentication server, where the authentication server is a node in a blockchain network, and the method includes:
  • the blockchain Querying the blockchain according to the first blockchain address, determining whether the blockchain stores identity verification information that matches the identity information, where the mobile network support system registers the user device when the user device registers The authentication information of the device is written in the blockchain. If the identity verification information corresponding to the identity information is stored in the blockchain, it indicates that the target user device indicated by the identity information is already registered in the mobile network.
  • the user equipment When the identity information corresponding to the identity information is stored in the blockchain, the user equipment is authenticated according to an authentication algorithm, where if the authentication is successful, the user equipment is represented by the identity information. Target user device.
  • a second aspect of the present disclosure provides a mobile network access authentication method, where the method is applied to a user A device, where the user equipment is a node in a blockchain network, the method includes:
  • the authentication server Sending an authentication request to the authentication server, the authentication request including a first blockchain address and identity information, the first blockchain address and the identity information being used by the authentication server to confirm a target user represented by the identity information Whether the device is registered on the mobile network;
  • a third aspect of the present disclosure provides a mobile network access authentication apparatus, where the apparatus is applied to an authentication server, the authentication server is a node in a blockchain network, and the apparatus includes: a first receiving module, configured to receive a user An authentication request sent by the device, where the authentication request includes a first blockchain address and identity information, and a query module, configured to query the blockchain according to the first blockchain address, and determine whether the blockchain is stored And the identity verification information corresponding to the identity information, where the support system of the mobile network writes the identity verification information of the user equipment into the blockchain when the user equipment registers, if the blockchain stores and The identity information corresponding to the identity information indicates that the target user device indicated by the identity information has been registered in the mobile network.
  • a first authentication module configured to perform authentication on the user equipment based on an authentication algorithm when the identity verification information corresponding to the identity information is stored in the blockchain, where the user is authenticated if the authentication succeeds
  • the device is the target user device represented by the identity information.
  • a fourth aspect of the present disclosure provides a mobile network access authentication apparatus, where the apparatus is applied to a user equipment, where the user equipment is a node in a blockchain network, and the apparatus includes:
  • a second sending module configured to send an authentication request to the authentication server, where the authentication request includes a first blockchain address and identity information, where the first blockchain address and the identity information are used by the authentication server to confirm Whether the target user equipment indicated by the identity information has been registered on the mobile network;
  • a second authentication module configured to complete identity authentication of the user equipment with the authentication server based on an authentication algorithm after confirming that the target user equipment indicated by the identity information has been registered in the mobile network, where the authentication succeeds , indicating that the user equipment is the target user equipment represented by the identity information.
  • a fifth aspect of the present disclosure provides a non-transitory computer readable storage medium comprising one or more programs for performing the first aspect of the present disclosure Said method.
  • a sixth aspect of the present disclosure provides a blockchain node, including:
  • One or more processors for executing a program in the non-transitory computer readable storage medium.
  • a seventh aspect of the present disclosure provides a non-transitory computer readable storage medium comprising one or more programs for performing the second aspect of the present disclosure Said method.
  • An eighth aspect of the present disclosure provides a blockchain node, including:
  • One or more processors for executing a program in the non-transitory computer readable storage medium.
  • the authentication server verifies whether the user equipment is registered in the mobile network by querying the identity verification information written by the user equipment when registering in the mobile network, and confirms that the user equipment is registered in the mobile network, and the user is authenticated based on the authentication algorithm.
  • the device is authenticated.
  • FIG. 1 is a flowchart of a mobile network access authentication method applied to an authentication server according to an embodiment of the present disclosure
  • FIG. 2 is a flowchart of a mobile network access authentication method applied to a user equipment according to an embodiment of the present disclosure
  • FIG. 3 is a flowchart of a method for authenticating a user equipment by an authentication server according to an embodiment of the present disclosure
  • FIG. 4 is a flowchart of a method for user equipment to authenticate an authentication server according to an embodiment of the present disclosure
  • FIG. 5 is a schematic diagram of an implementation environment according to an embodiment of the present disclosure.
  • FIG. 6 is a schematic flowchart of a mobile network access authentication method according to an embodiment of the present disclosure
  • FIG. 7 is a schematic structural diagram of a mobile network access authentication apparatus applied to an authentication server according to an embodiment of the present disclosure
  • FIG. 8 is a schematic structural diagram of another mobile network access authentication apparatus applied to an authentication server according to an embodiment of the present disclosure.
  • FIG. 9 is a schematic structural diagram of a mobile network access authentication apparatus applied to a user equipment according to an embodiment of the present disclosure.
  • FIG. 10 is a schematic structural diagram of another mobile network access authentication apparatus applied to a user equipment according to an embodiment of the present disclosure.
  • FIG. 11 is a schematic structural diagram of a blockchain node according to an embodiment of the present disclosure.
  • FIG. 12 is a schematic structural diagram of another blockchain node according to an embodiment of the present disclosure.
  • a blockchain is a decentralized distributed database system in which all nodes in a blockchain network participate in maintenance. It is composed of a series of data blocks generated by cryptography, and each block is a blockchain. One block. According to the order of the generation time, the blocks are linked together in an orderly manner to form a data chain, which is aptly called a blockchain.
  • the blockchain is generated and validated by its special blocks and transactions, with unchangeable, unforgeable and fully traceable security features.
  • Blockchain node The blockchain network is based on a P2P (Peer to Peer) network.
  • P2P Peer to Peer
  • Each P2P network node participating in transaction and block storage, verification, and forwarding is a node in a blockchain network.
  • the user identity in the blockchain is represented by a public key, and the public key and the private key appear in pairs, wherein the private key is mastered by the user and not posted to the above-mentioned blockchain network, and the public key passes through the specific The hash and encoding become the "address", the "address” represents the user, and the public key and "address” can be freely published in the blockchain network. It is worth mentioning that there is no one-to-one correspondence between user identity and blockchain nodes. Users can use their own private key on any blockchain node.
  • Blockchain data write The blockchain node writes data to the blockchain by issuing a "transaction" to the blockchain network.
  • the transaction contains the signature of the user using his or her private key to prove the identity of the user.
  • the transaction is recorded by the “miner” (block chain node performing the PoW blockchain consensus competition mechanism) into the generated new block, and then released to the blockchain network, and verified and passed by other blockchain nodes, the transaction data That is, it is written to the blockchain.
  • the embodiment of the present disclosure provides a mobile network access authentication method based on the blockchain technology, and the method is applied to an authentication server. As shown in FIG. 1, the method includes:
  • step S101 an authentication request sent by the user equipment is received, where the authentication request includes a first blockchain address and identity information.
  • step S102 it is determined whether the identity verification information corresponding to the identity information is stored in the blockchain according to the first blockchain address query blockchain.
  • the authentication server is a node in the blockchain network, and stores a blockchain composed of a plurality of blocks, each block is used for storing information, and ensures that the authentication server has at least the function of participating in the blockchain query.
  • the user equipment can be registered in the mobile network through the support system of the mobile network before accessing the mobile network, wherein the support system of the mobile network is a node in the blockchain network, and the storage is more A blockchain consisting of blocks, each of which is used to store information, ensuring that the support system has at least the function of participating in blockchain transactions.
  • the registration process of the user equipment is: the user equipment sends its authentication information to the support system, and the authentication information may include the public key of the user equipment and the address of the user equipment in the blockchain network, and the user equipment that the system supports will receive.
  • the authentication information is written into the blockchain, so that all the information belonging to the user equipment account stored in the blockchain can be queried based on the blockchain address of the user equipment, and further all the accounts under the account can be determined. Whether the authentication information corresponding to the identity information is stored in the message.
  • the support system may further send the boot node boot node information of the blockchain to the user equipment, so that the user equipment accesses the blockchain network based on the blockchain protocol according to the bootnode information.
  • the blockchain network only the support system of the mobile network or other nodes authorized by the support system may write the authentication information of the user equipment into the blockchain.
  • the blockchain can be a license chain, and the mobile network operator can authorize the trusted node to provide registration services for the user equipment.
  • the user equipment's own authentication information may include the user equipment's own public key, IMSI (International Mobile Subscriber Identity), attribution, status, and the like.
  • the identity information of the user equipment may be the IMSI of the user equipment.
  • the identity information of the user equipment is its IMSI indication, and the authentication server queries the blockchain according to the first blockchain address. If the IMSI of the user equipment exists in the first blockchain address and the IMSI is valid, then the IMSI is valid. It can be determined that the user equipment has been registered on the mobile network.
  • the identity verification information corresponding to the identity information in the authentication request exists in the blockchain or the presence in the blockchain is queried.
  • the identity information corresponding to the identity information in the authentication request is invalid, it indicates that the user equipment is not registered in the mobile network or has been logged out, and thus may refuse to respond to the authentication request.
  • step S103 when it is determined that the identity verification information corresponding to the identity information is stored in the blockchain, the user equipment is authenticated based on the authentication algorithm, wherein if the authentication succeeds, the user equipment is the target user indicated by the identity information. device.
  • the authentication server may perform authentication on the user equipment by performing interaction with the user equipment based on the authentication algorithm, thereby preventing the user equipment that is not registered in the mobile network from spoofing.
  • the identity information of the user equipment registered in the mobile network is connected to the mobile network.
  • the centralized node (such as the HSS in the prior art) does not need to be deployed to participate in the access authentication, the centralized node can be prevented from stopping the service, and the user equipment cannot access the mobile network. The problem arises, improving the reliability of access authentication. At the same time, the complexity of the centralized node can be simplified.
  • the embodiment of the present disclosure further provides a mobile network access authentication method, where the method is applied to a user equipment, as shown in FIG. 2, the method includes:
  • step S201 an authentication request is sent to the authentication server, where the authentication request includes a first blockchain address and identity information, and the first blockchain address and the identity information are used by the authentication server to confirm whether the target user equipment indicated by the identity information is already moving. Network registration.
  • step S202 after confirming that the target user equipment indicated by the identity information has been registered in the mobile network, the identity authentication of the user equipment is completed based on the authentication algorithm and the authentication server, wherein if the authentication is successful, the user equipment is represented as the identity information.
  • Target user device After confirming that the target user equipment indicated by the identity information has been registered in the mobile network, the identity authentication of the user equipment is completed based on the authentication algorithm and the authentication server, wherein if the authentication is successful, the user equipment is represented as the identity information.
  • the identity information is represented as the identity information.
  • the user equipment may be connected to the authentication server according to the attaching process, and connected to the blockchain network by using a blockchain connection protocol, for example, by using a light node protocol or an RPC according to the startup node information.
  • the blockchain node can be deployed in the core network, and the network communication capability of the user equipment to the blockchain node in the core network is opened by default.
  • the registration process of the user equipment in the mobile network and the process of authenticating the identity authentication based on the authentication algorithm and the authentication server may refer to the description of the mobile network access authentication method provided in FIG. 1 , and details are not described herein again.
