Unlock instant, AI-driven research and patent intelligence for your innovation.

Communication authentication method, device and equipment and storage medium

An authentication method and an authentication server technology, which are applied in the field of devices, communication authentication methods, equipment and storage media, and can solve problems such as difficult to meet, difficult to ensure cluster business reliability, and unable to realize multiple node docking authentication.

Active Publication Date: 2020-10-23
INSPUR SUZHOU INTELLIGENT TECH CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the current scenario where a client accesses a decentralized distributed architecture cluster based on the Kerberos protocol, it is often necessary for the client to make an authentication request to the nodes in the cluster through the authentication server (KDC) specified by the Kerberos protocol, and obtain the authentication request from the KDC. The service ticket (Service Ticket) of the feedback node, and then use the service ticket to authenticate the connection with the corresponding node in the cluster, so as to establish a communication connection with the corresponding node, but the client can only complete the connection with the obtained service ticket currently. The docking authentication of a specific node in the cluster cannot realize the docking authentication of multiple nodes in the cluster, and it is difficult to meet the business initialization requirements of the client for docking and authentication of multiple nodes in the cluster based on the Kerberos protocol in actual production scenarios, and it is difficult to ensure that the cluster business reliability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Communication authentication method, device and equipment and storage medium
  • Communication authentication method, device and equipment and storage medium
  • Communication authentication method, device and equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The following will clearly and completely describe the technical solutions in the embodiments of the present application with reference to the drawings in the embodiments of the present application. Obviously, the described embodiments are only some of the embodiments of the present application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of this application.

[0041] In the current scenario where a client accesses a decentralized distributed architecture cluster based on the Kerberos protocol, it is often necessary for the client to make an authentication request to the nodes in the cluster through the authentication server (KDC) specified by the Kerberos protocol, and obtain the authentication request from the KDC. The service ticket (Service Ticket) of the feedback node, and then use the service ticket to authenticate...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a communication authentication method, device and equipment and a storage medium. The method comprises the following steps: acquiring a service bill obtained by converting a target service account by an authentication server based on a Kerberos protocol; sending the service bill to a cluster node in the decentralized distributed architecture cluster so as to authenticate atarget service account corresponding to the service bill based on a local user account through the cluster node, wherein each cluster node in the decentralized distributed architecture cluster is configured with the same user account. According to the method, the service initialization requirement that the client carries out butt joint authentication on the multiple nodes in the cluster based on the Kerberos protocol in the actual production scene can be met, and the reliability of cluster services is relatively ensured. In addition, the invention further provides a communication authentication device and equipment and a storage medium, and the beneficial effects are the same as described above.

Description

technical field [0001] The present application relates to the field of data communication, in particular to a communication authentication method, device, equipment and storage medium. Background technique [0002] Kerberos is a computer network authorization protocol used to authenticate personal communications in a secure manner in a non-secure network. The realization of the authentication process does not depend on the authentication of the host operating system, does not require trust based on the host address, does not require the physical security of all hosts on the network, and assumes that the data packets transmitted on the network can be read, modified and inserted arbitrarily. . In the above cases, Kerberos, as a trusted third-party authentication service, performs authentication services through traditional cryptographic techniques (such as shared keys). [0003] In the current scenario where a client accesses a decentralized distributed architecture cluster ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
CPCH04L9/3213H04L63/0807
Inventor 张庆伟侯满
Owner INSPUR SUZHOU INTELLIGENT TECH CO LTD