Nothing Special   »   [go: up one dir, main page]

CN114928840B - Identity verification method, device and storage medium - Google Patents

Identity verification method, device and storage medium Download PDF

Info

Publication number
CN114928840B
CN114928840B CN202210682640.XA CN202210682640A CN114928840B CN 114928840 B CN114928840 B CN 114928840B CN 202210682640 A CN202210682640 A CN 202210682640A CN 114928840 B CN114928840 B CN 114928840B
Authority
CN
China
Prior art keywords
cloud terminal
information
identity
cloud
identity verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210682640.XA
Other languages
Chinese (zh)
Other versions
CN114928840A (en
Inventor
李贝
刘宏嘉
刘光海
肖天
李�一
薛永备
成晨
张帆
张玮
宋春涛
朱小萌
郑雨婷
程新洲
魏汝翔
佟恬
赵伟
姚森森
王波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN202210682640.XA priority Critical patent/CN114928840B/en
Publication of CN114928840A publication Critical patent/CN114928840A/en
Application granted granted Critical
Publication of CN114928840B publication Critical patent/CN114928840B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The application provides an identity verification method, an identity verification device and a storage medium, relates to the technical field of communication, and is used for solving the technical problem of how to verify the identity of a cloud terminal when the cloud terminal is accessed to a cloud server. The identity verification method is applied to a cloud server, and the cloud server belongs to a cloud system comprising a cloud terminal and the cloud server. The identity verification method comprises the following steps: the cloud server can acquire the identity information of the cloud terminal and the login information of the cloud terminal from the identity verification request after receiving the identity verification request sent by the cloud terminal. Subsequently, the cloud server can determine an identity verification result according to the identity information and the login information and send the identity verification result to the cloud terminal. The cloud server can rapidly and accurately verify the identity of the cloud terminal.