  • the authentication server and the user equipment may perform mutual authentication based on the asymmetric encryption algorithm, in order to avoid the security problem of the user equipment being impersonated by the loss of the user key of the HSS storage in the symmetric encryption algorithm in the prior art. That is, the authentication server authenticates the user equipment and the user equipment authenticates the authentication server.
  • the two certifications will be described in detail through specific implementations.
  • the identity information of the user equipment may include the first public key (ie, the user equipment's own public key).
  • the authentication server performs an authentication method on the user equipment, including:
  • step S301 the authentication server sends a first authentication challenge to the user equipment, where the first authentication challenge includes a first random number.
  • step S302 the user equipment signs the first random number according to its private key to obtain first signature information.
  • step S303 the user equipment sends a first authentication challenge response including the first signature information to the authentication server.
  • step S304 the authentication server performs signature verification on the first signature information according to the first public key.
  • the user equipment writes its public key (first public key) to the blockchain through the support system of the mobile network when the mobile network registers, and the authentication server queries the block according to the first blockchain address of the user equipment.
  • the chain can obtain the first public key.
  • the authentication server can perform signature verification on the first signature information sent by the user equipment according to the first public key. If the signature authentication succeeds, the user equipment requesting authentication can be determined to have mastered the first public. Key corresponding to the private key
  • the user equipment may be indicated as a target user equipment represented by the identity information.
  • the authentication server can verify whether the user equipment indicates the target user equipment for its identity information according to the authentic first public key, thereby ensuring that the user equipment cannot impersonate. .
  • the authentication request sent by the user equipment may further include a second random number. Accordingly, as shown in FIG. 4, the method for the user equipment to authenticate the authentication server includes:
  • step S401 the authentication server signs the second random number according to its private key to obtain second signature information.
  • step S402 the authentication server transmits a second authentication challenge response including the second signature information and the second blockchain address of the authentication server to the user equipment.
  • step S403 the user equipment queries the public key of the authentication server from the blockchain according to the second blockchain address and performs signature verification on the second signature information.
  • the public key of the authentication server may also be written by the support system to the blockchain when the mobile network is registered.
  • the authentication server first generates the private key and the public key that appear in pairs, and passes the public key through a specific hash.
  • the second blockchain address is generated after encoding.
  • the private key is controlled by itself and not posted to the network, but sends a second authentication request including its public key to the support system, and the support system writes the public key of the authentication server to the blockchain when receiving the second authentication request. In this way, the authentication server completes the blockchain network registration.
  • the authentication server writes its public key to the blockchain through the support system of the mobile network when registering, and the user equipment obtains the public key of the authentication server by querying the blockchain according to the second blockchain address of the authentication server. .
  • the user equipment performs signature verification on the second signature information of the authentication server according to the public key of the authentication server. If the signature authentication succeeds, it can be determined that the authentication server requesting authentication has mastered the private key corresponding to the public key, thereby indicating that the device The authentication server is legal.
  • the user equipment can verify whether the authentication server requesting authentication is legal according to the public key of the authentic trusted authentication server, thereby ensuring that the authentication server cannot impersonate.
  • FIG. 5 is a schematic diagram of an implementation environment according to an embodiment of the present disclosure.
  • the implementation environment includes a user equipment 501, an authentication server 502, and a support system 503 of a mobile network, where the authentication server 502 can be an eNodeB.
  • the MME Mobility Management Entity
  • the mobile network support system 503 may be an OSS (Operation Support System) or a BSS (Business Support System)
  • the eNodeB, the MME, and the user equipment UE OSS/BSS are nodes in the blockchain network.
  • a mobile network access authentication method provided by an embodiment of the present disclosure is as shown in FIG. 6, and includes:
  • step S601 the user equipment 501 sends a first note to the support system 503 of the mobile network.
  • the book request, the first registration request includes identity verification information of the user equipment 501.
  • step S602 the support system 503 of the mobile network writes the identity verification information of the user equipment 501 into the blockchain.
  • step S603 the support system 503 transmits the startup node information of the blockchain to the user equipment 501.
  • step S604 the authentication server 502 sends a second registration request to the support system 503 of the mobile network, the second registration request including the public key of the authentication server 502.
  • step S605 the support system 503 writes the public key of the authentication server 502 into the blockchain.
  • step S606 the user equipment 501 is connected to the authentication server 502 in accordance with the attach procedure.
  • the user device 501 can connect to the authentication server 502 for authentication.
  • the user equipment UE may be connected to the eNodeB for authentication, or may be connected to the MME for authentication, that is, the authentication server of the present disclosure may specifically be an eNodeB or an MME. It is worth noting that the authentication on the eNodeB can reduce the information interaction between the eNodeB and the MME, save the core network resources, and reduce the complexity of the core network protocol.
  • step S607 the user equipment 501 transmits an authentication request to the authentication server 502.
  • the authentication request may include a first blockchain address ADDRESS (A) of the user equipment 501, identity information, and a second random number RAND (A).
  • the identity information is indicated for the public key PK(A) of the user equipment 501.
  • step S608 the authentication server 502 queries the blockchain according to the first blockchain address to determine whether the identity verification information corresponding to the identity information is stored in the blockchain.
  • the authentication server 502 obtains the identity verification information stored in the blockchain according to the ADDRESS (A) query blockchain. If the authentication information has PK (A), it indicates the identity verification information and the identity information sent by the user equipment 501. Corresponding, it may be determined that the target user equipment identified by the identity information has been registered in the mobile network, and further, step S609 is performed; if the identity chain information or the blockchain corresponding to the identity information of the user equipment is stored in the blockchain is not queried If the authentication information that matches the identity information of the user equipment is invalid, it indicates that the user equipment is not registered in the mobile network or has logged out, and then refuses to respond to the authentication request of the user equipment 501, and ends the authentication of the user equipment 501.
  • ADDRESS ADDRESS
  • step S609 the authentication server 502 transmits a first authentication challenge including the first random number to the user equipment 501.
  • the authentication server 502 After confirming the identity verification information corresponding to the identity information in the confirmation blockchain, the authentication server 502 generates a first random number RAND(B) and transmits a first authentication challenge including RAND(B) to the user equipment 501.
  • step S610 the user equipment 501 signs the first random number according to its private key. To the first signature information.
  • step S611 the user equipment 501 transmits a first authentication challenge response including the first signature information to the authentication server 502.
  • step S612 the authentication server 502 performs signature verification on the first signature information according to the first public key.
  • the authentication server 502 obtains the public key PK(A) of the user equipment 501 according to the first blockchain address ADDRESS(A), and the first signature information SIGN(A) according to the public key PK(A). If the verification is successful, the user equipment 501 grasps the private key corresponding to the public key PK (A), so that the user equipment 501 is determined to be the target user equipment represented by the identity information, step S613 is performed; otherwise, If it is determined that the user equipment 402 is posing, the authentication of the user equipment 501 is ended.
  • the authentication server 502 can verify whether the user equipment 402 is the target user equipment represented by the identity information according to the authentic public key PK(A), thereby ensuring User device 402 is not impersonating.
  • step S613 the authentication server 502 signs the second random number according to its private key to obtain second signature information.
  • step S614 the authentication server 502 transmits a second authentication challenge response including the second signature information and the second blockchain address of the authentication server to the user equipment 501.
  • step S615 the user equipment 501 queries the public key of the authentication server from the blockchain according to the second blockchain address and performs signature verification on the second signature information.
  • the authentication server 502 signs the second random number RAND(A) according to the private key of the user, and obtains the second signature information SIGN(B) and sends the second signature information SIGN to the user equipment 501. (B) and a second authentication challenge response of the second blockchain address ADDRESS(B).
  • the user equipment 501 queries the blockchain according to ADDRESS(B), obtains the public key PK(B) of the authentication server 502 stored in the blockchain, and verifies the second signature information SIGN(B) according to the public key PK(B). . If the signature verification is successful, it indicates that the authentication server 502 grasps the private key corresponding to the public key PK (B), so it can be determined that the authentication server 502 is legal; otherwise, it can be determined that the authentication server 502 is impersonating.
  • the user equipment 501 can verify whether the authentication server 502 is legal according to the authentic public key PK(B), thereby ensuring that the authentication server 502 cannot impersonate.
  • the user equipment 501 After the second signature information is successfully verified, the user equipment 501 completes the authentication of the authentication server 502.
  • the blockchain may adopt a license chain, that is, different operators have respective license chains, and the authentication server and user equipment belonging to the same operator are nodes on the license chain, respectively.
  • the permission control of the license chain it is restricted whether different blockchain accounts have the right to write and modify certain data. For example, only the write and modify permissions are configured for the blockchain account in the support system of the mobile network, and only the read permissions are configured for the blockchain account on the user device and the authentication server.
  • information can be stored through the smart contract by writing a specific smart contract.
  • the smart contract provides interfaces such as registration, modification, logout, and query, and assigns the calling rights of the interfaces such as registration, modification, cancellation, and query to the blockchain account in the support system of the mobile network, and the user equipment and the authentication server.
  • the blockchain account on the top only assigns the permissions invoked by the query interface.
  • the smart contract is a computer-executed program that satisfies the automatic execution of the blockchain-based smart contract including transaction processing and preservation, and a complete state machine for accepting and processing various smart contracts. If the trigger condition of one or several actions in the automatic state machine is satisfied, the state machine automatically executes the contract action according to the preset information.
  • each operator has its own license chain.
  • the user equipment needs to cross-operator roaming authentication, it is necessary to provide the same for the blockchain account on some nodes.
  • the ability to access multiple chains For example, when the user equipment of the A operator needs to roam to the mobile network of the B carrier, the A operator needs to provide the B operator with the access capability of the A operator's blockchain, so that the B carrier's authentication server can access the A. Relevant information in the operator blockchain. In this way, the authentication set is generated on the HSS of the home device when the user equipment roams in the prior art, and the proximity authentication when the user equipment roams can be implemented, and the access authentication efficiency is improved.
  • the A operator may configure the access chain and data read permission of the A operator's license chain to the relevant blockchain account of the B operator, the specific address, It can be configured for the B operator to configure the required number of license chain nodes.
  • the calling right of the query interface can be configured to the required blockchain account of the B operator.
  • the authentication information when the user equipment roams, the authentication information must be generated to the third-party organization at the home location, and the efficiency of the mobile network access authentication can be improved.
  • the embodiment of the present disclosure further provides a mobile network access authentication apparatus 70, where the apparatus 70 is applied to an authentication server, wherein the authentication server is a node in a blockchain network.
  • the apparatus 70 includes:
  • the first receiving module 71 is configured to receive an authentication request sent by the user equipment, where the authentication request packet is Includes the first blockchain address and identity information.
