Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication method and device and authentication server

An authentication method and an authentication device technology, which are applied in the field of network communication and can solve problems such as the inability to bind the IP address of a public computer

Active Publication Date: 2018-08-21
NEW H3C TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, the purpose of this application is to provide an authentication method, device and authentication server to alleviate the problem that the IP address of a public computer cannot be bound when multiple users use a public computer in the existing static IP binding mode. specific technical issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and device and authentication server
  • Authentication method and device and authentication server
  • Authentication method and device and authentication server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] According to an embodiment of the present application, an embodiment of an authentication method is provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and, although in The flowcharts show a logical order, but in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0031]In related technologies, when different users of different terminals are bound to the same IP address, IP address conflicts will result. However, for the scenario of a public computer, it is necessary to ensure that different users are bound to the same IP address before they can use the public computer. The application scenarios conflict. In the current implementation, the binding information between the authentication server generally stores the binding relationship between the user name and the IP address,...

Embodiment 2

[0056] figure 2 is a flow chart of another optional authentication method according to the embodiment of this application, such as figure 2 As shown, the method includes the following steps:

[0057] Step 102, receiving an authentication request sent by the first terminal, wherein the authentication request includes the first user name, the first IP address bound to the first user name, and the terminal identifier of the first terminal.

[0058] Step 104, judging whether the first user name exists in the bound information; wherein, if the judging result is yes, go to step 202;

[0059] Step 202, judging whether there is a binding relationship between the first user name and the first IP address in the bound information; wherein, if the judging result is yes, go to step 204; if the judging result is no, go to step 208, The first username is not allowed to stay online with the first IP address.

[0060] If the information in the bound information is as shown in at least one...

Embodiment 3

[0086] image 3 是根据本申请实施例的再一种可选地认证方法的流程图,如 image 3 所示,本实施例所提供的认证方法,包括:

[0087] 步骤102,接收第一终端发送的认证请求,其中,认证请求中包括第一用户名、第一用户名绑定的第一IP地址和第一终端的终端标识。

[0088] 步骤104,判断第一用户名是否存在于已绑定信息中,若判断结果为否,则执行步骤106;

[0089] 步骤106,判断已绑定信息中是否存在第一IP地址与第一终端的终端标识之间的绑定关系,即,判断已绑定信息中是否存在第一终端的终端标识与第一IP地址绑定的匹配项;若判断结果为否,执行步骤308;

[0090] 步骤308,判断第一IP地址是否存在于已绑定信息中,若判断结果为是,则执行步骤208;若判断结果为否,则执行步骤110;

[0091] 步骤208,不允许第一用户名采用第一IP地址保持在线;

[0092] 步骤110,允许第一用户名采用第一IP地址保持在线。

[0093] 举例来说,若已绑定信息中的信息如表7所示:

[0094] Table 7

[0095]

[0096] 若认证消息中包括:(User1、IP1、ID1),则根据步骤104确定出第一用户名User1不存在于已绑定信息中,根据步骤106确定出已绑定信息中不存在第一IP地址IP1与第一终端的终端标识ID1之间的绑定关系。由此可以确定出,此时第一IP地址已经被其他用户名采用其他终端绑定过,并且本实施例中的判断条件也不满足实施例一中所提供的确定公用机的条件,即此时ID1和ID2均可视为非公用机,若此时第一用户名User1采用IP1与ID1绑定,则会导致非公用机的IP地址冲突。因此,不允许第一用户名采User1用第一IP地址IP1保持在线。

[0097] 若已绑定信息中的信息如表8所示:

[0098] Table 8

[0099]

[0100] 当认证请求中包括(User1、IP1、ID1)时,根据步骤104可以判断出认证请求中的第一用户名不存在于已绑定信息中,此时,根据步骤106可以确定出已绑定信息中也不存在第一IP地址IP1与第一终端的终端标识ID1之间的绑定关系。此时,可以根据步骤308,判断第一IP地址IP1...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an authentication method and device and an authentication server and relates to the technical field of network communication. The method comprises the steps of receiving an authentication request sent by a first terminal, wherein the authentication request comprises a first user name, a first IP address bound with the first user name and a terminal identity of the first terminal; judging whether the first user name exists in bound information or not, and judging whether a binding relationship between the first IP addresses and the terminal identities exists in the boundinformation or not if the first user name does not exist in the bound information; and determining that the first terminal is a public machine allowed to be logged in by a plurality of user names through adoption of the same IP address if the binding relationship exists, and allowing the first terminal which is authenticated through utilization of the first user name to be online.

Description

technical field [0001] The present application relates to the technical field of network communication, in particular to an authentication method, device and authentication server. Background technique [0002] With the development of the campus network, in the new generation of campus network, software-defined network (Software Defined Network, referred to as SDN) is used to realize the intelligent control of the network equipment in the campus, so as to realize the automatic on-line of the network equipment in the campus, the automatic opening of services, and the user access A series of powerful functions such as binding, wired and wireless integration, etc. [0003] The SDN controller supports user access binding, and the binding type can be a dynamic IP address or a static IP address. The binding of a static IP address means that the user manually configures a static IP address, and after going online through access authentication (802.1x or MAC authentication), the IP...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0815H04L63/0876
Inventor 董润芝
Owner NEW H3C TECH CO LTD