Description

Identity verification method, device and storage medium
Technical Field
The present application relates to the field of communications technologies, and in particular, to an identity verification method, an identity verification device, and a storage medium.
Background
The cloud terminal refers to that the mobile terminal is not provided with a system and mobile phone software (application), is connected with a cloud server (virtual: network cloud, entity: server) simply through a display, performs personal identity verification by inputting user account information, then realizes communication with the cloud server through a mobile network, reads a mobile phone interface and application software customized by individuals on the cloud server, and performs information interaction communication.
Therefore, how to verify the identity of the cloud terminal when the cloud terminal accesses the cloud server is a technical problem that needs to be solved at present.
Disclosure of Invention
The application provides an identity verification method, an identity verification device and a storage medium, which are used for solving the problem that the identity of a cloud terminal cannot be verified in the prior art.
In order to achieve the above purpose, the application adopts the following technical scheme:
in a first aspect, an authentication method is provided, applied to a cloud server, where the cloud server belongs to a cloud system including a cloud terminal and a cloud server, and the authentication method includes:
receiving an identity verification request sent by a cloud terminal; the identity verification request comprises the identity information of the cloud terminal and the login information of the cloud terminal;
and determining an identity verification result according to the identity information and the login information, and sending the identity verification result to the cloud terminal.
Optionally, determining the authentication result according to the identity information and the login information includes:
when the identity information is inconsistent with the login information, a first prompt message is sent to the cloud terminal; the first prompting message is used for prompting that the identity information and the login information of the cloud terminal are inconsistent;
receiving a response message sent by the cloud terminal in response to the first prompt message;
When the response message is used for indicating that the login is successful, determining that the authentication result is authentication passing;
when the response message is used for indicating login failure, the identity verification result is determined to be failed in verification.
Optionally, when the response message is used to indicate that the login is successful, determining that the authentication result is authentication passing includes:
when the response message is used for indicating that the login is successful, temporary login information is sent to the cloud terminal;
receiving a temporary identity verification request sent by a cloud terminal; the temporary identity verification request is triggered when the cloud terminal logs in temporary login information;
and responding to the temporary identity verification request, and determining the identity verification result as verification passing.
Optionally, when the identity information is used to indicate that the cloud terminal is a registered cloud terminal, determining the identity verification result according to the identity information and the login information includes:
when the identity information is inconsistent with the login information, acquiring call ticket data corresponding to the identity information;
when the call ticket data is used for indicating that the identity information is consistent with the login information, determining that the identity verification result is verification passing;
when the call ticket data is used for indicating that the identity information is inconsistent with the login information, determining that the identity verification result is that verification fails;
And when the identity information is consistent with the login information, determining that the identity verification result is verification passing.
Optionally, when the identity information is used to indicate that the cloud terminal is a newly registered cloud terminal, determining the identity verification result according to the identity information and the login information includes:
when the identity information is consistent with the login information, determining that the identity verification result is verification passing;
and when the identity information is inconsistent with the login information, determining that the identity verification result is that verification fails.
Optionally, when the authentication result is that the authentication passes, after sending the authentication result to the cloud terminal, the method further includes:
acquiring a storage space of a cloud terminal;
when the storage space of the cloud terminal is smaller than the preset space, a second prompt message is sent to the cloud terminal; the second prompting message is used for prompting that the storage space of the cloud terminal is smaller than a preset space;
and receiving a capacity expansion message sent by the cloud terminal in response to the second prompt message, and updating the storage space of the cloud terminal.
Optionally, when the authentication result is that the authentication passes, after sending the authentication result to the cloud terminal, the method further includes:
acquiring display configuration information of a cloud terminal; the display configuration information includes: at least one of display size, display sharpness, display brightness, number of display pixels, display contrast, display color, display response time, display technology;
And updating the resource information according to the display configuration information, and sending the updated resource information to the cloud terminal.
In a second aspect, an authentication device is provided and applied to a cloud server, where the cloud server belongs to a cloud system including a cloud terminal and a cloud server, and the authentication device includes: the device comprises a receiving unit, a processing unit and a transmitting unit;
the receiving unit is used for receiving the identity verification request sent by the cloud terminal; the identity verification request comprises the identity information of the cloud terminal and the login information of the cloud terminal;
the processing unit is used for determining an identity verification result according to the identity information and the login information;
and the sending unit is used for sending the identity verification result to the cloud terminal.
Optionally, the processing unit is specifically configured to:
when the identity information is inconsistent with the login information, a first prompt message is sent to the cloud terminal; the first prompting message is used for prompting that the identity information and the login information of the cloud terminal are inconsistent;
receiving a response message sent by the cloud terminal in response to the first prompt message;
when the response message is used for indicating that the login is successful, determining that the authentication result is authentication passing;
when the response message is used for indicating login failure, the identity verification result is determined to be failed in verification.
Optionally, the processing unit is specifically configured to:
when the response message is used for indicating that the login is successful, temporary login information is sent to the cloud terminal;
receiving a temporary identity verification request sent by a cloud terminal; the temporary identity verification request is triggered when the cloud terminal logs in temporary login information;
and responding to the temporary identity verification request, and determining the identity verification result as verification passing.
Optionally, when the identity information is used to indicate that the cloud terminal is a registered cloud terminal, the processing unit is specifically configured to:
when the identity information is inconsistent with the login information, acquiring call ticket data corresponding to the identity information;
when the call ticket data is used for indicating that the identity information is consistent with the login information, determining that the identity verification result is verification passing;
when the call ticket data is used for indicating that the identity information is inconsistent with the login information, determining that the identity verification result is that verification fails;
and when the identity information is consistent with the login information, determining that the identity verification result is verification passing.
Optionally, when the identity information is used to indicate that the cloud terminal is a newly registered cloud terminal, the processing unit is specifically configured to:
when the identity information is consistent with the login information, determining that the identity verification result is verification passing;
And when the identity information is inconsistent with the login information, determining that the identity verification result is that verification fails.
Optionally, the authentication device further includes: an acquisition unit;
the acquisition unit is used for acquiring the storage space of the cloud terminal;
the sending unit is further used for sending a second prompt message to the cloud terminal when the storage space of the cloud terminal is smaller than the preset space; the second prompting message is used for prompting that the storage space of the cloud terminal is smaller than a preset space;
the receiving unit is further used for receiving the capacity expansion message sent by the cloud terminal in response to the second prompt message and updating the storage space of the cloud terminal.
Optionally, the authentication device further includes: an acquisition unit;
the acquisition unit is used for acquiring display configuration information of the cloud terminal; the display configuration information includes: at least one of display size, display sharpness, display brightness, number of display pixels, display contrast, display color, display response time, display technology;
and the sending unit is also used for updating the resource information according to the display configuration information and sending the updated resource information to the cloud terminal.