  • the querying module 72 is configured to query the blockchain according to the first blockchain address, and determine whether the blockchain stores identity verification information that matches the identity information, where the mobile network support system is in the user When the device is registered, the authentication information of the user equipment is written into the blockchain. If the identity verification information corresponding to the identity information is stored in the blockchain, it indicates that the target user device indicated by the identity information has been Register on the mobile network.
  • the first authentication module 73 is configured to perform authentication on the user equipment based on an authentication algorithm when the identity verification information corresponding to the identity information is stored in the blockchain, where if the authentication succeeds, the The user equipment is the target user equipment represented by the identity information.
  • the first authentication module 73 includes:
  • the first authentication submodule 731 is configured to perform mutual authentication with the user equipment based on an asymmetric encryption algorithm.
  • the authentication information includes a first public key
  • the first authentication module includes:
  • the first sending sub-module 732 is configured to send a first authentication challenge to the user equipment, where the first authentication challenge includes a first random number;
  • a first receiving sub-module 733 configured to receive a first authentication challenge response sent by the user equipment, where the first authentication challenge response includes first signature information, where the first signature information is private to the user equipment Key signature of the first random number;
  • a first signature verification sub-module 734 configured to perform signature verification on the first signature information according to the first public key, where if the signature verification is successful, the user equipment is a target user equipment represented by the identity information.
  • the authentication request further includes a second random number
  • the device 70 further includes:
  • the first signature module 74 is configured to sign the second random number according to the private key of the authentication server to obtain second signature information.
  • a first sending module 75 configured to send, to the user equipment, a second authentication challenge response that includes the second signature information and a second blockchain address of the authentication server, where the second blockchain address is used by The user equipment verifies the second signature information by querying the public key from the blockchain, wherein the public key of the authentication server is written by the support system into the blockchain.
  • the apparatus 70 further includes:
  • the reject response module 76 is configured to confirm, in the blockchain, that the identity verification information that matches the identity information of the user equipment or the identity that is stored in the blockchain that matches the identity information of the user equipment is not present. When the verification information is invalid, the response to the authentication request is refused.
  • each module is only a logical function division, and the actual implementation may have another division manner.
  • the physical implementation of each module may also be in various manners, which is not limited by the present invention.
  • the embodiment of the present disclosure further provides a mobile network access authentication apparatus 80, where the apparatus 80 is applied to a user equipment, wherein the user equipment is a node in a blockchain network.
  • the apparatus 80 includes:
  • the second sending module 81 is configured to send an authentication request to the authentication server, where the authentication request includes a first blockchain address and identity information, where the first blockchain address and the identity information are used by the authentication server to confirm Whether the target user equipment indicated by the identity information has been registered in the mobile network;
  • a second authentication module 82 configured to complete identity authentication of the user equipment with the authentication server based on an authentication algorithm after confirming that the target user equipment indicated by the identity information has been registered in the mobile network, where If successful, the user equipment is the target user equipment represented by the identity information.
  • the second authentication module 82 includes:
  • a second receiving submodule 821 configured to receive a first authentication challenge sent by the authentication server, where the first authentication challenge includes a first random number
  • a first signature sub-module 822 configured to sign the first random number according to a private key of the user equipment, to obtain first signature information
  • a second sending sub-module 823 configured to send a first authentication challenge response that includes the first signature information to the authentication server, where the first signature information is used by the authentication server to perform the user equipment Certification.
  • the authentication request further includes a second random number
  • the device 80 further includes:
  • a second receiving module 83 configured to receive a second authentication challenge response sent by the authentication server, where the second authentication challenge response includes second signature information and a second blockchain address of the authentication server, where The second signature information is obtained by signing the second random number of the private key of the authentication server;
  • the first signature verification module 84 is configured to query, according to the second blockchain address, the public key of the authentication server from the blockchain and perform signature verification on the second signature information, where the signature verification Success indicates that the authentication server is legitimate.
  • the device 80 further includes:
  • a third sending module 85 configured to send a registration request to a support system of the mobile network, where the registration request includes identity verification information of the user equipment, where the support system is a node in a blockchain network;
  • the second receiving module 86 is configured to receive the startup node information of the blockchain sent by the support system, where the startup node information is used by the user equipment to access a blockchain network based on a blockchain protocol. Network.
  • each module is only a logical function division, and the actual implementation may have another division manner.
  • the physical implementation of each module may also be in various manners, which is not limited by the present invention.
  • an embodiment of the present disclosure further provides a non-transitory computer readable storage medium, the non-transitory computer readable storage medium including one or more programs, the one or more programs for executing the above Mobile network access authentication method applied to an authentication server.
  • embodiments of the present disclosure further provide a blockchain node, including the non-transitory computer readable storage medium described above, and one or more processors for executing in the non-transitory computer readable storage medium program.
  • an embodiment of the present disclosure further provides a non-transitory computer readable storage medium, the non-transitory computer readable storage medium including one or more programs, the one or more programs for executing the above Mobile network access authentication method applied to user equipment.
  • embodiments of the present disclosure further provide a blockchain node, including the non-transitory computer readable storage medium described above, and one or more processors for executing in the non-transitory computer readable storage medium program.
  • Embodiments of the present disclosure also provide a blockchain node 90, which may be an authentication server, such as an eNodeB or MME, as described above.
  • the blockchain node 90 includes a processing component 922. It further includes one or more processors, and memory resources represented by memory 932 for storing instructions executable by processing component 922, such as an application.
  • An application stored in memory 932 may include one or more modules each corresponding to a set of instructions.
  • processing component 922 is configured to execute instructions to perform the mobile network access authentication method described above.
  • Blockchain node 90 may also include a power component 926 configured to perform power management of blockchain node 90, a wired or wireless network interface 950 configured to connect blockchain node 90 to the network, and an input and output ( I/O) interface 958.
  • the blockchain node 90 can operate based on an operating system stored in the memory 932, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM or the like.
  • the embodiment of the present disclosure further provides a blockchain node 100, which may be a user equipment as described above, such as a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, Medical equipment, fitness equipment, personal digital assistants, etc.
  • a blockchain node 100 which may be a user equipment as described above, such as a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, Medical equipment, fitness equipment, personal digital assistants, etc.
  • the blockchain node 100 can include one or more of the following components: processing component 102, memory 104, power component 106, multimedia component 108, audio component 110, input/output (I/O) interface. 112, sensor component 114, and communication component 116.
  • Processing component 102 typically controls the overall operation of blockchain node 100, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations.
  • Processing component 102 can include one or more processors 120 to execute instructions to perform all or part of the steps of the mobile network access authentication method described above.
  • processing component 102 can include one or more modules to facilitate interaction between component 102 and other components.
  • processing component 102 can include a multimedia module to facilitate interaction between multimedia component 108 and processing component 102.
  • the memory 104 is configured to store various types of data to support operation at the blockchain node 100. Examples of such data include instructions for any application or method operating on blockchain node 100, contact data, phone book data, messages, pictures, videos, and the like.
  • the memory 104 can be implemented by any type of volatile or non-volatile storage device, or a combination thereof, such as static random access memory (SRAM), electrically erasable programmable read only memory (EEPROM), erasable.
  • SRAM static random access memory
  • EEPROM electrically erasable programmable read only memory
  • EPROM Programmable Read Only Memory
  • PROM Programmable Read Only Memory
  • ROM Read Only Memory
  • Magnetic Memory Flash Memory
  • Disk Disk or Optical Disk.
  • Power component 106 provides power to various components of blockchain node 100.
  • Power component 106 can include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for blockchain node 100.
  • the multimedia component 108 includes a screen that provides an output interface between the blockchain node 100 and the user.
  • the screen can include a liquid crystal display (LCD) and a touch panel (TP). If the screen includes a touch panel, the screen can be implemented as a touch screen to receive input signals from the user.
  • the touch panel includes one or more touch sensors to sense touches, slides, and gestures on the touch panel. The touch sensor may sense not only the boundary of the touch or sliding action, but also the duration and pressure associated with the touch or slide operation.
  • the multimedia component 108 includes a front camera and/or a rear camera. When the blockchain node 100 is in an operational mode, such as a shooting mode or a video mode, the front camera and/or the rear camera can receive external multimedia data. Each front and rear camera can be a fixed optical lens system or have focal length and optical zoom capabilities.
  • the audio component 110 is configured to output and/or input an audio signal.
  • the audio component 110 includes a microphone (MIC) that is configured to receive an external audio signal when the blockchain node 100 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode.
  • the received audio signal may be further stored in memory 104 or transmitted via communication component 116.
  • audio component 110 also includes a speaker for outputting an audio signal.
  • the I/O interface 112 provides an interface between the processing component 102 and the peripheral interface module, which may be a keyboard, a click wheel, a button, or the like. These buttons may include, but are not limited to, a home button, a volume button, a start button, and a lock button.
  • Sensor component 114 includes one or more sensors for providing state evaluation of various aspects to blockchain node 100.
  • sensor component 114 can detect the open/closed state of blockchain node 100, the relative positioning of components, such as the component being the display of blockchain node 100 and The keypad, sensor component 114 can also detect the change in position of a component of the blockchain node 100 or the blockchain node 100, the presence or absence of contact by the user with the blockchain node 100, the orientation or acceleration/deceleration of the blockchain node 100 And the temperature change of the block chain node 100.
  • Sensor assembly 114 can include a proximity sensor configured to detect the presence of nearby objects without any physical contact.
  • Sensor assembly 114 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications.
  • the sensor assembly 114 can also include an acceleration sensor, a gyro sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
  • Communication component 116 is configured to facilitate wired or wireless communication between blockchain node 100 and other devices.
  • the blockchain node 100 can access a wireless network based on communication standards, such as WiFi, 2G or 3G, or a combination thereof.
  • communication component 116 receives broadcast signals or broadcast associated information from an external broadcast management system via a broadcast channel.
  • the communication component 116 also includes a near field communication (NFC) module to facilitate short range communication.
  • NFC near field communication
  • the NFC module can be implemented based on radio frequency identification (RFID) technology, infrared data association (IrDA) technology, ultra-wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
  • RFID radio frequency identification
  • IrDA infrared data association
  • UWB ultra-wideband
  • Bluetooth Bluetooth
  • blockchain node 100 may be implemented by one or more application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), Field Programmable Gate Array (FPGA), controller, microcontroller, microprocessor or other electronic component implementation for performing the above mobile network access authentication method.
  • ASICs application specific integrated circuits
  • DSPs digital signal processors
  • DSPDs digital signal processing devices
  • PLDs programmable logic devices
  • FPGA Field Programmable Gate Array
  • controller microcontroller, microprocessor or other electronic component implementation for performing the above mobile network access authentication method.
  • non-transitory computer readable storage medium comprising instructions, such as a memory 104 comprising instructions executable by processor 120 of blockchain node 100 to perform the above-described mobile network connection Enter the authentication method.
  • the non-transitory computer readable storage medium may be a ROM, a random access memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, and an optical data storage device.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

