Unlock instant, AI-driven research and patent intelligence for your innovation.

Communication authentication method, device, equipment and storage medium

An authentication method and authentication server technology, applied in communication authentication methods, equipment, storage media, and device fields, can solve problems such as difficult to meet, unable to realize multi-node docking authentication, difficult to ensure cluster business reliability, etc., to ensure reliability Effect

Active Publication Date: 2021-02-23
INSPUR SUZHOU INTELLIGENT TECH CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the current scenario where the client accesses the decentralized distributed architecture cluster based on the Kerberos protocol, it is often necessary for the client to authenticate the nodes in the cluster through the authentication server (KDC) specified by the Kerberos protocol, and obtain the authentication request from the KDC. The service ticket (Service Ticket) of the feedback node, and then use the service ticket to perform docking authentication with the corresponding node in the cluster, so as to establish a communication connection with the corresponding node, but the client can only complete the connection with the obtained service ticket currently. The docking authentication of a specific node in the cluster cannot realize the docking authentication of multiple nodes in the cluster, and it is difficult to meet the business initialization requirements of the client for docking and authentication of multiple nodes in the cluster based on the Kerberos protocol in actual production scenarios, and it is difficult to ensure that the cluster business reliability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Communication authentication method, device, equipment and storage medium
  • Communication authentication method, device, equipment and storage medium
  • Communication authentication method, device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application. Obviously, the described embodiments are only a part of the embodiments of the present application, but not all of the embodiments. All other embodiments obtained by those of ordinary skill in the art based on the embodiments in the present application without creative work fall within the protection scope of the present application.

[0041] In the current scenario where the client accesses the decentralized distributed architecture cluster based on the Kerberos protocol, the client is often required to make an authentication request for the nodes in the cluster through the authentication server (KDC) specified by the Kerberos protocol, and obtain the authentication request from the KDC. The service ticket of the feedback node (Service Ticket), and then use the service ticket to...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application discloses a communication authentication method, apparatus, device and storage medium. The steps of the method include: acquiring a service ticket obtained by the authentication server converting the target service account based on the Kerberos protocol; Authenticate the target service account corresponding to the service ticket; wherein, each cluster node in the decentralized distributed architecture cluster is configured with the same user account. The method can meet the business initialization requirements of the client to authenticate multiple nodes in the cluster based on the Kerberos protocol in the actual production scenario, and relatively ensure the reliability of the cluster business. In addition, the present application also provides a communication authentication device, equipment and storage medium, the beneficial effects are the same as those described above.

Description

technical field [0001] The present application relates to the field of data communication, and in particular, to a communication authentication method, apparatus, device and storage medium. Background technique [0002] Kerberos is a computer network authorization protocol used to authenticate personal communications in a secure manner in a non-secure network. The implementation of the authentication process does not depend on the authentication of the host operating system, does not require trust based on the host address, does not require the physical security of all hosts on the network, and assumes that the data packets transmitted on the network can be arbitrarily read, modified and inserted data . In the above cases, Kerberos, as a trusted third-party authentication service, performs authentication services through traditional cryptographic techniques (such as shared keys). [0003] In the current scenario where the client accesses the decentralized distributed archi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06
CPCH04L9/3213H04L63/0807
Inventor 张庆伟侯满
Owner INSPUR SUZHOU INTELLIGENT TECH CO LTD