In a third aspect, there is provided an authentication device comprising a memory and a processor; the memory is used for storing computer execution instructions, and the processor is connected with the memory through a bus; when the authentication device is running, the processor executes computer-executable instructions stored in the memory to cause the authentication device to perform the authentication method according to the first aspect.
The authentication device may be a network device or may be a part of a device in a network device, such as a system-on-chip in a network device. The system on a chip is configured to support the network device to implement the functions involved in the first aspect and any one of its possible implementations, for example, to obtain, determine, and send data and/or information involved in the above-mentioned authentication method. The chip system includes a chip, and may also include other discrete devices or circuit structures.
In a fourth aspect, there is provided a computer readable storage medium comprising computer executable instructions which, when run on a computer, cause the computer to perform the authentication method of the first aspect.
In a fifth aspect, there is also provided a computer program product comprising computer instructions which, when run on an authentication device, cause the authentication device to perform the authentication method according to the first aspect described above.
It should be noted that the above-mentioned computer instructions may be stored in whole or in part on a computer-readable storage medium. The computer readable storage medium may be packaged together with the processor of the authentication device or may be packaged separately from the processor of the authentication device, which is not limited by the embodiment of the present application.
The description of the second, third, fourth and fifth aspects of the present application may refer to the detailed description of the first aspect.
In the embodiment of the present application, the names of the above-mentioned authentication apparatuses do not limit the devices or functional modules themselves, and in actual implementation, these devices or functional modules may appear under other names. For example, the receiving unit may also be referred to as a receiving module, a receiver, etc. Insofar as the function of each device or function module is similar to that of the present application, it falls within the scope of the claims of the present application and the equivalents thereof.
The technical scheme provided by the application has at least the following beneficial effects:
based on any one of the above aspects, the embodiment of the present application provides an authentication method, where after receiving an authentication request sent by a cloud terminal, a cloud server may obtain, from the authentication request, identity information of the cloud terminal and login information of the cloud terminal. Subsequently, the cloud server can determine an identity verification result according to the identity information and the login information and send the identity verification result to the cloud terminal.
Thus, the cloud server can rapidly and accurately verify the identity of the cloud terminal. The technical problem that after an APP manufacturer downloads and uses through a mobile phone terminal manufacturer on-shelf user, a communication supervision department cannot realize real-time monitoring is solved, and further, the cloud server can conduct access interaction of APP and user information in real time in a cloud system communication mode, so that effective supervision is realized. The security of user communication is improved, the user tracking analysis is conveniently realized by a communication operator and the like, and the security organization information extraction is facilitated.
The advantages of the first, second, third, fourth and fifth aspects of the present application may be referred to in the analysis of the above-mentioned advantages, and will not be described here again.
Drawings
Fig. 1 is a schematic structural diagram of a cloud system according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of a cloud server according to an embodiment of the present application;
fig. 3 is a schematic diagram of a hardware structure of an authentication device according to an embodiment of the present application;
fig. 4 is a schematic diagram of another hardware structure of the authentication device according to the embodiment of the present application;
fig. 5 is a schematic flow chart of an authentication method according to an embodiment of the present application;
fig. 6 is a second flowchart of an authentication method according to an embodiment of the present application;
fig. 7 is a flowchart of a method for authentication according to an embodiment of the present application;
fig. 8 is a flow chart diagram of an authentication method according to an embodiment of the present application;
fig. 9 is a flowchart fifth of an authentication method according to an embodiment of the present application;
fig. 10 is a flowchart of an authentication method according to an embodiment of the present application;
fig. 11 is a flow chart seventh of an authentication method according to an embodiment of the present application;
Fig. 12 is a schematic structural diagram of an authentication device according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
It should be noted that, in the embodiments of the present application, words such as "exemplary" or "such as" are used to mean serving as an example, instance, or illustration. Any embodiment or design described herein as "exemplary" or "e.g." in an embodiment should not be taken as preferred or advantageous over other embodiments or designs. Rather, the use of words such as "exemplary" or "such as" is intended to present related concepts in a concrete fashion.
In order to clearly describe the technical solution of the embodiment of the present application, in the embodiment of the present application, the words "first", "second", etc. are used to distinguish identical items or similar items having substantially the same function and effect, and those skilled in the art will understand that the words "first", "second", etc. are not limited in number and execution order.
As described in the background art, how to verify the identity of a cloud terminal when the cloud terminal accesses a cloud server is a technical problem that needs to be solved at present.
In view of the above problems, the embodiments of the present application provide an authentication method, where after receiving an authentication request sent by a cloud terminal, a cloud server may obtain, from the authentication request, identity information of the cloud terminal and login information of the cloud terminal. Subsequently, the cloud server can determine an identity verification result according to the identity information and the login information and send the identity verification result to the cloud terminal.
Thus, the cloud server can rapidly and accurately verify the identity of the cloud terminal. The technical problem that after an APP manufacturer downloads and uses through a mobile phone terminal manufacturer on-shelf user, a communication supervision department cannot realize real-time monitoring is solved, and further, the cloud server can conduct access interaction of APP and user information in real time in a cloud system communication mode, so that effective supervision is realized. The security of user communication is improved, the user tracking analysis is conveniently realized by a communication operator and the like, and the security organization information extraction is facilitated.
Secondly, the application can be improved from the two aspects of simplifying complicated authentication matching of new user purchasing machines and expanding capacity after the capacity of the cloud terminal is limited, is beneficial to a communication operator to realize digitization, industrialization and profitability transformation, and becomes an industrial chain leader of mobile communication.
The identity verification method is suitable for a cloud system. Fig. 1 shows one structure of the cloud system. As shown in fig. 1, the cloud system includes: cloud terminal 101, cloud server 102.
Wherein, the cloud terminal 101 is in communication connection with the cloud server 102.
In practical applications, the cloud terminal 101 may be connected to a plurality of cloud servers, and the cloud server 102 may be connected to a plurality of cloud terminals. For easy understanding, the present application is described by taking one cloud terminal 101 connected to one cloud server 102 as an example.
Alternatively, cloud server 102 may include an operator cloud server and an application cloud server.
Optionally, the cloud terminal 101 may install a subscriber identity module (Subscriber Identity Module, SIM) card, where the SIM card carries identity information of the subscriber. The cloud terminal 101 can realize the login of the APP only on a specific webpage or cloud software of a network cloud portal corresponding to the APP cloud server without installing an application store and the like. After a user logs in by using login information comprising a login account number and a login password, APP installation, unloading and other operations can be performed on the network cloud personal page.
Alternatively, the cloud terminal may be a device that provides voice and/or data connectivity to the user, a handheld device with wireless connectivity, or other processing device connected to a wireless modem. The wireless terminal may communicate with one or more core networks via a radio access network (radio access network, RAN). The wireless terminals may be mobile terminals such as mobile telephones (or "cellular" telephones) and computers with mobile terminals, as well as portable, pocket, hand-held, computer-built-in or car-mounted mobile devices which exchange voice and/or data with radio access networks, e.g. cell phones, tablet computers, notebook computers, netbooks, personal digital assistants (personal digital assistant, PDA).
Optionally, the operating system of the cloud server 102 in fig. 1 may call multiple accounts and multiple systems at the same time, or may create multiple nano magnetic spaces to implement fine data reading, i.e. independently control multiple cloud terminals.
Cloud server 102 may create multiple nano-cloud spaces, one for each cloud terminal. In the nano cloud space, each cloud terminal can log in an account and then install APP, use APP, delete APP, read address book, send and receive information, read, edit data, store and read data and the like. For example, when the cloud terminal 1 purchases the nano cloud space M1, the APP1 is N1, the APP2 is N2, and M1 is not less than Sigma N 1i . Wherein i is a positive integer.