一种移动网络接入认证方法、装置、存储介质及区块链节点,用以解决现有移动网络接入认证技术可靠性较低的技术问题。所述方法认证服务器,认证服务器是区块链网络中的节点,该方法包括:接收用户设备发送的认证请求,认证请求包括第一区块链地址以及身份信息;根据第一区块链地址查询区块链,确定区块链是否存储与身份信息相符的身份验证信息,其中,移动网络的支持系统在用户设备注册时,将用户设备的身份验证信息写入区块链中;在区块链中存储有与身份信息相符的身份验证信息时,基于认证算法对用户设备进行认证,其中,若认证成功,则表明所述用户设备为所述身份信息表示的目标用户设备。

Description

移动网络接入认证方法、装置、存储介质及区块链节点 技术领域
本公开涉及信息技术领域,尤其涉及一种移动网络接入认证方法、装置、存储介质及区块链节点。
背景技术
目前,移动网络的接入认证都是由移动网络的运营商控制的,以4G网络为例,其接入认证流程具体为:运营商发行SIM卡,SIM卡和HSS(Home Subscriber Server,归属签约用户服务器)中预存有对称密钥,SIM卡用户设备附着到移动网络时,MME(Mobility Management Entity,移动管理实体)向HSS发送鉴权信息请求,HSS使用对称密钥产生鉴权集(包括随机数和期望挑战响应XRES)并发送给MME,MME向SIM卡用户设备发送携带有随机数的鉴权请求,并接收SIM卡用户设备基于预存的对称密钥和随机数生成的用户端挑战响应RES,若接收到的用户端挑战响应RES与鉴权集中的期望挑战响应XRES一致,则接入认证成功。
由上述流程可知,HSS作为分区域中心化部署的服务器,若其出现问题而停止服务,将造成归属地为该HSS区域的用户设备无法接入移动网络,影响移动网络接入认证的可靠性。
发明内容
本公开的主要目的是提供一种移动网络接入认证方法及装置,以解决现有移动网络接入技术中由于中心化部署导致的可靠性较低的技术问题。
为了实现上述目的,本公开第一方面提供一种移动网络接入认证方法,所述方法应用于认证服务器,所述认证服务器是区块链网络中的节点,所述方法包括:
接收用户设备发送的认证请求,所述认证请求包括第一区块链地址以及身份信息;
根据所述第一区块链地址查询所述区块链,确定所述区块链是否存储与所述身份信息相符的身份验证信息,其中,移动网络的支持系统在用户设备注册时,将用户设备的身份验证信息写入区块链中,若所述区块链中存储有与所述身份信息相符的身份验证信息,则表明所述身份信息表示的目标用户设备已在移动网络注册;
在所述区块链中存储有与所述身份信息相符的身份验证信息时,基于认证算法对所述用户设备进行认证,其中,若认证成功,则表明所述用户设备为所述身份信息表示的目标用户设备。
本公开第二方面提供一种移动网络接入认证方法,所述方法应用于用户 设备,所述用户设备是区块链网络中的节点,所述方法包括:
向认证服务器发送认证请求,所述认证请求包括第一区块链地址以及身份信息,所述第一区块链地址和所述身份信息用于所述认证服务器确认所述身份信息表示的目标用户设备是否已在移动网络注册;
在确认所述身份信息表示的目标用户设备已在所述移动网络注册后,基于认证算法与所述认证服务器完成对所述用户设备的身份认证,其中,若认证成功,则表明所述用户设备为所述身份信息表示的目标用户设备。
本公开第三方面提供一种移动网络接入认证装置,所述装置应用于认证服务器,所述认证服务器是区块链网络中的节点,所述装置包括:第一接收模块,用于接收用户设备发送的认证请求,所述认证请求包括第一区块链地址以及身份信息;查询模块,用于根据所述第一区块链地址查询所述区块链,确定所述区块链是否存储与所述身份信息相符的身份验证信息,其中,移动网络的支持系统在用户设备注册时,将用户设备的身份验证信息写入区块链中,若所述区块链中存储有与所述身份信息相符的身份验证信息,则表明所述身份信息表示的目标用户设备已在移动网络注册。
第一认证模块,用于在所述区块链中存储有与所述身份信息相符的身份验证信息时,基于认证算法对所述用户设备进行认证,其中,若认证成功,则表明所述用户设备为所述身份信息表示的目标用户设备。
本公开第四方面提供一种移动网络接入认证装置,所述装置应用于用户设备,所述用户设备是区块链网络中的节点,所述装置包括:
第二发送模块,用于向认证服务器发送认证请求,所述认证请求包括第一区块链地址以及身份信息,所述第一区块链地址和所述身份信息用于所述认证服务器确认所述身份信息表示的目标用户设备是否已在移动网络注册;
第二认证模块,用于在确认所述身份信息表示的目标用户设备已在所述移动网络注册后,基于认证算法与所述认证服务器完成对所述用户设备的身份认证,其中,若认证成功,则表明所述用户设备为所述身份信息表示的目标用户设备。
本公开第五方面提供一种非临时性计算机可读存储介质,所述非临时性计算机可读存储介质中包括一个或多个程序,所述一个或多个程序用于执行本公开第一方面所述的方法。
本公开第六方面提供一种区块链节点,包括:
本公开第五方面所述的非临时性计算机可读存储介质;以及
一个或者多个处理器,用于执行所述非临时性计算机可读存储介质中的程序。
本公开第七方面提供一种非临时性计算机可读存储介质,所述非临时性计算机可读存储介质中包括一个或多个程序,所述一个或多个程序用于执行本公开第二方面所述的方法。
本公开第八方面提供一种区块链节点,包括:
本公开第七方面所述的非临时性计算机可读存储介质;以及
一个或者多个处理器,用于执行所述非临时性计算机可读存储介质中的程序。
采用上述技术方案,认证服务器通过查询用户设备在移动网络注册时写入区块链的身份验证信息验证用户设备是否在移动网络注册,并在确认用户设备在移动网络注册后,基于认证算法对用户设备进行认证,这样,区块链的去中心化可以避免中心化部署的HSS出现问题而导致接入认证受到影响,提高了移动网络接入认证的可靠性。
本公开的其他特征和优点将在随后的具体实施方式部分予以详细说明。
附图说明
为了更清楚地说明本公开实施例或现有技术中的技术方案,下面将对实施例描述中所需要使用的附图作一简单地介绍,显而易见地,下面描述中的附图是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1为本公开实施例提供的一种应用于认证服务器的移动网络接入认证方法的流程图;
图2为本公开实施例提供的一种应用于用户设备的移动网络接入认证方法的流程图;
图3为本公开实施例提供的一种认证服务器对用户设备认证的方法的流程图;
图4为本公开实施例提供的一种用户设备对认证服务器认证的方法的流程图;
图5为本公开实施例提供的一种实施环境的示意图;
图6为本公开实施例提供的一种移动网络接入认证方法的流程示意图;
图7为本公开实施例提供的一种应用于认证服务器的移动网络接入认证装置的结构示意图;
图8为本公开实施例提供的另一种应用于认证服务器的移动网络接入认证装置的结构示意图;
图9为本公开实施例提供的一种应用于用户设备的移动网络接入认证装置的结构示意图;
图10为本公开实施例提供的另一种应用于用户设备的移动网络接入认证装置的结构示意图;
图11为本公开实施例提供的一种区块链节点的结构示意图;
图12为本公开实施例提供的另一种区块链节点的结构示意图。
具体实施方式
为使本公开实施例的目的、技术方案和优点更加清楚,下面将结合本公开实施例中的附图,对本公开实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。
为了使本领域技术人员更容易理解本公开实施例提供的技术方案,下面首先对涉及到的相关技术进行简单介绍。
区块链是由区块链网络中所有节点共同参与维护的去中心化分布式数据库系统,它是由一系列基于密码学方法产生的数据块组成,每个数据块即为区块链中的一个区块。根据产生时间的先后顺序,区块被有序地链接在一起,形成一个数据链条,被形象地称为区块链。区块链由其特别的区块和交易产生、验证协议,具有不可更改,不可伪造、完全可追溯的安全特性。
区块链技术中涉及到的相关概念说明:
区块链节点:区块链网络基于P2P(Peer to Peer,对等网络)网络,每个参与交易和区块存储、验证、转发的P2P网络节点都是一个区块链网络中的节点。
用户身份:区块链中的用户身份使用公钥表示,并且公钥和私钥是成对出现的,其中,私钥由用户掌握而不发布到上述的区块链网络中,公钥通过特定的哈希和编码后成为“地址”,“地址”代表了用户,并且公钥和“地址”可随意发布在区块链网络中。值得一提的是,用户身份和区块链节点不存在一一对应关系,用户可以在任意一个区块链节点上使用自己的私钥。
区块链数据写入:区块链节点通过向区块链网络发布“交易”(Transaction)实现向区块链写入数据。交易中包含用户使用自己私钥对交易的签名,以证明用户的身份。交易被“矿工”(执行PoW区块链共识竞争机制的区块链节点)记录入产生的新区块,然后发布到区块链网络,并被其他区块链节点验证通过和接受后,交易数据即被写入区块链。
本公开实施例基于区块链技术提供一种移动网络接入认证方法,该方法应用于认证服务器,如图1所示,该方法包括:
在步骤S101中,接收用户设备发送的认证请求,该认证请求包括第一区块链地址以及身份信息。
在步骤S102中,根据第一区块链地址查询区块链,确定区块链中是否存储与身份信息相符的身份验证信息。
其中,认证服务器是区块链网络中的节点,存储有由多个区块组成的区块链,每个区块用于存储信息,确保了该认证服务器至少具备参与区块链查询的功能。
此外,用户设备在接入移动网络前可以通过移动网络的支持系统在移动网络注册,其中,移动网络的支持系统是区块链网络中的节点,存储有由多 个区块组成的区块链,每个区块用于存储信息,确保了该支持系统至少具备参与区块链交易的功能。用户设备的注册过程为:用户设备将其身份验证信息发送给支持系统,该身份验证信息可以包括用户设备的公钥以及用户设备在区块链网络中的地址,支持系统将接收到的用户设备的身份验证信息写入到区块链中,这样,基于用户设备的区块链地址即可查询到区块链中存储的属于该用户设备账户下的所有信息,进一步可以确定该账户下的所有信息中是否存储与身份信息相符的身份验证信息。另外,支持系统还可以将区块链的启动节点bootnode信息发送给用户设备,以便用户设备根据所述bootnode信息基于区块链协议接入区块链网络。
在本公开实施例的一种可能的实现方式中,所述区块链网络中可以只允许移动网络的支持系统或者该支持系统授权的其它节点向区块链中写入用户设备的身份验证信息,例如,该区块链可以为一许可链,移动网络运营商可以授权给可信任的节点为用户设备提供注册服务。
用户设备自身的身份验证信息可以包括用户设备自身的公钥、IMSI(International Mobile Subscriber Identity,国际移动用户识别码)、归属地、状态等信息。则用户设备的身份信息可以为用户设备的IMSI。示例地,以用户设备的身份信息是其IMSI示意,认证服务器根据第一区块链地址查询区块链,若查询到第一区块链地址下存在该用户设备的IMSI且该IMSI有效,则可以确定用户设备已在移动网络注册。
可选地,若认证服务器根据用户设备发送的认证请求中的区块链地址未查询到区块链中存在与认证请求中的身份信息相符的身份验证信息或者查询到区块链中存在的与认证请求中的身份信息相符的身份验证信息无效时,则表明该用户设备未在移动网络注册或者已注销,因而可以拒绝响应所述认证请求。
在步骤S103中,在确定区块链中存储有与身份信息相符的身份验证信息时,基于认证算法对用户设备进行认证,其中,若认证成功,则表明该用户设备为身份信息表示的目标用户设备。
在确定区块链中存储有与身份信息相符的身份验证信息时,认证服务器可基于认证算法,与用户设备进行交互完成对用户设备进行认证,避免了未在移动网络注册的用户设备伪冒已在移动网络注册的用户设备的身份信息接入移动网络。
这样,采用本公开实施例提供的技术方案,由于无需部署中心化的节点(如现有技术中的HSS)参与接入认证,因此可以避免中心化节点停止服务而致使用户设备无法接入移动网络的问题出现,提高了接入认证的可靠性。同时,可以简化中心化节点的复杂程度。
本公开实施例还提供一种移动网络接入认证方法,该方法应用于用户设备,如图2所示,该方法包括:
在步骤S201中,向认证服务器发送认证请求,认证请求包括第一区块链地址以及身份信息,第一区块链地址和身份信息用于认证服务器确认身份信息表示的目标用户设备是否已在移动网络注册。
在步骤S202中,在确认身份信息表示的目标用户设备已在移动网络注册后,基于认证算法与认证服务器完成对用户设备的身份认证,其中,若认证成功,则表明该用户设备为身份信息表示的目标用户设备。
其中,用户设备可按照附着流程连接到认证服务器,并根据启动节点信息,通过区块链连接协议,例如采用轻节点协议或RPC的方式连接到区块链网络。
值得说明的是,在现有移动网络附着流程中,用户设备没有完成认证是无法访问移动网络的,从而也无法连接到区块链网络中。因此,为了解决该问题,在本发明中,可将区块链节点部署在核心网中,并默认开放用户设备对核心网中的区块链节点的网络通信能力。
此外,用户设备在移动网络的注册过程以及基于认证算法与认证服务器完成对其身份认证的过程可以参照对图1提供的移动网络接入认证方法的描述,此处不再赘述。
为了避免现有技术中对称加密算法中容易出现的HSS存储的用户密钥丢失而造成用户设备被假冒的安全问题,本公开实施例中,认证服务器与用户设备可以基于非对称加密算法进行双向认证,即包括认证服务器对用户设备进行认证和用户设备对认证服务器进行认证。接下来,通过具体的实施方式对这两个认证进行详细说明。
在一种可能的实现方式中,用户设备的身份信息可以包括第一公钥(即用户设备自己的公钥)。相应地,如图3所示,认证服务器对用户设备进行认证方法,包括:
在步骤S301中,认证服务器向用户设备发送第一认证挑战,第一认证挑战包括第一随机数。
在步骤S302中,用户设备根据其私钥对第一随机数进行签名,得到第一签名信息。
在步骤S303中,用户设备将包括第一签名信息的第一认证挑战响应发送给认证服务器。
在步骤S304中,认证服务器根据第一公钥对第一签名信息进行签名验证。
采用上述方法,用户设备在移动网络注册时通过移动网络的支持系统将其公钥(第一公钥)写入到区块链中,认证服务器根据用户设备的第一区块链地址查询区块链可得到该第一公钥。这样,认证服务器在获得第一公钥后,可以根据该第一公钥对用户设备发送的第一签名信息进行签名认证,若签名认证成功则可确定请求认证的用户设备掌握了与第一公钥对应的私钥,由此 可表明该用户设备为身份信息表示的目标用户设备。
由于区块链中写入的信息具备不可篡改的特性,从而使得认证服务器可以根据真实可信的第一公钥,验证用户设备是否为其身份信息表示目标用户设备,从而保证了用户设备不可冒充。
在另一种可能的实施方式中,用户设备发送的认证请求还可以包括第二随机数,相应地,如图4所示,用户设备对认证服务器进行认证的方法包括:
在步骤S401中,认证服务器根据其私钥对第二随机数进行签名,得到第二签名信息。
在步骤S402中,认证服务器将包括第二签名信息以及认证服务器的第二区块链地址的第二认证挑战响应发送给用户设备。
在步骤S403中,用户设备根据第二区块链地址从区块链中查询认证服务器的公钥并对第二签名信息进行签名验证。
其中,认证服务器的公钥也可以是在移动网络注册时由支持系统写入区块链,例如认证服务器首先生成成对出现的私钥和公钥,并通过将公钥通过特定的哈希和编码后生成第二区块链地址。其中,私钥由其自己掌握而不发布到网络中,而向支持系统发送包括其公钥的第二认证请求,支持系统接收到第二认证请求时将认证服务器的公钥写入区块链中,由此,认证服务器便完成了区块链网络注册。
采用上述方法,认证服务器在注册时通过移动网络的支持系统将其公钥写入到区块链中,用户设备根据认证服务器的第二区块链地址查询区块链可得到认证服务器的公钥。这样,用户设备根据认证服务器的公钥对认证服务器的第二签名信息进行签名认证,若签名认证成功则可确定请求认证的认证服务器掌握了与该公钥对应的私钥,由此可表明该认证服务器合法。
由于区块链中写入的信息具备不可篡改的特性,从而使得用户设备可以根据真实可信的认证服务器的公钥,验证请求认证的认证服务器是否合法,从而保证了认证服务器不可冒充。
为了使本领域技术人员更加理解本公开实施例提供的技术方案,下面以结合图5说明本公开实施例提供的移动网络接入认证方法。
图5是本公开实施例提供的一种实施环境的示意图,如图5所示,该实施环境包括用户设备501、认证服务器502、以及移动网络的支持系统503,其中,认证服务器502可以是eNodeB或者MME(Mobility Management Entity,移动管理实体),移动网络的支持系统503可以是OSS(Operation Support System,运营支撑系统)或BSS(Business Support System,业务支撑系统),且eNodeB、MME、用户设备UE、OSS/BSS均为区块链网络中的节点。结合图5,本公开实施例提供的一种移动网络接入认证方法如图6所示,包括:
在步骤S601中,用户设备501向移动网络的支持系统503发送第一注 册请求,该第一注册请求包括用户设备501的身份验证信息。
在步骤S602中,移动网络的支持系统503将用户设备501的身份验证信息写入区块链中。
在步骤S603中,支持系统503将区块链的启动节点信息发送给用户设备501。
在步骤S604中,认证服务器502向移动网络的支持系统503发送第二注册请求,该第二注册请求包括认证服务器502的公钥。
在步骤S605中,支持系统503将认证服务器502的公钥写入区块链中。
应理解,用户设备与认证服务器的注册为两个独立的过程,不受时间以及步骤先后顺序的限制,上述方法步骤只是为了简单描述。
在步骤S606中,用户设备501按照附着流程连接到认证服务器502。
在用户设备501和认证服务器502均完成注册后,用户设备501可以连接到认证服务器502上认证。其中,用户设备UE可以连接到eNodeB上进行认证,也可以连接到MME上进行认证,也就是说,本公开所述的认证服务器具体可以为eNodeB或者MME。值得说明的是,在eNodeB上认证可以减小eNodeB与MME之间的信息交互,节约核心网资源,并减小核心网协议的复杂度。
在步骤S607中,用户设备501向认证服务器502发送认证请求。
其中,认证请求可以包括用户设备501的第一区块链地址ADDRESS(A)、身份信息和第二随机数RAND(A)。在该实施例中,以身份信息为用户设备501的公钥PK(A)示意。
在步骤S608中,认证服务器502根据第一区块链地址查询区块链,确定区块链中是否存储与身份信息相符的身份验证信息。
认证服务器502根据ADDRESS(A)查询区块链,得到区块链中存储的身份验证信息,若该身份验证信息中有PK(A),则表明该身份验证信息与用户设备501发送的身份信息相符,可确定该身份信息标识的目标用户设备已在移动网络注册,进一步地,执行步骤S609;若未查询到区块链中存储有与用户设备的身份信息相符的身份验证信息或者区块链中存储的与用户设备的身份信息相符的身份验证信息无效时,则表明该用户设备未在移动网络注册或者已注销,则拒绝响应用户设备501的认证请求,结束对用户设备501的认证。
在步骤S609中,认证服务器502向用户设备501发送包括第一随机数的第一认证挑战。
在确认区块链中存储有与身份信息相符的身份验证信息后,认证服务器502生成第一随机数RAND(B)并向用户设备501发送包括RAND(B)的第一认证挑战。
在步骤S610中,用户设备501根据其私钥对第一随机数进行签名,得 到第一签名信息。
在步骤S611中,用户设备501将包括第一签名信息的第一认证挑战响应发送给认证服务器502。
在步骤S612中,认证服务器502根据第一公钥对第一签名信息进行签名验证。
如上所述,认证服务器502根据第一区块链地址ADDRESS(A)查询区块链得到用户设备501的公钥PK(A),根据公钥PK(A)对第一签名信息SIGN(A)进行验证,若签名验证成功,则表明用户设备501掌握与该公钥PK(A)对应的私钥,因此可确定用户设备501为身份信息表示的目标用户设备,则执行步骤S613;否则,可确定用户设备402被冒充,则结束对用户设备501的认证。
由于区块链中写入的信息具备不可篡改的特性,从而使得认证服务器502可以根据真实可信的公钥PK(A),验证用户设备402是否为身份信息表示的目标用户设备,从而保证了用户设备402不可冒充。
在步骤S613中,认证服务器502根据其私钥对第二随机数进行签名,得到第二签名信息。
在步骤S614中,认证服务器502将包括第二签名信息以及认证服务器的第二区块链地址的第二认证挑战响应发送给用户设备501。
在步骤S615中,用户设备501根据第二区块链地址从区块链中查询认证服务器的公钥并对第二签名信息进行签名验证。
在用户设备501通过认证后,认证服务器502根据自己的私钥对第二随机数RAND(A)进行签名,得到第二签名信息SIGN(B)并向用户设备501发送携带有第二签名信息SIGN(B)和第二区块链地址ADDRESS(B)的第二认证挑战响应。
用户设备501根据ADDRESS(B)查询区块链,得到区块链中存储的认证服务器502的公钥PK(B),并根据公钥PK(B)对第二签名信息SIGN(B)进行验证。若签名验证成功,则表明认证服务器502掌握与该公钥PK(B)对应的私钥,因此可确定认证服务器502合法;否则,可确定认证服务器502被冒充。
由于区块链中写入的信息具备不可篡改的特性,从而使得用户设备501可以根据真实可信的公钥PK(B),验证认证服务器502是否合法,从而保证了认证服务器502不可冒充。
在第二签名信息验证成功后,用户设备501便完成了对认证服务器502的认证。
值得说明的是,对于上述方法实施例,为了简单描述,故将其都表述为一系列的动作组合,但是本领域技术人员应该知悉,本发明并不受所描述的动作顺序的限制。其次,本领域技术人员也应该知悉,说明书中所描述的实 施例均属于优选实施例,所涉及的动作并不一定是本发明所必须的。
此外,在本公开的实施例中,由于区块链中所记录的用户设备信息和认证服务器信息是接入认证的关键数据,其添加和修改必须受到权限控制,以实现对数据写入的保护。因此,在本公开实施例的一个实施例中,区块链可采用许可链,即不同的运营商具有各自的许可链,属于同一运营商的认证服务器和用户设备分别是该许可链上的节点。在许可链的权限控制上,限制不同区块链账户是否具有对某些数据的写入和修改权限。例如,对移动网络的支持系统中的区块链账户仅配置写入和修改权限,而对用户设备和认证服务器上的区块链账户仅配置读取权限。
在另一个实施例中,可以通过编写特定的智能合约,通过该智能合约实现信息的存储。智能合约提供注册、修改、注销、查询等接口,并将注册、修改、注销、查询等接口的调用权限仅分配给移动网络的支持系统中的区块链账户,而对与用户设备和认证服务器上的区块链账户仅分配查询接口调用的权限。
其中,智能合约是一段计算机执行程序,满足可准确自动执行,基于区块链的智能合约包括事务处理和保存的机制,以及一个完备的状态机,用于接受和处理各种智能合约。如果自动状态机中某个或某几个动作的触发条件满足,则由状态机根据预设信息选择合约动作自动执行。
此外,考虑到认证服务器可能与用户设备属于不同的运营商,每一运营商具有各自的许可链,当用户设备需要跨运营商漫游认证时,需要给某些节点上的区块链账户提供同时访问多条链的能力。例如当A运营商的用户设备需要漫游到B运营商的移动网络时,A运营商需要向B运营商提供A运营商的区块链的访问能力,从而让B运营商的认证服务器能够访问A运营商区块链中的相关信息。这样,相对于现有技术中用户设备漫游时必须到其归属地的HSS上进行鉴权集的产生,可以实现用户设备漫游时的就近认证,提高接入认证效率。
在一个实施例中,针对上述区块链为私有链的情况,A运营商可给B运营商的相关区块链账户配置A运营商的许可链的接入和数据读取权限,具体地址,可以是为B运营商配置所需数量的许可链全节点。
在另一个实施例中,针对上述智能合约的情况,可将查询接口的调用权限配置给B运营商的所需区块链账户。
由此,相对于现有技术中用户设备漫游时必须到其归属地的第三方机构上进行认证信息的产生,可以提高移动网络接入认证的效率。
本公开实施例还提供一种移动网络接入认证装置70,该装置70应用于认证服务器,其中,认证服务器是区块链网络中的节点,如图7所示,该装置70包括:
第一接收模块71,用于接收用户设备发送的认证请求,所述认证请求包 括第一区块链地址以及身份信息。
查询模块72,用于根据所述第一区块链地址查询所述区块链,确定所述区块链是否存储与所述身份信息相符的身份验证信息,其中,移动网络的支持系统在用户设备注册时,将用户设备的身份验证信息写入区块链中,若所述区块链中存储有与所述身份信息相符的身份验证信息,则表明所述身份信息表示的目标用户设备已在移动网络注册。
第一认证模块73,用于在所述区块链中存储有与所述身份信息相符的身份验证信息时,基于认证算法对所述用户设备进行认证,其中,若认证成功,则表明所述用户设备为所述身份信息表示的目标用户设备。
可选地,如图8所示,所述第一认证模块73包括:
第一认证子模块731,用于基于非对称加密算法与所述用户设备进行双向认证。
可选地,如图8所示,所述身份验证信息包括第一公钥,所述第一认证模块包括:
第一发送子模块732,用于向所述用户设备发送第一认证挑战,所述第一认证挑战包括第一随机数;
第一接收子模块733,用于接收所述用户设备发送的第一认证挑战响应,所述第一认证挑战响应包括第一签名信息,其中,所述第一签名信息是所述用户设备的私钥签名所述第一随机数得到的;
第一签名验证子模块734,用于根据所述第一公钥对所述第一签名信息进行签名验证,其中,若签名验证成功则表明所述用户设备为所述身份信息表示的目标用户设备。
可选地,如图8所示,所述认证请求还包括第二随机数;
所述装置70还包括:
第一签名模块74,用于根据所述认证服务器的私钥对所述第二随机数进行签名,得到第二签名信息;
第一发送模块75,用于将包括所述第二签名信息以及所述认证服务器的第二区块链地址的第二认证挑战响应发送给所述用户设备,所述第二区块链地址用于所述用户设备从所述区块链中查询公钥对所述第二签名信息进行验证,其中,所述认证服务器的公钥是所述支持系统写入所述区块链中的。
可选地,如图8所示,所述装置70还包括:
拒绝响应模块76,用于在确认所述区块链中不存在与所述用户设备的身份信息相符的身份验证信息或者所述区块链中存储的与所述用户设备的身份信息相符的身份验证信息无效时,拒绝响应所述认证请求。
所属本领域的技术人员应该清楚地了解到,为描述的方便和简洁,上述描述的客户端的各模块的具体工作过程,可以参考前述方法实施例中对应的过程,此处不再赘述。
另外,上述对客户端组成模块进行的划分,仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。并且,各个模块的物理实现也可以有多种方式,本发明对此不做限定。
本公开实施例还提供一种移动网络接入认证装置80,该装置80应用于用户设备,其中,用户设备是区块链网络中的节点,如图9所示,该装置80包括:
第二发送模块81,用于向认证服务器发送认证请求,所述认证请求包括第一区块链地址以及身份信息,所述第一区块链地址和所述身份信息用于所述认证服务器确认所述身份信息表示的目标用户设备是否已在移动网络注册;
第二认证模块82,用于在确认所述身份信息表示的目标用户设备已在所述移动网络注册后,基于认证算法与所述认证服务器完成对所述用户设备的身份认证,其中,若认证成功,则表明所述用户设备为所述身份信息表示的目标用户设备。
可选地,如图10所示,所述第二认证模块82包括:
第二接收子模块821,用于接收所述认证服务器发送的第一认证挑战,所述第一认证挑战包括第一随机数;
第一签名子模块822,用于根据所述用户设备的私钥对所述第一随机数进行签名,得到第一签名信息;
第二发送子模块823,用于将包括所述第一签名信息的第一认证挑战响应发送给所述认证服务器,其中,所述第一签名信息用于所述认证服务器对所述用户设备进行认证。
可选地,如图10所示,所述认证请求还包括第二随机数;
所述装置80还包括:
第二接收模块83,用于接收所述认证服务器发送的第二认证挑战响应,所述第二认证挑战响应包括第二签名信息以及所述认证服务器的第二区块链地址,其中,所述第二签名信息是所述认证服务器的私钥签名所述第二随机数得到的;
第一签名验证模块84,用于根据所述第二区块链地址从所述区块链中查询所述认证服务器的公钥并对所述第二签名信息进行签名验证,其中,若签名验证成功则表明所述认证服务器合法。
可选地,如图10所示,所述装置80还包括:
第三发送模块85,用于向移动网络的支持系统发送注册请求,所述注册请求包括所述用户设备的身份验证信息,其中,所述支持系统是区块链网络中的节点;
第二接收模块86,用于接收所述支持系统发送的所述区块链的启动节点信息,所述启动节点信息用于所述用户设备基于区块链协议接入区块链网 络。
所属本领域的技术人员应该清楚地了解到,为描述的方便和简洁,上述描述的客户端的各模块的具体工作过程,可以参考前述方法实施例中对应的过程,此处不再赘述。
另外,上述对客户端组成模块进行的划分,仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。并且,各个模块的物理实现也可以有多种方式,本发明对此不做限定。
相应地,本公开实施例还提供一种非临时性计算机可读存储介质,所述非临时性计算机可读存储介质中包括一个或多个程序,所述一个或多个程序用于执行权上述应用于认证服务器的移动网络接入认证方法。
相应地,本公开实施例还提供一种区块链节点,包括上述非临时性计算机可读存储介质;以及一个或者多个处理器,用于执行所述非临时性计算机可读存储介质中的程序。
相应地,本公开实施例还提供一种非临时性计算机可读存储介质,所述非临时性计算机可读存储介质中包括一个或多个程序,所述一个或多个程序用于执行权上述应用于用户设备的移动网络接入认证方法。
相应地,本公开实施例还提供一种区块链节点,包括上述非临时性计算机可读存储介质;以及一个或者多个处理器,用于执行所述非临时性计算机可读存储介质中的程序。
本公开实施例还提供一种区块链节点90,该区块链节点90可以是如上所述的认证服务器,例如eNodeB或MME,如图11所示,该区块链节点90包括处理组件922,其进一步包括一个或多个处理器,以及由存储器932所代表的存储器资源,用于存储可由处理组件922的执行的指令,例如应用程序。存储器932中存储的应用程序可以包括一个或一个以上的每一个对应于一组指令的模块。此外,处理组件922被配置为执行指令,以执行上述移动网络接入认证方法。
区块链节点90还可以包括一个电源组件926被配置为执行区块链节点90的电源管理,一个有线或无线网络接口950被配置为将区块链节点90连接到网络,和一个输入输出(I/O)接口958。区块链节点90可以操作基于存储在存储器932的操作系统,例如Windows ServerTM,Mac OS XTM,UnixTM,LinuxTM,FreeBSDTM或类似。
本公开实施例还提供一种区块链节点100,该区块链节点100可以是如上所述的用户设备,例如移动电话,计算机,数字广播终端,消息收发设备,游戏控制台,平板设备,医疗设备,健身设备,个人数字助理等。
如图12所示,该区块链节点100可以包括以下一个或多个组件:处理组件102,存储器104,电力组件106,多媒体组件108,音频组件110,输入/输出(I/O)的接口112,传感器组件114,以及通信组件116。
处理组件102通常控制区块链节点100的整体操作,诸如与显示,电话呼叫,数据通信,相机操作和记录操作相关联的操作。处理组件102可以包括一个或多个处理器120来执行指令,以完成上述的移动网络接入认证方法的全部或部分步骤。此外,处理组件102可以包括一个或多个模块,便于处理组件102和其他组件之间的交互。例如,处理组件102可以包括多媒体模块,以方便多媒体组件108和处理组件102之间的交互。
存储器104被配置为存储各种类型的数据以支持在区块链节点100的操作。这些数据的示例包括用于在区块链节点100上操作的任何应用程序或方法的指令,联系人数据,电话簿数据,消息,图片,视频等。存储器104可以由任何类型的易失性或非易失性存储设备或者它们的组合实现,如静态随机存取存储器(SRAM),电可擦除可编程只读存储器(EEPROM),可擦除可编程只读存储器(EPROM),可编程只读存储器(PROM),只读存储器(ROM),磁存储器,快闪存储器,磁盘或光盘。
电力组件106为区块链节点100的各种组件提供电力。电力组件106可以包括电源管理系统,一个或多个电源,及其他与为区块链节点100生成、管理和分配电力相关联的组件。
多媒体组件108包括在所述区块链节点100和用户之间的提供一个输出接口的屏幕。在一些实施例中,屏幕可以包括液晶显示器(LCD)和触摸面板(TP)。如果屏幕包括触摸面板,屏幕可以被实现为触摸屏,以接收来自用户的输入信号。触摸面板包括一个或多个触摸传感器以感测触摸、滑动和触摸面板上的手势。所述触摸传感器可以不仅感测触摸或滑动动作的边界,而且还检测与所述触摸或滑动操作相关的持续时间和压力。在一些实施例中,多媒体组件108包括一个前置摄像头和/或后置摄像头。当区块链节点100处于操作模式,如拍摄模式或视频模式时,前置摄像头和/或后置摄像头可以接收外部的多媒体数据。每个前置摄像头和后置摄像头可以是一个固定的光学透镜系统或具有焦距和光学变焦能力。
音频组件110被配置为输出和/或输入音频信号。例如,音频组件110包括一个麦克风(MIC),当区块链节点100处于操作模式,如呼叫模式、记录模式和语音识别模式时,麦克风被配置为接收外部音频信号。所接收的音频信号可以被进一步存储在存储器104或经由通信组件116发送。在一些实施例中,音频组件110还包括一个扬声器,用于输出音频信号。
I/O接口112为处理组件102和外围接口模块之间提供接口,上述外围接口模块可以是键盘,点击轮,按钮等。这些按钮可包括但不限于:主页按钮、音量按钮、启动按钮和锁定按钮。
传感器组件114包括一个或多个传感器,用于为区块链节点100提供各个方面的状态评估。例如,传感器组件114可以检测到区块链节点100的打开/关闭状态,组件的相对定位,例如所述组件为区块链节点100的显示器和 小键盘,传感器组件114还可以检测区块链节点100或区块链节点100一个组件的位置改变,用户与区块链节点100接触的存在或不存在,区块链节点100方位或加速/减速和区块链节点100的温度变化。传感器组件114可以包括接近传感器,被配置用来在没有任何的物理接触时检测附近物体的存在。传感器组件114还可以包括光传感器,如CMOS或CCD图像传感器,用于在成像应用中使用。在一些实施例中,该传感器组件114还可以包括加速度传感器,陀螺仪传感器,磁传感器,压力传感器或温度传感器。
通信组件116被配置为便于区块链节点100和其他设备之间有线或无线方式的通信。区块链节点100可以接入基于通信标准的无线网络,如WiFi,2G或3G,或它们的组合。在一个示例性实施例中,通信组件116经由广播信道接收来自外部广播管理系统的广播信号或广播相关信息。在一个示例性实施例中,所述通信组件116还包括近场通信(NFC)模块,以促进短程通信。例如,在NFC模块可基于射频识别(RFID)技术,红外数据协会(IrDA)技术,超宽带(UWB)技术,蓝牙(BT)技术和其他技术来实现。
在示例性实施例中,区块链节点100可以被一个或多个应用专用集成电路(ASIC)、数字信号处理器(DSP)、数字信号处理设备(DSPD)、可编程逻辑器件(PLD)、现场可编程门阵列(FPGA)、控制器、微控制器、微处理器或其他电子元件实现,用于执行上述移动网络接入认证方法。
在示例性实施例中,还提供了一种包括指令的非临时性计算机可读存储介质,例如包括指令的存储器104,上述指令可由区块链节点100的处理器120执行以完成上述移动网络接入认证方法。例如,所述非临时性计算机可读存储介质可以是ROM、随机存取存储器(RAM)、CD-ROM、磁带、软盘和光数据存储设备等。
以上所述,仅为本发明的具体实施方式,但本发明的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本发明揭露的技术范围内,可轻易想到的变化或替换,都应涵盖在本发明的保护范围之内。因此,本发明的保护范围应以权利要求的保护范围为准。

