Authentication method and device and authentication server
An authentication method and an authentication device technology, which are applied in the field of network communication and can solve problems such as the inability to bind the IP address of a public computer
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0030] According to an embodiment of the present application, an embodiment of an authentication method is provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and, although in The flowcharts show a logical order, but in some cases the steps shown or described may be performed in an order different from that shown or described herein.
[0031]In related technologies, when different users of different terminals are bound to the same IP address, IP address conflicts will result. However, for the scenario of a public computer, it is necessary to ensure that different users are bound to the same IP address before they can use the public computer. The application scenarios conflict. In the current implementation, the binding information between the authentication server generally stores the binding relationship between the user name and the IP address,...
Embodiment 2
[0056] figure 2 is a flow chart of another optional authentication method according to the embodiment of this application, such as figure 2 As shown, the method includes the following steps:
[0057] Step 102, receiving an authentication request sent by the first terminal, wherein the authentication request includes the first user name, the first IP address bound to the first user name, and the terminal identifier of the first terminal.
[0058] Step 104, judging whether the first user name exists in the bound information; wherein, if the judging result is yes, go to step 202;
[0059] Step 202, judging whether there is a binding relationship between the first user name and the first IP address in the bound information; wherein, if the judging result is yes, go to step 204; if the judging result is no, go to step 208, The first username is not allowed to stay online with the first IP address.
[0060] If the information in the bound information is as shown in at least one...
Embodiment 3
[0086] image 3 是根据本申请实施例的再一种可选地认证方法的流程图,如 image 3 所示,本实施例所提供的认证方法,包括:
[0087] 步骤102,接收第一终端发送的认证请求,其中,认证请求中包括第一用户名、第一用户名绑定的第一IP地址和第一终端的终端标识。
[0088] 步骤104,判断第一用户名是否存在于已绑定信息中,若判断结果为否,则执行步骤106;
[0089] 步骤106,判断已绑定信息中是否存在第一IP地址与第一终端的终端标识之间的绑定关系,即,判断已绑定信息中是否存在第一终端的终端标识与第一IP地址绑定的匹配项;若判断结果为否,执行步骤308;
[0090] 步骤308,判断第一IP地址是否存在于已绑定信息中,若判断结果为是,则执行步骤208;若判断结果为否,则执行步骤110;
[0091] 步骤208,不允许第一用户名采用第一IP地址保持在线;
[0092] 步骤110,允许第一用户名采用第一IP地址保持在线。
[0093] 举例来说,若已绑定信息中的信息如表7所示:
[0094] Table 7
[0095]
[0096] 若认证消息中包括:(User1、IP1、ID1),则根据步骤104确定出第一用户名User1不存在于已绑定信息中,根据步骤106确定出已绑定信息中不存在第一IP地址IP1与第一终端的终端标识ID1之间的绑定关系。由此可以确定出,此时第一IP地址已经被其他用户名采用其他终端绑定过,并且本实施例中的判断条件也不满足实施例一中所提供的确定公用机的条件,即此时ID1和ID2均可视为非公用机,若此时第一用户名User1采用IP1与ID1绑定,则会导致非公用机的IP地址冲突。因此,不允许第一用户名采User1用第一IP地址IP1保持在线。
[0097] 若已绑定信息中的信息如表8所示:
[0098] Table 8
[0099]
[0100] 当认证请求中包括(User1、IP1、ID1)时,根据步骤104可以判断出认证请求中的第一用户名不存在于已绑定信息中,此时,根据步骤106可以确定出已绑定信息中也不存在第一IP地址IP1与第一终端的终端标识ID1之间的绑定关系。此时,可以根据步骤308,判断第一IP地址IP1...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