The cloud server 102 is based on a network hard disk of the cloud storage space, not only can automatically synchronize files, but also can conveniently share data with other cloud terminals or backup files, and ensures the safety of the files.
In one implementation, in conjunction with fig. 1, as shown in fig. 2, cloud server 102 may be deployed with a determination unit 200 and a generation unit 201.
The determining unit 200 is configured to determine consistency of login information used by the cloud terminal 101 and identity information bound by the cloud terminal 101.
Optionally, the determining unit 200 is further configured to determine information such as a personal cloud space size of the cloud terminal, a cloud space size occupied by an APP manufacturer, and the like.
The generating unit 201 is configured to dynamically adjust network resources through a network cloud platform. Such as software expansion and deployment.
Alternatively, the cloud server 102 may be one server in a server cluster (including multiple servers), or may be a chip in the server, or may be a system on a chip in the server, or may be implemented by a virtual machine deployed on a physical machine, which is not limited in the embodiment of the present application.
The basic hardware structures of the cloud terminal 101 and the cloud server 102 in the cloud system are similar, and each includes elements included in the authentication device shown in fig. 3 or fig. 4. The hardware configuration of the cloud terminal 101 and the cloud server 102 will be described below taking the authentication apparatus shown in fig. 3 and 4 as an example.
Fig. 3 is a schematic diagram of a hardware structure of an authentication device according to an embodiment of the present application. The authentication device comprises a processor 21, a memory 22, a communication interface 23, a bus 24. The processor 21, the memory 22 and the communication interface 23 may be connected by a bus 24.
The processor 21 is a control center of the authentication device, and may be one processor or a collective term of a plurality of processing elements. For example, the processor 21 may be a general-purpose central processing unit (central processing unit, CPU), or may be another general-purpose processor. Wherein the general purpose processor may be a microprocessor or any conventional processor or the like.
As one example, processor 21 may include one or more CPUs, such as CPU 0 and CPU 1 shown in fig. 3.
Memory 22 may be, but is not limited to, a read-only memory (ROM) or other type of static storage device that can store static information and instructions, a random access memory (random access memory, RAM) or other type of dynamic storage device that can store information and instructions, or an electrically erasable programmable read-only memory (EEPROM), magnetic disk storage or other magnetic storage device, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer.
In a possible implementation, the memory 22 may exist separately from the processor 21, and the memory 22 may be connected to the processor 21 by a bus 24 for storing instructions or program code. The processor 21, when calling and executing instructions or program code stored in the memory 22, is capable of implementing the authentication method provided in the embodiments of the present application described below.
In the embodiment of the present application, the software programs stored in the memory 22 are different for the cloud terminal 101 and the cloud server 102, so that the functions implemented by the cloud terminal 101 and the cloud server 102 are different. The functions performed with respect to the respective devices will be described in connection with the following flowcharts.
In another possible implementation, the memory 22 may also be integrated with the processor 21.
A communication interface 23 for connecting the authentication means with other devices via a communication network, which may be an ethernet, a radio access network, a wireless local area network (wireless local area networks, WLAN) or the like. The communication interface 23 may include a receiving unit for receiving data, and a transmitting unit for transmitting data.
Bus 24 may be an industry standard architecture (industry standard architecture, ISA) bus, an external device interconnect (peripheral component interconnect, PCI) bus, or an extended industry standard architecture (extended industry standard architecture, EISA) bus, among others. The bus may be classified as an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown in fig. 3, but not only one bus or one type of bus.
Fig. 4 shows another hardware configuration of the authentication device in the embodiment of the present application. As shown in fig. 4, the authentication device may comprise a processor 31 and a communication interface 32. The processor 31 is coupled to a communication interface 32.
The function of the processor 31 may be as described above with reference to the processor 21. The processor 31 has a memory function, and can realize the function of the memory 22.
The communication interface 32 is used to provide data to the processor 31. The communication interface 32 may be an internal interface of the authentication device or an external interface of the authentication device (corresponding to the communication interface 23).
It is noted that the structure shown in fig. 3 (or fig. 4) does not constitute a limitation of the authentication device, and the authentication device may include more or less components than those shown in fig. 3 (or fig. 4), or may combine some components, or may be arranged differently.
The identity verification method provided by the embodiment of the application is described in detail below with reference to the accompanying drawings.
As shown in fig. 5, the identity verification method provided by the embodiment of the present application is applied to the cloud server 102 shown in fig. 1. The identity verification method comprises the following steps: S501-S503.
S501, the cloud server receives an identity verification request sent by the cloud terminal.
The identity verification request comprises identity information of the cloud terminal and login information of the cloud terminal.
Alternatively, the identity information of the cloud terminal may be identity information for representing a user holding the cloud terminal. That is, the identity information may be identity information carried in a SIM card of the cloud terminal.
For example, the identity information of the cloud terminal may be a card number of a SIM card registered by a user holding the cloud terminal. The SIM card can be bound with an identity card number of a user holding the cloud terminal.
Optionally, the identity information of the cloud terminal may also be information such as a mobile phone number corresponding to the SIM card, which is not limited in the present application.
Optionally, the login information of the cloud terminal may be a login account and a login password that the cloud terminal registers when applying for the service provided by the cloud server.
In one implementation manner, when the cloud terminal logs in, a corresponding login account and a login password need to be input. In this case, the cloud terminal may send an authentication request including the login account and the login password to the cloud server. In addition, when the cloud terminal sends an identity verification request to the cloud server, identity information of the cloud terminal is carried.
S502, the cloud server determines an identity verification result according to the identity information and the login information.
Specifically, after receiving an authentication request sent by a cloud terminal, the cloud server may obtain, from the authentication request, identity information of the cloud terminal and login information of the cloud terminal. Then, the cloud server can determine an identity verification result according to the identity information and the login information.
S503, the cloud server sends an identity verification result to the cloud terminal.
In one implementation manner, referring to fig. 5, as shown in fig. 6, in S502, the method for determining, by the cloud server, an authentication result according to the identity information and the login information specifically includes:
And S601, when the identity information and the login information are inconsistent, the cloud server sends a first prompt message to the cloud terminal.
The first prompting message is used for prompting that identity information and login information of the cloud terminal are inconsistent.
Specifically, when the identity information and the login information are inconsistent, it is indicated that the user may replace a new cloud terminal, or the cloud terminal commonly used by the user is lost, forgotten to carry, and the like, and the cloud terminal of the other user needs to be temporarily used for login. In this case, the cloud server may send a first prompting message to the cloud terminal, thereby prompting the user whether to continue to log in to the cloud server using the current cloud terminal.
S602, the cloud server receives a response message sent by the cloud terminal in response to the first prompt message.
After receiving the first prompt message sent by the cloud server, the cloud terminal can display the first prompt message on a display interface of the cloud terminal.
When the user determines to continue logging in the cloud server by using the current cloud terminal, the operation of continuing logging in can be executed on the current prompt message. And the cloud terminal responds to the operation executed by the user and sends a response message for indicating successful login to the cloud server. The cloud server executes S603.
Accordingly, when the user determines that the current cloud terminal is not used for logging in the cloud server, the operation of not continuing logging in can be performed on the current prompt message. And the cloud terminal responds to the operation executed by the user and sends a response message for indicating login failure to the cloud server. The cloud server executes S604.
The cloud terminal may display a trigger control for continuing to log in when the display interface of the cloud terminal displays the first prompt message. The display form of the trigger control for continuing to log in may be a prompt box of yes. The display form of the trigger control that does not continue logging in may be a prompt box of no. In this case, when the user determines to continue logging in to the cloud server using the current cloud terminal, a trigger operation may be performed on the prompt box of yes. Correspondingly, when the user determines that the current cloud terminal is not used for logging in the cloud server, a trigger operation can be executed on a no prompt box.