Claims (22)

  1. 一种移动网络接入认证方法,其特征在于,所述方法应用于认证服务器,所述认证服务器是区块链网络中的节点,所述方法包括:
    接收用户设备发送的认证请求,所述认证请求包括第一区块链地址以及身份信息;
    根据所述第一区块链地址查询所述区块链,确定所述区块链是否存储与所述身份信息相符的身份验证信息,其中,移动网络的支持系统在用户设备注册时,将用户设备的身份验证信息写入区块链中,若所述区块链中存储有与所述身份信息相符的身份验证信息,则表明所述身份信息表示的目标用户设备已在移动网络注册;
    在所述区块链中存储有与所述身份信息相符的身份验证信息时,基于认证算法对所述用户设备进行认证,其中,若认证成功,则表明所述用户设备为所述身份信息表示的目标用户设备。
  2. 根据权利要求1所述的方法,其特征在于,所述基于认证算法对所述用户设备进行认证,包括:
    基于非对称加密算法与所述用户设备进行双向认证。
  3. 根据权利要求1所述的方法,其特征在于,所述身份验证信息包括一公钥,所述基于认证算法对所述用户设备进行认证,包括:
    向所述用户设备发送第一认证挑战,所述第一认证挑战包括第一随机数;
    接收所述用户设备发送的第一认证挑战响应,所述第一认证挑战响应包括第一签名信息,其中,所述第一签名信息是所述用户设备的私钥签名所述第一随机数得到的;
    根据所述第一公钥对所述第一签名信息进行签名验证,其中,若签名验证成功则表明所述用户设备为所述身份信息表示的目标用户设备。
  4. 根据权利要求1所述的方法,其特征在于,所述认证请求还包括第二随机数;
    所述方法还包括:
    根据所述认证服务器的私钥对所述第二随机数进行签名,得到第二签名信息;
    将包括所述第二签名信息以及所述认证服务器的第二区块链地址的第二认证挑战响应发送给所述用户设备,所述第二区块链地址用于所述用户设备从所述区块链中查询公钥对所述第二签名信息进行签名验证,其中,所述认证服务器的公钥是所述支持系统写入所述区块链中的。
  5. 根据权利要求1-4中任一项所述的方法,其特征在于,所述方法还包括:
    在确认所述区块链中不存在与所述用户设备的身份信息相符的身份验证信息或者所述区块链中存储的与所述用户设备的身份信息相符的身份验证信息无效时,拒绝响应所述认证请求。
  6. 一种移动网络接入认证方法,其特征在于,所述方法应用于用户设备,所述用户设备是区块链网络中的节点,所述方法包括:
    向认证服务器发送认证请求,所述认证请求包括第一区块链地址以及身份信息,所述第一区块链地址和所述身份信息用于所述认证服务器确认所述身份信息表示的目标用户设备是否已在移动网络注册;
    在确认所述身份信息表示的目标用户设备已在所述移动网络注册后,基于认证算法与所述认证服务器完成对所述用户设备的身份认证,其中,若认证成功,则表明所述用户设备为所述身份信息表示的目标用户设备。
  7. 根据权利要求6所述的方法,其特征在于,所述基于认证算法与所述认证服务器完成对所述用户设备的身份认证,包括:
    接收所述认证服务器发送的第一认证挑战,所述第一认证挑战包括第一随机数;
    根据所述用户设备的私钥对所述第一随机数进行签名,得到第一签名信息;
    将包括所述第一签名信息的第一认证挑战响应发送给所述认证服务器,其中,所述第一签名信息用于所述认证服务器对所述用户设备进行认证。
  8. 根据权利要求7所述的方法,其特征在于,所述认证请求还包括第二随机数;
    所述方法还包括:
    接收所述认证服务器发送的第二认证挑战响应,所述第二认证挑战响应包括第二签名信息以及所述认证服务器的第二区块链地址,其中,所述第二签名信息是所述认证服务器的私钥签名所述第二随机数得到的;
    根据所述第二区块链地址从所述区块链中查询所述认证服务器的公钥并对所述第二签名信息进行签名验证,其中,若签名验证成功则表明所述认证服务器合法。
  9. 根据权利要求6-8中任一项所述的方法,其特征在于,在所述向认证服务器发送认证请求之前,所述方法还包括:
    向移动网络的支持系统发送注册请求,所述注册请求包括所述用户设备 的身份验证信息,其中,所述支持系统是区块链网络中的节点;
    接收所述支持系统发送的所述区块链的启动节点信息,所述启动节点信息用于所述用户设备基于区块链协议接入区块链网络。
  10. 一种移动网络接入认证装置,其特征在于,所述装置应用于认证服务器,所述认证服务器是区块链网络中的节点,所述装置包括:第一接收模块,用于接收用户设备发送的认证请求,所述认证请求包括第一区块链地址以及身份信息;查询模块,用于根据所述第一区块链地址查询所述区块链,确定所述区块链是否存储与所述身份信息相符的身份验证信息,其中,移动网络的支持系统在用户设备注册时,将用户设备的身份验证信息写入区块链中,若所述区块链中存储有与所述身份信息相符的身份验证信息,则表明所述身份信息表示的目标用户设备已在移动网络注册;
    第一认证模块,用于在所述区块链中存储有与所述身份信息相符的身份验证信息时,基于认证算法对所述用户设备进行认证,其中,若认证成功,则表明所述用户设备为所述身份信息表示的目标用户设备。
  11. 根据权利要求10所述的装置,其特征在于,所述第一认证模块包括:
    第一认证子模块,用于基于非对称加密算法与所述用户设备进行双向认证。
  12. 根据权利要求10所述的装置,其特征在于,所述身份验证信息包括第一公钥,所述第一认证模块包括:
    第一发送子模块,用于向所述用户设备发送第一认证挑战,所述第一认证挑战包括第一随机数;
    第一接收子模块,用于接收所述用户设备发送的第一认证挑战响应,所述第一认证挑战响应包括第一签名信息,其中,所述第一签名信息是所述用户设备的私钥签名所述第一随机数得到的;
    第一签名验证子模块,用于根据所述第一公钥对所述第一签名信息进行签名验证,其中,若签名验证成功则表明所述用户设备为所述身份信息表示的目标用户设备。
  13. 根据权利要求10所述的装置,其特征在于,所述认证请求还包括第二随机数;
    所述装置还包括:
    第一签名模块,用于根据所述认证服务器的私钥对所述第二随机数进行签名,得到第二签名信息;
    第一发送模块,用于将包括所述第二签名信息以及所述认证服务器的第 二区块链地址的第二认证挑战响应发送给所述用户设备,所述第二区块链地址用于所述用户设备从所述区块链中查询公钥对所述第二签名信息进行验证,其中,所述认证服务器的公钥是所述支持系统写入所述区块链中的。
  14. 根据权利要求10-13中任一项所述的装置,其特征在于,所述装置还包括:
    拒绝响应模块,用于在确认所述区块链中不存在与所述用户设备的身份信息相符的身份验证信息或者所述区块链中存储的与所述用户设备的身份信息相符的身份验证信息无效时,拒绝响应所述认证请求。
  15. 一种移动网络接入认证装置,其特征在于,所述装置应用于用户设备,所述用户设备是区块链网络中的节点,所述装置包括:
    第二发送模块,用于向认证服务器发送认证请求,所述认证请求包括第一区块链地址以及身份信息,所述第一区块链地址和所述身份信息用于所述认证服务器确认所述身份信息表示的目标用户设备是否已在移动网络注册;
    第二认证模块,用于在确认所述身份信息表示的目标用户设备已在所述移动网络注册后,基于认证算法与所述认证服务器完成对所述用户设备的身份认证,其中,若认证成功,则表明所述用户设备为所述身份信息表示的目标用户设备。
  16. 根据权利要求15所述的装置,其特征在于,所述第二认证模块包括:
    第二接收子模块,用于接收所述认证服务器发送的第一认证挑战,所述第一认证挑战包括第一随机数;
    第一签名子模块,用于根据所述用户设备的私钥对所述第一随机数进行签名,得到第一签名信息;
    第二发送子模块,用于将包括所述第一签名信息的第一认证挑战响应发送给所述认证服务器,其中,所述第一签名信息用于所述认证服务器对所述用户设备进行认证。
  17. 根据权利要求16所述的装置,其特征在于,所述认证请求还包括第二随机数;
    所述装置还包括:
    第二接收模块,用于接收所述认证服务器发送的第二认证挑战响应,所述第二认证挑战响应包括第二签名信息以及所述认证服务器的第二区块链地址,其中,所述第二签名信息是所述认证服务器的私钥签名所述第二随机数得到的;
    第一签名验证模块,用于根据所述第二区块链地址从所述区块链中查询 所述认证服务器的公钥并对所述第二签名信息进行签名验证,其中,若签名验证成功则表明所述认证服务器合法。
  18. 根据权利要求15-17中任一项所述的装置,其特征在于,所述装置还包括:
    第三发送模块,用于向移动网络的支持系统发送注册请求,所述注册请求包括所述用户设备的身份验证信息,其中,所述支持系统是区块链网络中的节点;
    第二接收模块,用于接收所述支持系统发送的所述区块链的启动节点信息,所述启动节点信息用于所述用户设备基于区块链协议接入区块链网络。
  19. 一种非临时性计算机可读存储介质,其特征在于,所述非临时性计算机可读存储介质中包括一个或多个程序,所述一个或多个程序用于执行权利要求1-5中任一项所述的方法。
  20. 一种区块链节点,其特征在于,包括:
    权利要求19所述的非临时性计算机可读存储介质;以及
    一个或者多个处理器,用于执行所述非临时性计算机可读存储介质中的程序。
  21. 一种非临时性计算机可读存储介质,其特征在于,所述非临时性计算机可读存储介质中包括一个或多个程序,所述一个或多个程序用于执行权利要求6-9中任一项所述的方法。
  22. 一种区块链节点,其特征在于,包括:
    权利要求21所述的非临时性计算机可读存储介质;以及
    一个或者多个处理器,用于执行所述非临时性计算机可读存储介质中的程序。
PCT/CN2017/114072 2017-11-30 2017-11-30 移动网络接入认证方法、装置、存储介质及区块链节点 WO2019104690A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2017/114072 WO2019104690A1 (zh) 2017-11-30 2017-11-30 移动网络接入认证方法、装置、存储介质及区块链节点
CN201780006171.7A CN108702622A (zh) 2017-11-30 2017-11-30 移动网络接入认证方法、装置、存储介质及区块链节点

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/114072 WO2019104690A1 (zh) 2017-11-30 2017-11-30 移动网络接入认证方法、装置、存储介质及区块链节点

Publications (1)

Publication Number Publication Date
WO2019104690A1 true WO2019104690A1 (zh) 2019-06-06

Family

ID=63844103

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/114072 WO2019104690A1 (zh) 2017-11-30 2017-11-30 移动网络接入认证方法、装置、存储介质及区块链节点

Country Status (2)

Country Link
CN (1) CN108702622A (zh)
WO (1) WO2019104690A1 (zh)

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110347750A (zh) * 2019-06-28 2019-10-18 阿里巴巴集团控股有限公司 基于区块链的数据处理方法和装置
CN110445627A (zh) * 2019-08-12 2019-11-12 腾讯科技(深圳)有限公司 群组更新方法、装置、计算机设备以及计算机存储介质
CN111132149A (zh) * 2019-12-30 2020-05-08 全链通有限公司 5g用户终端的注册方法、用户终端设备及介质
CN111225001A (zh) * 2020-03-12 2020-06-02 北京跨联元焕网络科技有限公司 区块链去中心化通讯方法、电子设备及系统
CN111461752A (zh) * 2020-04-04 2020-07-28 上海健康医学院 一种基于区块链的盆底医用耗材验证方法及盆底康复设备
CN111818087A (zh) * 2020-07-27 2020-10-23 深圳壹账通智能科技有限公司 区块链的节点接入方法、装置、设备及可读存储介质
CN112162984A (zh) * 2020-09-28 2021-01-01 彩讯科技股份有限公司 一种基于区块链的实名认证方法、系统、设备和存储介质
CN112188494A (zh) * 2020-10-22 2021-01-05 中国联合网络通信集团有限公司 基于区块链网络的终端接入方法、装置和微基站
CN112446784A (zh) * 2019-09-03 2021-03-05 上海唯链信息科技有限公司 一种区块链交易验证的方法及相关装置
CN112822687A (zh) * 2020-12-31 2021-05-18 山西特信环宇信息技术有限公司 一种锥体区块链移动终端认证方法
CN112968893A (zh) * 2021-02-20 2021-06-15 中国联合网络通信集团有限公司 一种终端设备的接入控制方法及装置
CN113271294A (zh) * 2021-04-25 2021-08-17 深圳前海华兆新能源有限公司 基于区块链技术的边缘计算网关身份认证方法
CN114710317A (zh) * 2022-03-02 2022-07-05 北京邮电大学 基于区块链的身份认证方法、装置以及存储介质
CN114765551A (zh) * 2021-01-04 2022-07-19 中国移动通信有限公司研究院 基于区块链的sdp访问控制方法及装置
CN114979193A (zh) * 2021-05-06 2022-08-30 中移互联网有限公司 一种车联网的数据处理方法、装置及电子设备
CN116644401A (zh) * 2023-07-21 2023-08-25 山东知临信息技术有限责任公司 一种基于区块链技术的身份验证方法、装置、设备及介质
US12003957B2 (en) 2018-10-04 2024-06-04 Google Llc Distributed network cellular identity management

Families Citing this family (49)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109168156B (zh) * 2018-11-01 2021-06-29 中国联合网络通信集团有限公司 一种虚拟sim卡的实现方法、系统、介质、计算机程序产品及服务器
CN111224804B (zh) * 2018-11-26 2022-12-09 中国移动通信集团辽宁有限公司 物联网设备的初始化方法、装置、物联网设备及存储介质
CN111294323B (zh) * 2018-12-10 2022-01-18 成都高新信息技术研究院 一种去中心化移动用户识别方法与系统
CN112513853A (zh) * 2018-12-11 2021-03-16 松下电器(美国)知识产权公司 数据管理方法、数据管理系统及程序
CN109886036B (zh) * 2019-01-02 2020-12-01 广州大学 基于区块链的域名分布式认证方法、装置及区块链网络
CN111405607B (zh) * 2019-01-02 2023-05-09 中国移动通信有限公司研究院 一种网络切换方法、设备及区块链系统
CN109492380B (zh) * 2019-01-11 2021-04-02 四川虹微技术有限公司 一种设备认证方法、装置及区块链节点
CN109862006A (zh) * 2019-01-29 2019-06-07 济南浪潮高新科技投资发展有限公司 一种区块链系统接入方法、装置及系统
CN109981305B (zh) * 2019-03-19 2021-01-01 全链通有限公司 群组通信方法、设备及计算机可读存储介质
CN109981675B (zh) * 2019-04-04 2021-10-26 西安电子科技大学 一种数字身份认证和属性加密的身份信息保护方法
CN109981680B (zh) * 2019-04-08 2021-08-24 上海人行道网络信息技术有限公司 一种访问控制实现方法、装置、计算机设备及存储介质
CN109995791B (zh) * 2019-04-11 2020-11-03 清华大学 一种数据授权方法及系统
CN110048842B (zh) * 2019-05-30 2021-09-10 全链通有限公司 会话密钥处理方法、设备及计算机可读存储介质
CN110048843B (zh) * 2019-05-30 2021-09-10 全链通有限公司 会话密钥传输方法、设备及计算机可读存储介质
CN110176994A (zh) * 2019-05-30 2019-08-27 全链通有限公司 基于联盟区块链的会话密钥分发方法、设备及存储介质
CN110225011B (zh) * 2019-05-30 2021-07-13 全链通有限公司 用户节点的认证方法、设备及计算机可读存储介质
CN110138558B (zh) * 2019-05-30 2021-09-10 全链通有限公司 会话密钥的传输方法、设备及计算机可读存储介质
CN110351364B (zh) * 2019-07-12 2021-09-10 全链通有限公司 数据存储方法、设备及计算机可读存储介质
CN110572819B (zh) * 2019-07-27 2023-03-24 中国人民解放军战略支援部队信息工程大学 基于区块链的多域无线Mesh网络跨域认证方法及系统
CN112333131B (zh) * 2019-08-05 2023-04-18 北京京东振世信息技术有限公司 一种服务提供方法、区块链网络服务系统及存储介质
CN110599653B (zh) * 2019-09-11 2022-02-11 腾讯科技(深圳)有限公司 一种门禁解锁方法、设备及存储介质
CN110611679A (zh) * 2019-09-25 2019-12-24 杭州港盛软件科技有限公司 一种数据传输方法、装置、设备及系统
CN110661812A (zh) * 2019-10-10 2020-01-07 国网山东省电力公司信息通信公司 一种基于区块链的级联认证系统
CN110602150B (zh) * 2019-10-16 2021-11-16 超越科技股份有限公司 一种sdn节点间可信认证方法
CN110730450B (zh) * 2019-10-18 2023-03-24 中国联合网络通信集团有限公司 一种移动通信方法及系统
CN111163466B (zh) * 2019-12-30 2022-12-16 全链通有限公司 5g用户终端接入区块链的方法、用户终端设备及介质
CN114143041A (zh) * 2020-03-03 2022-03-04 支付宝实验室(新加坡)有限公司 基于区块链的身份校验方法、装置、设备及存储介质
CN111385755B (zh) * 2020-03-18 2021-12-03 成都西加云杉科技有限公司 一种带宽资源共享方法、装置、设备及可读存储介质
CN113572717B (zh) * 2020-04-29 2024-02-20 青岛海尔洗涤电器有限公司 通信连接的建立方法、洗护设备及服务器
CN111526154A (zh) * 2020-04-30 2020-08-11 余伟霞 一种基于区块链网络的业务数据共享系统
CN111586686B (zh) * 2020-05-14 2022-08-09 中国联合网络通信集团有限公司 一种网络接入认证的方法和系统
CN111935075A (zh) * 2020-06-23 2020-11-13 浪潮云信息技术股份公司 一种基于区块链的数字身份签发方法、设备及介质
CN114024692B (zh) * 2020-07-15 2023-06-20 华为技术有限公司 签约方法、装置及系统
CN111914230B (zh) * 2020-07-17 2023-06-23 中国联合网络通信集团有限公司 基于区块链的身份验证方法、系统、终端设备及存储介质
CN114124418B (zh) * 2020-08-27 2023-11-21 中国移动通信集团河南有限公司 一种基于区块链的数据处理方法、装置、系统及电子设备
CN111970691B (zh) * 2020-08-28 2022-02-01 北京邮电大学 设备认证接入方法、装置、设备及计算机可读存储介质
CN112183781B (zh) * 2020-09-28 2024-06-21 日立楼宇技术(广州)有限公司 电梯维保人员的认证方法、装置、计算机设备和存储介质
CN112291064B (zh) * 2020-10-10 2022-08-30 达闼机器人股份有限公司 认证系统,注册及认证方法、装置,存储介质及电子设备
CN114520977A (zh) * 2020-11-20 2022-05-20 中国联合网络通信集团有限公司 路由器认证方法、装置及存储介质
CN112512048B (zh) * 2020-11-27 2022-07-12 达闼机器人股份有限公司 移动网络接入系统、方法、存储介质及电子设备
CN112506267B (zh) * 2020-12-01 2024-04-19 上海银基信息安全技术股份有限公司 一种rtc校准方法、车载终端、用户端和存储介质
CN114697061B (zh) * 2020-12-29 2023-05-09 中国移动通信有限公司研究院 接入控制方法、装置、网络侧设备、终端及区块链节点
CN115225428B (zh) * 2021-06-29 2023-10-13 达闼机器人股份有限公司 机器人认证系统及方法
CN115242418A (zh) * 2021-06-29 2022-10-25 达闼机器人股份有限公司 机器人认证系统及方法
CN115250192A (zh) * 2021-06-29 2022-10-28 达闼机器人股份有限公司 机器人网络认证系统及方法
CN113904774A (zh) * 2021-08-27 2022-01-07 重庆小雨点小额贷款有限公司 一种区块链地址认证方法、装置及计算机设备
CN114040143B (zh) * 2021-11-15 2024-04-05 百视通网络电视技术发展有限责任公司 一种用于iptv服务管理的方法、系统及设备
CN114286342B (zh) * 2021-12-20 2024-01-02 中国电信股份有限公司 认证方法、系统、电子设备和计算机可读存储介质
CN115361390B (zh) * 2022-10-21 2023-01-20 中国信息通信研究院 用于加入区块链网络的方法、计算机存储介质及电子设备

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106453271A (zh) * 2016-09-21 2017-02-22 江苏通付盾科技有限公司 身份注册方法及系统、身份认证方法及系统
CN106533696A (zh) * 2016-11-18 2017-03-22 江苏通付盾科技有限公司 基于区块链的身份认证方法、认证服务器及用户终端
CN107079037A (zh) * 2016-09-18 2017-08-18 深圳前海达闼云端智能科技有限公司 基于区块链的身份认证方法、装置、节点及系统
CN107079036A (zh) * 2016-12-23 2017-08-18 深圳前海达闼云端智能科技有限公司 注册及授权方法、装置及系统
US20170243213A1 (en) * 2016-02-22 2017-08-24 Bank Of America Corporation System to enable contactless access to a transaction terminal using a process data network
CN107147489A (zh) * 2017-05-02 2017-09-08 南京理工大学 一种leo卫星网络内分布式的接入认证管理方法

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106357640B (zh) * 2016-09-18 2019-11-08 江苏通付盾科技有限公司 基于区块链网络的身份认证方法、系统及服务器
CN107181765A (zh) * 2017-07-25 2017-09-19 光载无限(北京)科技有限公司 基于区块链技术的网络数字身份认证方法

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170243213A1 (en) * 2016-02-22 2017-08-24 Bank Of America Corporation System to enable contactless access to a transaction terminal using a process data network
CN107079037A (zh) * 2016-09-18 2017-08-18 深圳前海达闼云端智能科技有限公司 基于区块链的身份认证方法、装置、节点及系统
CN106453271A (zh) * 2016-09-21 2017-02-22 江苏通付盾科技有限公司 身份注册方法及系统、身份认证方法及系统
CN106533696A (zh) * 2016-11-18 2017-03-22 江苏通付盾科技有限公司 基于区块链的身份认证方法、认证服务器及用户终端
CN107079036A (zh) * 2016-12-23 2017-08-18 深圳前海达闼云端智能科技有限公司 注册及授权方法、装置及系统
CN107147489A (zh) * 2017-05-02 2017-09-08 南京理工大学 一种leo卫星网络内分布式的接入认证管理方法

Cited By (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US12003957B2 (en) 2018-10-04 2024-06-04 Google Llc Distributed network cellular identity management
CN110347750A (zh) * 2019-06-28 2019-10-18 阿里巴巴集团控股有限公司 基于区块链的数据处理方法和装置
CN110347750B (zh) * 2019-06-28 2023-06-13 创新先进技术有限公司 基于区块链的数据处理方法和装置
CN110445627B (zh) * 2019-08-12 2021-10-26 腾讯科技(深圳)有限公司 群组更新方法、装置、计算机设备以及计算机存储介质
CN110445627A (zh) * 2019-08-12 2019-11-12 腾讯科技(深圳)有限公司 群组更新方法、装置、计算机设备以及计算机存储介质
CN112446784A (zh) * 2019-09-03 2021-03-05 上海唯链信息科技有限公司 一种区块链交易验证的方法及相关装置
CN111132149A (zh) * 2019-12-30 2020-05-08 全链通有限公司 5g用户终端的注册方法、用户终端设备及介质
CN111132149B (zh) * 2019-12-30 2023-11-21 全链通有限公司 5g用户终端的注册方法、用户终端设备及介质
CN111225001A (zh) * 2020-03-12 2020-06-02 北京跨联元焕网络科技有限公司 区块链去中心化通讯方法、电子设备及系统
CN111461752A (zh) * 2020-04-04 2020-07-28 上海健康医学院 一种基于区块链的盆底医用耗材验证方法及盆底康复设备
CN111818087A (zh) * 2020-07-27 2020-10-23 深圳壹账通智能科技有限公司 区块链的节点接入方法、装置、设备及可读存储介质
CN112162984A (zh) * 2020-09-28 2021-01-01 彩讯科技股份有限公司 一种基于区块链的实名认证方法、系统、设备和存储介质
CN112188494A (zh) * 2020-10-22 2021-01-05 中国联合网络通信集团有限公司 基于区块链网络的终端接入方法、装置和微基站
CN112188494B (zh) * 2020-10-22 2023-06-27 中国联合网络通信集团有限公司 基于区块链网络的终端接入方法、装置和微基站
CN112822687B (zh) * 2020-12-31 2023-03-24 山西特信环宇信息技术有限公司 一种锥体区块链移动终端认证方法
CN112822687A (zh) * 2020-12-31 2021-05-18 山西特信环宇信息技术有限公司 一种锥体区块链移动终端认证方法
CN114765551B (zh) * 2021-01-04 2023-10-27 中国移动通信有限公司研究院 基于区块链的sdp访问控制方法及装置
CN114765551A (zh) * 2021-01-04 2022-07-19 中国移动通信有限公司研究院 基于区块链的sdp访问控制方法及装置
CN112968893A (zh) * 2021-02-20 2021-06-15 中国联合网络通信集团有限公司 一种终端设备的接入控制方法及装置
CN113271294A (zh) * 2021-04-25 2021-08-17 深圳前海华兆新能源有限公司 基于区块链技术的边缘计算网关身份认证方法
CN114979193A (zh) * 2021-05-06 2022-08-30 中移互联网有限公司 一种车联网的数据处理方法、装置及电子设备
CN114979193B (zh) * 2021-05-06 2023-07-21 中移互联网有限公司 一种车联网的数据处理方法、装置、电子设备及计算机可读存储介质
CN114710317A (zh) * 2022-03-02 2022-07-05 北京邮电大学 基于区块链的身份认证方法、装置以及存储介质
CN116644401B (zh) * 2023-07-21 2023-10-20 山东知临信息技术有限责任公司 一种基于区块链技术的身份验证方法、装置、设备及介质
CN116644401A (zh) * 2023-07-21 2023-08-25 山东知临信息技术有限责任公司 一种基于区块链技术的身份验证方法、装置、设备及介质

Also Published As

Publication number Publication date
CN108702622A (zh) 2018-10-23

Similar Documents

Publication Publication Date Title
WO2019104690A1 (zh) 移动网络接入认证方法、装置、存储介质及区块链节点
KR102032857B1 (ko) 모바일 디바이스에서의 사용자 인증 및 인간 의도 검증을 위한 방법 및 장치
EP3657370B1 (en) Methods and devices for authenticating smart card
KR101793443B1 (ko) 스마트 기기의 관리 계정 설정 방법, 장치, 프로그램 및 저장매체
US9819652B2 (en) Information interaction methods and devices
US10917790B2 (en) Server trust evaluation based authentication
US20170163626A1 (en) Method and device for network access of a smart terminal device
WO2016155306A1 (zh) 网络接入方法及装置
US20200280550A1 (en) System and method for endorsing a new authenticator
WO2019047066A1 (zh) 无人机接入方法及装置
US10313870B2 (en) Identity verification method and apparatus, and storage medium
WO2019028746A1 (zh) 无人机接入方法及装置
KR101642019B1 (ko) 단말기 검증방법, 장치, 프로그램 및 기록매체
EP3163834B1 (en) Method and device for equipment control
WO2021017141A1 (zh) 一种控制门禁的方法、装置及介质
CN106488450B (zh) 连接无线网络的方法及装置
CN105306567B (zh) 用于终端连接的方法及装置
CN105376399B (zh) 用于控制智能设备的方法及装置
WO2024021142A1 (zh) 应用程序接口api认证方法、装置、通信设备及存储介质
WO2024031722A1 (zh) 北向应用程序接口api调用方法及装置
WO2018137239A1 (zh) 一种鉴权方法、鉴权服务器和核心网设备
WO2024021137A1 (zh) Api调用者认证方法以及装置、通信设备及存储介质
WO2024031730A1 (zh) 授权撤销方法及装置、存储介质
CN112187771B (zh) 一种认证方法、装置和用于认证的装置
WO2023240657A1 (zh) 认证与授权方法、装置、通信设备及存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17933241

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17933241

Country of ref document: EP

Kind code of ref document: A1

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 06.10.2020)