Alternatively, the triggering operation may be a click operation, a slide operation, or the like.
And S603, when the response message is used for indicating that the login is successful, the cloud server determines that the authentication result is authentication passing.
And S604, when the response message is used for indicating login failure, the cloud server determines that the authentication result is that the authentication fails.
In one implementation manner, referring to fig. 6, as shown in fig. 7, in S603, when the response message is used to indicate that the login is successful, the method for determining that the authentication result is that the authentication is passed by the cloud server specifically includes:
and S701, when the response message is used for indicating that the login is successful, the cloud server sends temporary login information to the cloud terminal.
Specifically, when the response message is used for indicating that the login is successful, the cloud server may send temporary login information to the cloud terminal, so that the cloud terminal may log in to the cloud server through the temporary login information.
Optionally, when the user confirms that the login is performed according to the temporary login information, the application layer carries the temporary login information of the user after the login, and carries the temporary login information and the identity information in layer 3.
S702, the cloud server receives a temporary identity verification request sent by the cloud terminal.
The temporary identity verification request is triggered when the cloud terminal logs in temporary login information.
S703, the cloud server responds to the temporary identity verification request, and the identity verification result is determined to pass verification.
In this way, the cloud server can distinguish common login information and temporary login information of the cloud terminal, and further distinguish logged-in users through the temporary login information.
In one implementation manner, referring to fig. 5, as shown in fig. 8, in S502, when the identity information is used to indicate that the cloud terminal is a registered cloud terminal, the method for determining, by the cloud server, an identity verification result according to the identity information and the login information specifically includes:
s801, when identity information and login information are inconsistent, the cloud server acquires call ticket data corresponding to the identity information.
Specifically, when the identity information is used for indicating that the cloud terminal is a registered cloud terminal and the identity information is inconsistent with the login information, it is indicated that the user may replace a new cloud terminal, or the cloud terminal commonly used by the user is lost, forgotten to carry, and the like, and the cloud terminal of other users needs to be temporarily used for login. In this case, the cloud server may acquire ticket data corresponding to the identity information, and then determine the identity verification result through the ticket data.
S802, when the call ticket data is used for indicating that the identity information is consistent with the login information, the cloud server determines that the identity verification result is verification passing.
Specifically, when the caller in the ticket data is the identity information of the user a and the identity information bound with the login information is also the user a, it is indicated that the identity information is consistent with the login information. I.e. the call ticket data is used to indicate that the identity information is consistent with the login information. In this case, the cloud server may determine that the authentication result is authentication pass.
And S803, when the call ticket data is used for indicating that the identity information is inconsistent with the login information, the cloud server determines that the identity verification result is that verification is failed.
Specifically, when the caller in the ticket data is the identity information of the user a, but the identity information bound with the login information is the user B, it is indicated that the identity information is inconsistent with the login information. I.e. the call ticket data is used to indicate that the identity information is inconsistent with the login information. In this case, the cloud server may determine that the authentication result is authentication failure.
S804, when the identity information is consistent with the login information, the cloud server determines that the identity verification result is verification passing.
In an implementation manner, referring to fig. 5, as shown in fig. 9, in S502, when the identity information is used to indicate that the cloud terminal is a newly registered cloud terminal, the method for determining, by the cloud server, an identity verification result according to the identity information and the login information specifically includes:
and S901, when the identity information is consistent with the login information, the cloud server determines that the identity verification result is verification passing.
And S902, when the identity information and the login information are inconsistent, the cloud server determines that the identity verification result is that verification fails.
Optionally, the cloud server may determine whether the cloud terminal is a newly registered cloud terminal by acquiring call ticket data corresponding to the identity information. When the call ticket data is less or null data, the cloud server can determine that the cloud terminal is a newly registered cloud terminal. In this case, when the identity information and the login information agree, the cloud server determines that the authentication result is authentication pass. Correspondingly, when the identity information and the login information are inconsistent, the cloud server determines that the identity verification result is that verification fails.
In this way, the cloud server can dig the business through different user behaviors, for example, the newly replaced terminal user perceives the difference to different cloud terminals.
In one implementation manner, in conjunction with fig. 5, as shown in fig. 10, after sending the authentication result to the cloud terminal when the authentication result is that the authentication is passed, the method further includes:
s1001, a cloud server acquires a storage space of a cloud terminal.
Specifically, the cloud server can also manage and control the storage space of the cloud terminal. In this case, the cloud server may acquire the storage space of the cloud terminal.
Optionally, the cloud terminal may use free cloud space provided by the cloud server or purchased personal cloud space according to the user's demand for personal space. Accordingly, the cloud server can calculate and track the use condition of the storage space of the cloud terminal, such as personal space change along with the APP installed by the user.
S1002, when the storage space of the cloud terminal is smaller than the preset space, the cloud server sends a second prompt message to the cloud terminal.
Correspondingly, after receiving the second prompt message sent by the cloud server, the cloud terminal can display the second prompt message on a display interface of the cloud terminal, so that a user can determine whether to expand the capacity according to the second prompt message.
The second prompting message is used for prompting that the storage space of the cloud terminal is smaller than the preset space.
When the display interface of the cloud terminal displays the second prompt message, a trigger control for confirming expansion and a trigger control without expansion can be displayed. In this case, when the user determines to expand the storage space, a trigger operation may be performed on a trigger control confirming expansion. Correspondingly, when the user determines that the storage space is not expanded, the triggering operation can be executed on the triggering control which is not expanded.
Alternatively, the unit of storage space may be a unit of storage such as megabits (M). When the number of cloud terminals is plural, each cloud terminal has its own independent storage space. Correspondingly, each cloud terminal also has an independent preset space. The preset space is used for representing the storage size of each cloud terminal.
The size of the preset space may be set manually, for example, 500M or the like.
When the user determines that the storage space is not expanded, the user can execute operations such as unloading the APP according to the requirement, so that the storage space is released.
S1003, the cloud server receives the capacity expansion message sent by the cloud terminal in response to the second prompt message, and updates the storage space of the cloud terminal.
Therefore, the application can solve the technical problems that in the general technology, the terminal downloads the APP by itself after new purchase, the APP with limited storage capacity which cannot be installed by the terminal and the user forgets or loses the terminal and cannot use the mobile phone to process emergency matters exist, thereby realizing reasonable management and control of the storage space of the cloud terminal.
In one implementation manner, in conjunction with fig. 5, as shown in fig. 11, after sending the authentication result to the cloud terminal when the authentication result is that the authentication is passed, the method further includes:
s1101, the cloud server acquires display configuration information of the cloud terminal.
Wherein displaying the configuration information includes: at least one of display size, display sharpness, display brightness, number of display pixels, display contrast, display color, display response time, display technology.
The display technology comprises the following steps: a liquid crystal display (Liquid Crystal Display, LCD) technology, an Organic Light-Emitting Diode (OLED) technology, a digital Light processing (Digital Light Processing, DLP) display technology, and the like.
And S1102, the cloud server updates the resource information according to the display configuration information and sends the updated resource information to the cloud terminal.
Specifically, because the display configuration information of different cloud terminals is different, when the cloud server sends the resource information to the cloud terminal, the display configuration information of the cloud terminal needs to be acquired first, and the resource information needs to be updated according to the display configuration information. Subsequently, the cloud server can send updated resource information to the cloud terminal, so that the updated resource information is displayed in a cloud terminal adaptation mode, terminal reaction differences caused by differences of different APP manufacturers are avoided, and user experience is enriched.
In summary, the embodiment of the application provides an identity verification method, and a cloud server can acquire identity information of a cloud terminal and login information of the cloud terminal from an identity verification request after receiving the identity verification request sent by the cloud terminal. Subsequently, the cloud server can determine an identity verification result according to the identity information and the login information and send the identity verification result to the cloud terminal.
Thus, the cloud server can rapidly and accurately verify the identity of the cloud terminal. The technical problem that after an APP manufacturer downloads and uses through a mobile phone terminal manufacturer on-shelf user, a communication supervision department cannot realize real-time monitoring is solved, and further, the cloud server can conduct access interaction of APP and user information in real time in a cloud system communication mode, so that effective supervision is realized. The security of user communication is improved, the user tracking analysis is conveniently realized by a communication operator and the like, and the security organization information extraction is facilitated.
The foregoing description of the solution provided by the embodiments of the present application has been mainly presented in terms of a method. To achieve the above functions, it includes corresponding hardware structures and/or software modules that perform the respective functions. Those of skill in the art will readily appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as hardware or combinations of hardware and computer software. Whether a function is implemented as hardware or computer software driven hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The embodiment of the application can divide the functional modules of the identity verification device according to the method example, for example, each functional module can be divided corresponding to each function, and two or more functions can be integrated in one processing module. The integrated modules may be implemented in hardware or in software functional modules. Optionally, the division of the modules in the embodiment of the present application is schematic, which is merely a logic function division, and other division manners may be implemented in practice.
Fig. 12 is a schematic structural diagram of an authentication device according to an embodiment of the present application. The authentication means may be used to perform the method of authentication shown in figures 5-11. The authentication device shown in fig. 12 is applied to a cloud server belonging to a cloud system including a cloud terminal and a cloud server, and the authentication device includes: a receiving unit 1201, a processing unit 1202, and a transmitting unit 1203;
a receiving unit 1201, configured to receive an authentication request sent by a cloud terminal; the identity verification request comprises the identity information of the cloud terminal and the login information of the cloud terminal;
a processing unit 1202 for determining an authentication result according to the identity information and the login information;
and the sending unit 1203 is configured to send the authentication result to the cloud terminal.
Optionally, the processing unit 1202 is specifically configured to:
when the identity information is inconsistent with the login information, a first prompt message is sent to the cloud terminal; the first prompting message is used for prompting that the identity information and the login information of the cloud terminal are inconsistent;
receiving a response message sent by the cloud terminal in response to the first prompt message;
when the response message is used for indicating that the login is successful, determining that the authentication result is authentication passing;
When the response message is used for indicating login failure, the identity verification result is determined to be failed in verification.
Optionally, the processing unit 1202 is specifically configured to:
when the response message is used for indicating that the login is successful, temporary login information is sent to the cloud terminal;
receiving a temporary identity verification request sent by a cloud terminal; the temporary identity verification request is triggered when the cloud terminal logs in temporary login information;
and responding to the temporary identity verification request, and determining the identity verification result as verification passing.
Optionally, when the identity information is used to indicate that the cloud terminal is a registered cloud terminal, the processing unit 1202 is specifically configured to:
when the identity information is inconsistent with the login information, acquiring call ticket data corresponding to the identity information;
when the call ticket data is used for indicating that the identity information is consistent with the login information, determining that the identity verification result is verification passing;
when the call ticket data is used for indicating that the identity information is inconsistent with the login information, determining that the identity verification result is that verification fails;
and when the identity information is consistent with the login information, determining that the identity verification result is verification passing.
Optionally, when the identity information is used to indicate that the cloud terminal is a newly registered cloud terminal, the processing unit 1202 is specifically configured to:
When the identity information is consistent with the login information, determining that the identity verification result is verification passing;
and when the identity information is inconsistent with the login information, determining that the identity verification result is that verification fails.
Optionally, the authentication device further includes: an acquisition unit 1204;
an obtaining unit 1204, configured to obtain a storage space of the cloud terminal;
the sending unit 1203 is further configured to send a second prompting message to the cloud terminal when the storage space of the cloud terminal is smaller than a preset space; the second prompting message is used for prompting that the storage space of the cloud terminal is smaller than a preset space;
the receiving unit 1201 is further configured to receive a capacity expansion message sent by the cloud terminal in response to the second prompting message, and update a storage space of the cloud terminal.
Optionally, an acquiring unit 1204 is configured to acquire display configuration information of the cloud terminal; the display configuration information includes: at least one of display size, display sharpness, display brightness, number of display pixels, display contrast, display color, display response time, display technology;
the sending unit 1203 is further configured to update the resource information according to the display configuration information, and send the updated resource information to the cloud terminal.
The embodiment of the application also provides a computer readable storage medium, which comprises computer execution instructions, when the computer execution instructions run on a computer, cause the computer to execute the authentication method provided in the embodiment.
The embodiment of the application also provides a computer program which can be directly loaded into a memory and contains software codes, and the computer program can realize the identity authentication method provided by the embodiment after being loaded and executed by a computer.
Those skilled in the art will appreciate that in one or more of the examples described above, the functions described in the present application may be implemented in hardware, software, firmware, or any combination thereof. When implemented in software, these functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer-readable storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a general purpose or special purpose computer.
From the foregoing description of the embodiments, it will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-described division of functional modules is illustrated, and in practical application, the above-described functional allocation may be implemented by different functional modules according to needs, i.e. the internal structure of the apparatus is divided into different functional modules to implement all or part of the functions described above.
In the several embodiments provided by the present application, it should be understood that the disclosed apparatus and method may be implemented in other manners. For example, the above-described embodiments of the apparatus are merely illustrative, and the division of modules or units, for example, is merely a logical function division, and other manners of division are possible when actually implemented. For example, multiple units or components may be combined or may be integrated into another device, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form. The units described as separate parts may or may not be physically separate, and the parts shown as units may be one physical unit or a plurality of physical units, may be located in one place, or may be distributed in a plurality of different places. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units. The integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a readable storage medium. Based on such understanding, the technical solution of the embodiments of the present application may be essentially or a part contributing to the prior art or all or part of the technical solution may be embodied in the form of a software product stored in a storage medium, including several instructions for causing a device (may be a single-chip microcomputer, a chip or the like) or a processor (processor) to perform all or part of the steps of the method described in the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The foregoing is merely illustrative of the present application, and the present application is not limited thereto, and any changes or substitutions easily contemplated by those skilled in the art within the scope of the present application should be included in the present application. Therefore, the protection scope of the application is subject to the protection scope of the claims.

Claims (8)

1. An authentication method, characterized in that the authentication method is applied to a cloud server belonging to a cloud system including a cloud terminal and the cloud server, the authentication method comprising:
receiving an identity verification request sent by the cloud terminal; the identity verification request comprises identity information of the cloud terminal and login information of the cloud terminal;
according to the identity information and the login information, determining an identity verification result, and sending the identity verification result to the cloud terminal, wherein the method comprises the following steps: when the identity information is inconsistent with the login information, a first prompt message is sent to the cloud terminal; the first prompting message is used for prompting that the identity information of the cloud terminal is inconsistent with the login information; the first prompt message comprises a trigger control for whether to continue logging in;
Receiving a response message sent by the cloud terminal in response to the first prompt message;
when the response message is used for indicating that the cloud terminal is continuously used for logging in the cloud server, determining that the identity verification result is verification passing;
when the response message is used for indicating that the cloud terminal is not used for logging in the cloud server continuously, determining that the identity verification result is verification failure;
when the identity information is used for indicating that the cloud terminal is a registered cloud terminal, determining an identity verification result according to the identity information and the login information includes:
when the identity information is inconsistent with the login information, acquiring call ticket data corresponding to the identity information;
when the call ticket data is used for indicating that the identity information is consistent with the login information, determining that the identity verification result is verification passing;
when the call ticket data is used for indicating that the identity information is inconsistent with the login information, determining that the identity verification result is verification failure;
when the identity information is consistent with the login information, determining that the identity verification result is verification passing;
when the identity information is used for indicating that the cloud terminal is a newly registered cloud terminal, determining an identity verification result according to the identity information and the login information includes:
When the identity information is consistent with the login information, determining that the identity verification result is verification passing;
when the identity information is inconsistent with the login information, determining that the identity verification result is that verification fails;
when the authentication result is that authentication passes, after the authentication result is sent to the cloud terminal, the method further comprises:
acquiring a storage space of the cloud terminal;
when the storage space of the cloud terminal is smaller than a preset space, a second prompt message is sent to the cloud terminal; the second prompting message is used for prompting that the storage space of the cloud terminal is smaller than the preset space;
and receiving a capacity expansion message sent by the cloud terminal in response to the second prompt message, and updating the storage space of the cloud terminal.
2. The authentication method according to claim 1, wherein when the response message is used to indicate that login is successful, determining that the authentication result is authentication pass includes:
when the response message is used for indicating that the login is successful, temporary login information is sent to the cloud terminal;
receiving a temporary identity verification request sent by the cloud terminal; the temporary identity verification request is triggered when the cloud terminal logs in the temporary login information;
And responding to the temporary identity verification request, and determining the identity verification result as verification passing.
3. The authentication method according to claim 1 or 2, wherein when the authentication result is authentication pass, after the sending the authentication result to the cloud terminal, further comprising:
acquiring display configuration information of the cloud terminal; the display configuration information includes: at least one of display size, display sharpness, display brightness, number of display pixels, display contrast, display color, display response time, display technology;
and updating the resource information according to the display configuration information, and sending the updated resource information to the cloud terminal.
4. An authentication device, wherein the authentication device is applied to a cloud server belonging to a cloud system including a cloud terminal and the cloud server, the authentication device comprising: the device comprises a receiving unit, a processing unit and a transmitting unit;
the receiving unit is used for receiving an identity verification request sent by the cloud terminal; the identity verification request comprises identity information of the cloud terminal and login information of the cloud terminal;
The processing unit is used for determining an identity verification result according to the identity information and the login information;
the sending unit is configured to send the authentication result to the cloud terminal, and includes: when the identity information is inconsistent with the login information, a first prompt message is sent to the cloud terminal; the first prompting message is used for prompting that the identity information of the cloud terminal is inconsistent with the login information; the first prompt message comprises a trigger control for whether to continue logging in;
receiving a response message sent by the cloud terminal in response to the first prompt message;
when the response message is used for indicating that the cloud terminal is continuously used for logging in the cloud server, determining that the identity verification result is verification passing;
when the response message is used for indicating that the cloud terminal is not used for logging in the cloud server continuously, determining that the identity verification result is verification failure;
when the identity information is used for indicating that the cloud terminal is a registered cloud terminal, the processing unit is specifically configured to:
when the identity information is inconsistent with the login information, acquiring call ticket data corresponding to the identity information;
When the call ticket data is used for indicating that the identity information is consistent with the login information, determining that the identity verification result is verification passing;
when the call ticket data is used for indicating that the identity information is inconsistent with the login information, determining that the identity verification result is verification failure;
when the identity information is consistent with the login information, determining that the identity verification result is verification passing;
when the identity information is used for indicating that the cloud terminal is a newly registered cloud terminal, the processing unit is specifically configured to:
when the identity information is consistent with the login information, determining that the identity verification result is verification passing;
when the identity information is inconsistent with the login information, determining that the identity verification result is that verification fails;
the authentication device further includes: an acquisition unit;
the acquisition unit is used for acquiring the storage space of the cloud terminal;
the sending unit is further configured to send a second prompting message to the cloud terminal when the storage space of the cloud terminal is smaller than a preset space; the second prompting message is used for prompting that the storage space of the cloud terminal is smaller than the preset space;
The receiving unit is further configured to receive a capacity expansion message sent by the cloud terminal in response to the second prompt message, and update a storage space of the cloud terminal.
5. The authentication device according to claim 4, wherein the processing unit is specifically configured to:
when the response message is used for indicating that the login is successful, temporary login information is sent to the cloud terminal;
receiving a temporary identity verification request sent by the cloud terminal; the temporary identity verification request is triggered when the cloud terminal logs in the temporary login information;
and responding to the temporary identity verification request, and determining the identity verification result as verification passing.
6. An authentication device according to claim 4 or 5, further comprising: an acquisition unit;
the acquisition unit is used for acquiring display configuration information of the cloud terminal; the display configuration information includes: at least one of display size, display sharpness, display brightness, number of display pixels, display contrast, display color, display response time, display technology;
and the sending unit is also used for updating the resource information according to the display configuration information and sending the updated resource information to the cloud terminal.
7. An authentication device comprising a memory and a processor; the memory is used for storing computer execution instructions, and the processor is connected with the memory through a bus; the processor executing the computer-executable instructions stored in the memory to cause the authentication device to perform the authentication method of any one of claims 1-3 when the authentication device is operating.
8. A computer readable storage medium comprising computer executable instructions which, when run on a computer, cause the computer to perform the authentication method of any of claims 1-3.
CN202210682640.XA 2022-06-16 2022-06-16 Identity verification method, device and storage medium Active CN114928840B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210682640.XA CN114928840B (en) 2022-06-16 2022-06-16 Identity verification method, device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210682640.XA CN114928840B (en) 2022-06-16 2022-06-16 Identity verification method, device and storage medium

Publications (2)

Publication Number Publication Date
CN114928840A CN114928840A (en) 2022-08-19
CN114928840B true CN114928840B (en) 2023-10-13

Family

ID=82814380

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210682640.XA Active CN114928840B (en) 2022-06-16 2022-06-16 Identity verification method, device and storage medium

Country Status (1)

Country Link
CN (1) CN114928840B (en)

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102624720A (en) * 2012-03-02 2012-08-01 华为技术有限公司 Method, device and system for identity authentication
CN103067372A (en) * 2012-12-26 2013-04-24 广州杰赛科技股份有限公司 Method and login system with which cloud terminal logins cloud server
CN105335637A (en) * 2015-11-03 2016-02-17 中国联合网络通信集团有限公司 Authentication method, authentication device and authentication system
CN106656952A (en) * 2016-09-21 2017-05-10 北京神州绿盟信息安全科技股份有限公司 Authentication method, device and system for registration equipment
CN108183924A (en) * 2018-03-01 2018-06-19 深圳市买买提信息科技有限公司 A kind of login validation method and terminal device
CN109862194A (en) * 2017-11-30 2019-06-07 河南星云慧通信技术有限公司 A kind of Mobile telephone communication method based on Cloud Server
CN110198289A (en) * 2018-02-27 2019-09-03 国民技术股份有限公司 Terminal, Cloud Server, verifying equipment, auth method and system
CN110414208A (en) * 2019-07-25 2019-11-05 中国工商银行股份有限公司 Login validation method, calculates equipment and medium at device
CN110855598A (en) * 2018-08-20 2020-02-28 北京场景互娱传媒科技有限公司 Terminal application management method, terminal device, cloud server and storage medium
CN112437428A (en) * 2020-11-27 2021-03-02 中国联合网络通信集团有限公司 Verification method and server
CN112533202A (en) * 2019-08-30 2021-03-19 华为技术有限公司 Identity authentication method and device
WO2022011055A2 (en) * 2020-07-07 2022-01-13 Fp Complete Corporation A System and Method for Simplifying User Authentication and Authorization Workflows
CN114301617A (en) * 2021-10-22 2022-04-08 鸬鹚科技(深圳)有限公司 Identity authentication method and device for multi-cloud application gateway, computer equipment and medium

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102624720A (en) * 2012-03-02 2012-08-01 华为技术有限公司 Method, device and system for identity authentication
CN103067372A (en) * 2012-12-26 2013-04-24 广州杰赛科技股份有限公司 Method and login system with which cloud terminal logins cloud server
CN105335637A (en) * 2015-11-03 2016-02-17 中国联合网络通信集团有限公司 Authentication method, authentication device and authentication system
CN106656952A (en) * 2016-09-21 2017-05-10 北京神州绿盟信息安全科技股份有限公司 Authentication method, device and system for registration equipment
CN109862194A (en) * 2017-11-30 2019-06-07 河南星云慧通信技术有限公司 A kind of Mobile telephone communication method based on Cloud Server
CN110198289A (en) * 2018-02-27 2019-09-03 国民技术股份有限公司 Terminal, Cloud Server, verifying equipment, auth method and system
CN108183924A (en) * 2018-03-01 2018-06-19 深圳市买买提信息科技有限公司 A kind of login validation method and terminal device
CN110855598A (en) * 2018-08-20 2020-02-28 北京场景互娱传媒科技有限公司 Terminal application management method, terminal device, cloud server and storage medium
CN110414208A (en) * 2019-07-25 2019-11-05 中国工商银行股份有限公司 Login validation method, calculates equipment and medium at device
CN112533202A (en) * 2019-08-30 2021-03-19 华为技术有限公司 Identity authentication method and device
WO2022011055A2 (en) * 2020-07-07 2022-01-13 Fp Complete Corporation A System and Method for Simplifying User Authentication and Authorization Workflows
CN112437428A (en) * 2020-11-27 2021-03-02 中国联合网络通信集团有限公司 Verification method and server
CN114301617A (en) * 2021-10-22 2022-04-08 鸬鹚科技(深圳)有限公司 Identity authentication method and device for multi-cloud application gateway, computer equipment and medium

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
Application of Attribute Based Encryption (ABE) for PII and personal data protection on IoT devices, WLAN, cloud and mobile services - High level requirements.ETSI TS 103 458.2018,(第V1.1.1期),全文. *
DTS/CYBER-0020.TECHNICAL SPECIFICATION CYBER *
一种云计算中的多重身份认证与授权方案;江伟玉;高能;刘泽艺;林雪燕;;信息网络安全(第08期);全文 *
云计算安全认证与可信接入协议研究进展;孔功胜;;河南大学学报(自然科学版)(第01期);全文 *

Also Published As

Publication number Publication date
CN114928840A (en) 2022-08-19

Similar Documents

Publication Publication Date Title
CN102232304B (en) Method, system and terminal for system update between mobile communication terminals
CN106465460B (en) Method and apparatus for supporting GLOBALPALATFORM usage on embedded UICCs
US10079882B2 (en) Method and system for synchronizing information to contacts on cloud platform
US9042877B1 (en) System and method for retrofitting a branding framework into a mobile communication device
US11310654B1 (en) Electronic subscriber identity module (eSIM) profile delivery and activation system and methods
GB2457221A (en) Smart Card Web Server (SCWS) administration within a plurality of security domains
US10902307B1 (en) Universal integrated circuit card (UICC) toolkit
US20140115675A1 (en) Smart card service method and apparatus for performing the same
CN103716346A (en) Management method and device of application on android handset client
US10078532B2 (en) Resource management method and device for terminal system among multiple operating systems
CN106776013B (en) Multi-system resource scheduling method and device
US12022284B2 (en) System and methods for over-the-air SIM profile transfer
CN103475512A (en) Internet of Things remote management platform migration method, device and Internet of Things terminal
CN108984339B (en) Data recovery method and related product
CN115098020A (en) Storage management method, device and storage medium
CN106453263A (en) Method and system of binding cellphone number with APP
US11418958B1 (en) Subscriber identity module (SIM) remote update agent
CN105518646A (en) Mobile device configuration system and method
CN108200052B (en) Digital signature method and device based on mobile terminal and mobile terminal
US11604656B2 (en) Method and apparatus for managing application
CN114928840B (en) Identity verification method, device and storage medium
US9198045B1 (en) Mobile communication device remote unlock system and method
US20220225076A1 (en) 5G Network Exposure Function (NEF) Capturing Processor Identity
US10631177B1 (en) Mobile phone chipset parameter adaptation framework
CN110543312A (en) Application software installation method and device and server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant